نتایج جستجو برای: eavesdropper attack

تعداد نتایج: 81837  

2003
Qing-yu Cai

We present a secure communication protocol which allows direct secure communication. Using quantum nonlocality, information is transferred in a deterministic manner. The security of this protocol is based on the ‘High fidelity implies low entropy’. In fact, the eavesdropper-Eve can use a denial-of-service (DoS) attack to destroy a quantum communication,e.g., she can destroy the travel photon to...

Journal: :Physical review letters 2004
Frédéric Grosshans Nicolas J Cerf

A general study of arbitrary finite-size coherent attacks against continuous-variable quantum cryptographic schemes is presented. It is shown that, if the size of the blocks that can be coherently attacked by an eavesdropper is fixed and much smaller than the key size, then the optimal attack for a given signal-to-noise ratio in the transmission line is an individual Gaussian attack. Consequent...

1996
Eli Biham

We present strong attacks against quantum key distribution schemes which use quantum memories and quantum gates to attack directly the final key. We analyze a specific attack of this type, for which we find the density matrices available to the eavesdropper and the optimal information which can be extracted from them. We prove security against this attack and discuss security against any attack...

2015
Kam Wai Clifford Chan Mayssaa El Rifai Pramode Verma Subhash Kak Yuhua Chen

This paper presents a multi-stage, multi-photon quantum key distribution protocol based on the double-lock cryptography. It exploits the asymmetry in the detection strategies between the legitimate users and the eavesdropper. The security analysis of the protocol is presented with coherent states under the interceptresend attack, the photon number splitting attack, and the man-in-the-middle att...

2015
Abhishek R. Malviya Balaso N. Jagdale

Wireless Sensor Network (WSN) is a broad network consisting of a number of sensor nodes in it. WSN is used mainly for monitoring and data aggregation purpose. A best plan of opponent may attack the sink node which is the aggregation point for the whole network. So, first there comes a need to secure the sink node from adversary. There are previous work are done by providing location privacy to ...

Journal: :CoRR 2009
Subhash C. Kak

This note describes some cryptographic issues related to multi‐located parties. In general, multi‐located parties make it difficult for the eavesdropper to mount the man‐in‐the‐ middle attack. Conversely, they make it easier to address problems such as joint encryption and error correction coding. It is easier to implement the three‐stage quantum cryptography protocol.

Journal: :CoRR 2010
Ivan Arce Emiliano Kargieman Gerardo Richarte Carlos Sarraute Ariel Waissbein

TheMySQL challenge–and–response authentication protocol is proved insecure. We show how can an eavesdropper impersonate a valid user after witnessing only a few executions of this protocol. The algorithm of the underlying attack is presented. Finally we comment about implementations and statistical results.

2011
Gilles Brassard Peter Høyer Kassem Kalach Marc Kaplan Sophie Laplante Louis Salvail

In 1974, Ralph Merkle proposed the first unclassified scheme for secure communications over insecure channels. When legitimate communicating parties are willing to spend an amount of computational effort proportional to some parameter N , an eavesdropper cannot break into their communication without spending a time proportional to N, which is quadratically more than the legitimate effort. We sh...

Journal: :Zhongguo kexue 2022

In this paper, we propose a novel two-party semiquantum key distribution (SQKD) protocol by only employing one kind of GHZ-like state. The proposed SQKD can create private shared between quantum party with unlimited abilities and classical limited without the existence third party. doesn't need Hadamard gate or entanglement swapping. Detailed security analysis turns out that resist various famo...

2002
Norbert Lütkenhaus Mika Jahma

Quantum key distribution can be performed with practical signal sources such as weak coherent pulses. One example of such a scheme is the Bennett–Brassard protocol that can be implemented via polarization of the signals, or equivalent signals. It turns out that the most powerful tool at the disposition of an eavesdropper is the photon-number splitting attack. We show that this attack can be ext...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید