نتایج جستجو برای: pre distribution key

تعداد نتایج: 1409099  

2004
Mahalingam Ramkumar Nasir Memon

Key pre-distribution (KPD) schemes, which are inherently trade-offs between security and complexity, are perhaps well suited for securing large-scale deployments of resource constrained nodes without persistent access to a trusted authority (TA). However, the need to offset their inherent security limitations, calls for some degree of tamper-resistance of nodes. Obviously, if absolute tamperres...

2017
Anthony Martin Florian Kaiser Aline Vernier Alexios Beveratos Valerio Scarani Sébastien Tanzilli S. Tanzilli

Journal: :CoRR 2010
Esther Hänggi Renato Renner

We consider quantum key distribution in the device-independent scenario, i.e., where the legitimate parties do not know (or trust) the exact specification of their apparatus. We show how secure key distribution can be realized against the most general attacks by a quantum adversary under the condition that measurements on different subsystems by the honest parties commute.

2005
Claude Castelluccia Nitesh Saxena Jeong Hyun Yi

We present two new schemes that, in the absence of a centralized support, allow a pair of nodes of a mobile ad hoc network to compute a shared key without communicating. Such a service is important to secure routing protocols [1–3]. The schemes are built using the well-known technique of threshold secret sharing and are secure against a collusion of up to a certain number of nodes. We evaluate ...

2015
T A Tharani

Wireless sensor networks are used in various applications now-a-days. As they are deployed in open area, there is a need for key management in order to protect the information stored in sensor nodes. To address this problem, we use key pre-distribution scheme. In this paper, we propose a new scheme based on symmetric matrix and maximum rank distance (MRD) codes where the size of the symmetric m...

2003
Sora Choi Jinsoo Kimand Dong Pyo Chi

In this paper, we present three generalized quantum key distribution protocols between two groups, which consist of k and l members respectively. In these protocols two groups retrieve the secure key string, only if all members should cooperate with one another in each group. We show that if there is an eavesdropper between two groups then their cheating or eavesdropping cannot be accomplished.

2011
Marcos CURTY Xiongfeng MA Hoi-Kwong LO Norbert LÜTKENHAUS

In a typical optical implementation of the Bennett-Brassard 1984 (so-called BB84) quantum key distribution protocol, the sender uses an active source to produce the required signal states. While active state preparation of BB84 signals is a simple and elegant solution in principle, in practice passive state preparation might be desirable in some scenarios, for instance, in those experimental se...

Journal: :CoRR 2017
A. S. Trushechkin E. O. Kiktenko A. K. Fedorov

A.S. Trushechkin, 2, 3 E.O. Kiktenko, 4 and A.K. Fedorov 5, 6 Steklov Mathematical Institute of Russian Academy of Sciences, Moscow 119991, Russia National Research Nuclear University MEPhI, Moscow 115409, Russia Department of Mathematics and Russian Quantum Center, National University of Science and Technology MISiS, Moscow 119049, Russia Bauman Moscow State Technical University, Moscow 105005...

2013
Zhen-Qiang Yin Chi-Hang Fred Fung Xiongfeng Ma Chun-Mei Zhang Hong-Wei Li Wei Chen Shuang Wang Guang-Can Guo Zheng-Fu Han

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید