نتایج جستجو برای: distribution key
تعداد نتایج: 1126998 فیلتر نتایج به سال:
The Kish key distribution system has been proposed as a classical alternative to quantum key distribution. The idealized Kish scheme elegantly promises secure key distribution by exploiting thermal noise in a transmission line. However, it is vulnerable to nonidealities in its components, such as the finite resistance of the transmission line connecting its endpoints. We introduce a novel attac...
In an electronic voting protocol, a distributed scheme can be used for forbidding the malicious acts of the voting administrator and the counter during the election, but it cannot prevent them from collaborating to trace the ballots and destroy their privacy after the election. We present a distributed anonymous quantum key distribution scheme and further construct a distributed quantum electio...
We consider quantum key distribution implementations in which the receiver’s apparatus is fixed and does not depend on his choice of basis at each qubit transmission. We show that, although theoretical quantum key distribution is proven secure, such implementations are totally insecure against a strong eavesdropper that has one-time (single) access to the receiver’s equipment. The attack we pre...
Quantum Key Distribution (Q.K.D.) provides us a protected communication channel. In present days we have some latest problems existing in Quantum key distribution. Let us look in to the Quantum key distribution Research analysis which provides us the Information about BB84 Protocol, using reducing laser light is used as a Photon Source, Protected keys could not be generated. The reason is it’s ...
To achieve an efficient use of cryptographic mechanisms to secure ICT infrastructures, we propose to integrate quantum key distribution into main communication protocols. This article gives some benefits and contributions of the use of quantum Key Distribution to enforce ICT security level. Several feasibility ways to implement solutions based on quantum key distribution are proposed.
Quantum Key Distribution (QKD) protocols make it possible for two quantum parties to generate a secret shared key. Semi-quantum Key Distribution (SQKD) protocols, such as “QKD with classical Bob” and “QKD with classical Alice” (that have both been proven robust), achieve this goal even if one of the parties is classical. However, the currently existing SQKD protocols are not experimentally feas...
We evaluate the amount of secret key that can be obtained from the incompatible measurements in the BB84 quantum key distribution protocol, in which measuring bases are different from transmitting bases. Moreover, the entropic uncertainty principle implies that one cannot extract the secret key from both compatible measurements and incompatible ones simultaneously.
We present a new protocol for quantum key distribution using discrete phase-shift encoding with continuous variables. The novelty of the protocol is multi letter alphabets represented by coherent states of light with fixed amplitude and variable phase. Information is encoded in the phase of a coherent states which can be chosen from a regular discrete set consisting of an arbitrary number of le...
Device-independent cryptography represent the strongest form of physical security: it is based on general physical laws and does not require any detailed knowledge or control of the physical devices used in the protocol. We discuss a general security proof valid for a large class of device-independent quantum key distribution protocols. The proof relies on the validity of Quantum Theory and req...
In many quantum key distribution (QKD) protocols, the receiver has to randomly change a measurement basis for each pulse or each train of pulses. This random change requires us to generate a huge amount of random numbers. It is also cumbersome for some QKD protocols, such as the round-robin differential phase shift QKD protocol, to change the basis rapidly. In this presentation, we address thes...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید