نتایج جستجو برای: distribution key

تعداد نتایج: 1126998  

Journal: :Entropy 2016
Christian S. Jacobsen Tobias Gehring Ulrik L. Andersen

This errata contains the mentioned plots where the revised expressions have been applied, such that the replacement for Figure 2 in [1] is shown in Figure 1, and Figure 4 in [1] is shown in Figure 2. We keep the corresponding (b) panels for comparison. We note that the corrections only reinforce the conclusions of our paper, which are that reverse reconciliation is vulnerable to preparation noi...

2001
Wade Trappe Jie Song Radha Poovendran K. J. Ray Liu

The problem of'controlling access to multimedia multicasts requires the distribution and maintenance of keying information. The conventional approach to distributing keys is to use a channel independent of the multimedia content. We propose a second approach that involves the use of an data-dependent channel, and can be achieved for multimedia by using data embedding techniques. Using data embe...

2014
Hitesh Singh D. L. Gupta A. K Singh

Quantum key distribution (QKD) provides a way for distribution of secure key in at least two parties which they initially share. And there are many protocols for providing a secure key i.e. BB84 protocol, SARG04 protocol, E91 protocol and many more. In this paper all the concerned protocols that share a secret key is explained and comparative study of all protocols shown.

2009
Takayuki Shimizu Hisato Iwai Hideichi Sasaoka

As a countermeasure for eavesdroppers in wireless communications, a secret key agreement scheme using a variable directional antenna called ESPAR antenna was developed. In this scheme, the process of information reconciliation is necessary to correct the discrepancies between the legitimate users’ keys. In this paper, we propose a new information reconciliation protocol using the reliability of...

Journal: :Quantum Information & Computation 2015
Jesús Martínez-Mateo Christoph Pacher Momtchil Peev Alex Ciurana Vicente Martin

Cascade is an information reconciliation protocol proposed in the context of secret key agreement in quantum cryptography. This protocol allows removing discrepancies in two partially correlated sequences that belong to distant parties, connected through a public noiseless channel. It is highly interactive, thus requiring a large number of channel communications between the parties to proceed a...

Journal: :Quantum Information Processing 2015
Catherine Lee Jacob Mower Zheshen Zhang Jeffrey H. Shapiro Dirk Englund

We present a security analysis against collective attacks for a time-energy entanglement-based quantum key distribution protocol, given the practical constraints of single photon detector efficiency, channel loss, and finite-key considerations. We find a positive secure-key capacity when the key length increases beyond 104 for eight-dimensional systems. The minimum key length required is reduce...

2017
Anthony Martin Florian Kaiser Aline Vernier Alexios Beveratos Valerio Scarani Sébastien Tanzilli S. Tanzilli

Journal: :CoRR 2010
Esther Hänggi Renato Renner

We consider quantum key distribution in the device-independent scenario, i.e., where the legitimate parties do not know (or trust) the exact specification of their apparatus. We show how secure key distribution can be realized against the most general attacks by a quantum adversary under the condition that measurements on different subsystems by the honest parties commute.

2003
Sora Choi Jinsoo Kimand Dong Pyo Chi

In this paper, we present three generalized quantum key distribution protocols between two groups, which consist of k and l members respectively. In these protocols two groups retrieve the secure key string, only if all members should cooperate with one another in each group. We show that if there is an eavesdropper between two groups then their cheating or eavesdropping cannot be accomplished.

2011
Marcos CURTY Xiongfeng MA Hoi-Kwong LO Norbert LÜTKENHAUS

In a typical optical implementation of the Bennett-Brassard 1984 (so-called BB84) quantum key distribution protocol, the sender uses an active source to produce the required signal states. While active state preparation of BB84 signals is a simple and elegant solution in principle, in practice passive state preparation might be desirable in some scenarios, for instance, in those experimental se...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید