نتایج جستجو برای: distribution key
تعداد نتایج: 1126998 فیلتر نتایج به سال:
This errata contains the mentioned plots where the revised expressions have been applied, such that the replacement for Figure 2 in [1] is shown in Figure 1, and Figure 4 in [1] is shown in Figure 2. We keep the corresponding (b) panels for comparison. We note that the corrections only reinforce the conclusions of our paper, which are that reverse reconciliation is vulnerable to preparation noi...
The problem of'controlling access to multimedia multicasts requires the distribution and maintenance of keying information. The conventional approach to distributing keys is to use a channel independent of the multimedia content. We propose a second approach that involves the use of an data-dependent channel, and can be achieved for multimedia by using data embedding techniques. Using data embe...
Quantum key distribution (QKD) provides a way for distribution of secure key in at least two parties which they initially share. And there are many protocols for providing a secure key i.e. BB84 protocol, SARG04 protocol, E91 protocol and many more. In this paper all the concerned protocols that share a secret key is explained and comparative study of all protocols shown.
As a countermeasure for eavesdroppers in wireless communications, a secret key agreement scheme using a variable directional antenna called ESPAR antenna was developed. In this scheme, the process of information reconciliation is necessary to correct the discrepancies between the legitimate users’ keys. In this paper, we propose a new information reconciliation protocol using the reliability of...
Cascade is an information reconciliation protocol proposed in the context of secret key agreement in quantum cryptography. This protocol allows removing discrepancies in two partially correlated sequences that belong to distant parties, connected through a public noiseless channel. It is highly interactive, thus requiring a large number of channel communications between the parties to proceed a...
We present a security analysis against collective attacks for a time-energy entanglement-based quantum key distribution protocol, given the practical constraints of single photon detector efficiency, channel loss, and finite-key considerations. We find a positive secure-key capacity when the key length increases beyond 104 for eight-dimensional systems. The minimum key length required is reduce...
We consider quantum key distribution in the device-independent scenario, i.e., where the legitimate parties do not know (or trust) the exact specification of their apparatus. We show how secure key distribution can be realized against the most general attacks by a quantum adversary under the condition that measurements on different subsystems by the honest parties commute.
In this paper, we present three generalized quantum key distribution protocols between two groups, which consist of k and l members respectively. In these protocols two groups retrieve the secure key string, only if all members should cooperate with one another in each group. We show that if there is an eavesdropper between two groups then their cheating or eavesdropping cannot be accomplished.
In a typical optical implementation of the Bennett-Brassard 1984 (so-called BB84) quantum key distribution protocol, the sender uses an active source to produce the required signal states. While active state preparation of BB84 signals is a simple and elegant solution in principle, in practice passive state preparation might be desirable in some scenarios, for instance, in those experimental se...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید