A probabilistic quantum key transfer protocol
نویسندگان
چکیده
منابع مشابه
A probabilistic quantum key transfer protocol
We propose a protocol to transfer a one-time-pad (in a probabilistic manner) from Alice to Bob, over a public channel. The proposed protocol is unique because Bob merely acts as the receiver of the pad (secret key), i.e. Bob does not need to send any message back to Alice unless he detects eavesdropping. Such a secure transfer of one-time-pad, over public channel, is not possible in classical c...
متن کاملStochastic Transfer of a Classical Information Throught Quantum Channels Using the Quantum Probabilistic Telportation Protocol
Nonlocality of real world on the quantum level seems to be widely accepted fact today. Basing on this nonlocality several theoretic scenarios for teleporting a general quantum states are being presented, the simplest among them have been experimentally demonstrated as well. Although on the quantum level the information is transferred with superluminal speed the extraction of it onto the classic...
متن کاملA novel Group Key Transfer Protocol
Group key transfer protocols depend on a mutually trusted key generation center (KGC) to transport the group key to all group members secretly. This approach requires that a trusted sever be set up, and it incurs communication overhead costs. In addition, the existing group key transfer protocols based on secret sharing all use threshold schemes that need to compute a -degree interpolating poly...
متن کاملA simple quantum oblivious transfer protocol
A simple and efficient protocol for quantum oblivious transfer is proposed. The protocol can easily be implemented with present technology and is secure against cheaters with unlimited computing power provided the receiver does not have the technology to store the particles for an arbitrarily long period of time. The proposed protocol is a significant improvement over the previous protocols. Un...
متن کاملA Probabilistic Key Management Protocol based on Kryptograph for WSN
Security is a matter of extensive research interest with widespread deployment of WSN (Wireless Sensor Network) in various real life applications. Unreliable wireless communication, physically insecure locations and resource exhaustion attacks render sensor vulnerable to several security breaches. Sensors are supposed to operate on battery in hostile and unattended environment over a longer spa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2013
ISSN: 1939-0114
DOI: 10.1002/sec.736