نتایج جستجو برای: random key distribution

تعداد نتایج: 1361267  

2013
Elias Gonzalez Laszlo B. Kish Robert S. Balog Prasad Enjeti

We introduce a protocol with a reconfigurable filter system to create non-overlapping single loops in the smart power grid for the realization of the Kirchhoff-Law-Johnson-(like)-Noise secure key distribution system. The protocol is valid for one-dimensional radial networks (chain-like power line) which are typical of the electricity distribution network between the utility and the customer. Th...

2012
VAHID KARIMIPOUR

We develop the concept of quantum carrier and show that messages can be uploaded and downloaded from this carrier and while in transit, these messages are hidden from external agents. We explain in detail the working of the quantum carrier for different communication tasks, including quantum key distribution, classical secret and quantum state sharing among a set of n players according to gener...

2009
Tobias Moroder Marcos Curty Raymond Y Q Cai Valerio Scarani

The lists of bits processed in quantum key distribution are necessarily of finite length. The need for finite-key unconditional security bounds was recognized long ago, but the theoretical tools have become available only very recently. We provide finite-key unconditional security bounds for two practical implementations of the Bennett–Brassard 1984 coding: prepareand-measure implementations wi...

2013
Derek Abbott

Kirchhoff-Law-Johnson-Noise (KLJN) secure key distribution (Cho 2005),(Palmer 2007), (Kish 2006), (Mingesz 2013),(Kish 2009),(Mingesz 2008),(Kish 2006b), is a classical physical scheme that is a potential alternative to quantum key distribution. It is also sometimes loosely referred to as the Kish cipher, however, it is a hardware-based scheme for securely distributing cipher keys, and is not a...

2009
A Leverrier E Karpov P Grangier N J Cerf

Proving the unconditional security of quantum key distribution (QKD) is a highly challenging task as one needs to determine the most efficient attack compatible with experimental data. This task is even more demanding for continuous-variable QKD as the Hilbert space where the protocol is described is infinite dimensional. A possible strategy to address this problem is to make an extensive use o...

Journal: :Des. Codes Cryptography 1997
Douglas R. Stinson

This paper provides an exposition of methods by which a trusted authority can distribute keys and/or broadcast a message over a network , so that each member of a privileged subset of users can compute a speciied key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to k...

Journal: :CoRR 2010
Oleksandr Korchenko Yevhen Vasiliu Sergiy Gnatyuk

In this paper, the systematisation and classification of modern quantum technologies of information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of the quantum technologies used is given. A qualitative analysis of the advantages and disadvantages of concrete quantum protocols is made. The current s...

Journal: :Entropy 2015
Christian S. Jacobsen Tobias Gehring Ulrik L. Andersen

Existing experimental implementations of continuous-variable quantum key distribution require shot-noise limited operation, achieved with shot-noise limited lasers. However, loosening this requirement on the laser source would allow for cheaper, potentially integrated systems. Here, we implement a theoretically proposed prepare-and-measure continuous-variable protocol and experimentally demonst...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید