نتایج جستجو برای: pre distribution key

تعداد نتایج: 1409099  

2000
Jeffrey Bub

A quantum key distribution scheme whose security depends on the features of preand post-selected quantum ensembles is described. PACS numbers: 03.65.Bz, 42.80.Sa, 89.70.+c A wide variety of quantum key distribution schemes have been proposed, following the original Bennett and Brassard protocol [1]. Ekert [2] has described a scheme in which two parties, Alice and Bob, create a shared random key...

2015
K. Suguna

The Wireless sensor network communication can be captured easily, therefore there is a need for security. To achieve security in wireless sensor network, key predistribution is essential. Key pre-distribution is a method of distribution of keys onto the nodes before deployment. Key pre-distribution schemes have been developed for the better maintenance of key management in wireless sensor netwo...

2013
Walid Bechkit Abdelmadjid Bouabdallah Yacine Challal

We propose in this paper a new highly scalable key management scheme for WSN. We make use, for the first time, of the unital design theory for key pre-distribution in WSN. We propose a naive mapping from unitals to key pre-distribution as well as an enhanced unital-based key management scheme. We analyze our solution and compare it to basic approaches; results show that our scheme enhances cons...

2005
Mahalingam Ramkumar

Broadcast encryption (BE) deals with the problem of establishing a secret, shared by g = G − r privileged nodes, among a set G nodes. Specifically, a set of r revoked nodes are denied access to the secret. Many schemes to address this problem, based on key pre-distribution schemes (KPS), have been proposed in the literature. Most state-ofthe-art methods employ tree-based techniques. However, ra...

2006
Debbie Leung Jonathan Oppenheim

Karol Horodecki, Micha l Horodecki, Pawe l Horodecki, Debbie Leung, Jonathan Oppenheim Department of Mathematics, Physics and Computer Science, University of Gdańsk, 80–952 Gdańsk, Poland Faculty of Applied Physics and Mathematics, Technical University of Gdańsk, 80–952 Gdańsk, Poland Institute for Quantum Computing, University of Waterloo, Waterloo, Ontario, N2L1N8, Canada and Department of Ap...

2009
Stefano Pirandola Samuel L. Braunstein Seth Lloyd

We consider the notion of canonical attacks, which are the cryptographic analog of the canonical forms of a one-mode Gaussian channel. Using this notion, we explore the connections between the degradability properties of the channel and its security for quantum key distribution. Finally, we also show some relations between canonical attacks and optimal Gaussian cloners.

2005
V. Karimipour

Reply to Comments on " Quantum Key Distribution for d-level systems for generalized Bell states " [Phys. Rev. A, 052331, (2002)] and " Quantum secret sharing based on a reusable Greenberger-Horne-Zeilinger states as secure carriers " [Phys. Abstract We show that the criticisms of two recent comments [1, 2] on the insecurity of quantum key distributions proposed in [3] and [4] and the secret sha...

2005
Renato Renner

Der sicheren Übertragung und Aufbewahrung vertraulicher Daten kommt in unserer von Information dominierten Gesellschaft immer grössere Bedeutung zu. Die heute gebräuchlichen Verfahren zur Datenverschlüsselung bieten allerdings nur berschränkte, so-genannt berechenmässige, Sicherheit. Das bedeutet, dass diese prinzipiell von einem Angreifer, der über genügend Rechenleistung (zum Beispiel einen, ...

Journal: :Quantum Information & Computation 2008
Guilherme Penello Temporão Hugo Zbinden Sebastien Tanzilli Nicolas Gisin Thierry Aellen Marcella Giovannini Jerome Faist Jean Pierre von der Weid

We report on a feasibility study of a free-space Quantum Key Distribution setup operating at a mid-infrared wavelength. Alice sends polarization-coded pseudo-single photons from a Quantum Cascade Laser at 4.6 μm to Bob, who uses a nonlinear crystal and a Silicon Avalanche Photodiode to perform the detection via Sum Frequency Generation. Theoretical predictions, based on a proof-of-principle exp...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید