نتایج جستجو برای: eavesdropper attack

تعداد نتایج: 81837  

Journal: :JCS 2015
Es-Said Chanigui Abdelmalek Azizi

Corresponding Author: Es-said Chanigui Department of Mathematics and Computer Science, FSO, University Mohamed I, Oujda, Morocco Email: [email protected] Abstract: This study provides a simple variation of the protocol of quantum key expansion proposed by Hwang. Some weaknesses relating to the step of public discussions for error detection are analyzed and an attack strategy, allowing the eaves...

Journal: :IEEE Transactions on Vehicular Technology 2023

In this paper, we evaluate the ultimate severity of a concurrent spoofing-jamming un-detected attack from full-duplex (FD) multi-antenna eavesdropper (EV) on legitimate user equipment (UE) in massive multiple-input multiple-output (MIMO) system. The FD EV can concurrently exploit its antennas to spoof one UE pilot and estimate link same uplink, then eavesdrop UE's data perform directional jammi...

Journal: :Quantum Information Processing 2021

Semi-quantum private comparison (SQPC) allows two participants with limited quantum ability to securely compare the equality of their secrets help a semi-dishonest third party (TP). Recently, Jiang (Quantum Inf Process 19(6): 180, 2020) proposed SQPC protocol based on Bell states and claimed it is secure. In this paper, we present types attack Jiang’s protocol. first type attack, an outside eav...

Journal: :EPL 2022

Recently, Yan et al. proposed a quantum secure direct communication (QSDC) protocol with authentication using single photons and Einstein-Podolsky-Rosen (EPR) pairs (Yan al., CMC-Computers, Materials \& Continua, 63(3), 2020). In this work, we show that the QSDC is not against intercept-and-resend attack impersonation attack. An eavesdropper can get full secret message by applying these attacks...

2009
O. Ozan Koyluoglu C. Emre Koksal Hesham El Gamal

In a powerful secrecy attack, eavesdroppers can collude, i.e., they can share their observations. Securing information in such a scenario will be an even more challenging task compared to non-colluding case. We here analyze the effect of eavesdropper collusion on the achievable performance in both the path loss and ergodic multi-path fading models. We provide two results: 1) If the legitimate n...

Journal: :Physical review letters 2002
Nicolas J Cerf Mohamed Bourennane Anders Karlsson Nicolas Gisin

We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e., quantum states in a d-dimensional Hilbert space. The first cryptosystem uses two mutually unbiased bases (thereby extending the BB84 scheme), while the second exploits all d+1 available such bases (extending the six-state protocol for qubits). We derive the information gained by a potential eavesdropper...

2002
Thomas Durt Nicolas J. Cerf Nicolas Gisin Marek Żukowski

The study of quantum cryptography and quantum non-locality have traditionnally been based on two-level quantum systems (qubits). In this paper we consider a generalisation of Ekert’s cryptographic protocol[20] where qubits are replaced by qutrits. The security of this protocol is related to non-locality, in analogy with Ekert’s protocol. In order to study its robustness against the optimal indi...

Journal: :Electronics 2022

Recently, Zhang et al. proposed a single-state semi-quantum key distribution protocol to help quantum participant share secret with classical participant. However, this study shows that an eavesdropper can use double C-NOT attack obtain parts of the final shared without being detected by participants. To avoid problem, modification is here.

2013
Ajit Singh Swati Malik

Securing data is a challenging issue in today’s era. Most of the data travel over the internet and it becomes difficult to make data secure. So Cryptography was introduced for making data secure. But alone cryptography cannot provide a better security approach because the scrambled message is still available to the eavesdropper. There arises a need of data hiding. So here we are using a combina...

Journal: :Physical review letters 2007
Antonio Acín Nicolas Brunner Nicolas Gisin Serge Massar Stefano Pironio Valerio Scarani

We present the optimal collective attack on a quantum key distribution protocol in the "device-independent" security scenario, where no assumptions are made about the way the quantum key distribution devices work or on what quantum system they operate. Our main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amou...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید