CSO secret communication
نویسندگان
چکیده
منابع مشابه
Csk Based Secret Communication
The notion of non-linear dynamics has become an energetic and fashionable field of work that is having a thoughtful effect on a wide variety of topics in present day technology. One such evolution of non-linear dynamics is the chaos theory. It is not about disorder, rather is about very complicated systems of order. However, the point of interest lies in bridging the gap between random nature o...
متن کاملCommunication E cient Secret Sharing
A secret sharing scheme is a method to store information securely and reliably. Particularly, in the threshold secret sharing scheme (due to Shamir), a secret is divided into shares, encoded and distributed to parties, such that any large enough collection of parties can decode the secret, and a smaller (then threshold) set of parties cannot collude to deduce any information about the secret. W...
متن کاملCommunication Efficient Quantum Secret Sharing
Building upon the recent work in communication efficient classical secret sharing schemes of Bitar and El Rouayheb, we study communication efficient quantum secret sharing schemes. In the standard model of quantum secret sharing, typically one is interested in minimal authorized sets for the reconstruction of the secret. In such a setting, reconstruction requires the communication of all the sh...
متن کاملSecret quantum communication of a reference frame.
We propose quantum-cryptographic protocols to secretly communicate a reference frame--unspeakable information in the sense it cannot be encoded into a string of bits. Two distant parties can secretly align their Cartesian axes by exchanging N spin-1/2 particles, achieving the optimal accuracy 1/N. A possible eavesdropper cannot gain any information without being detected.
متن کاملMatryoshka: Hiding Secret Communication in Plain Sight
We want to enable a pair of communicating users to exchange secret messages while hiding the fact that secret communication is taking place. We propose a linguistic steganography approach, where each human message is hidden in another human-like message. A hard open question is how to keep the steganographic message small – existing related tools tend to blow up its size, thereby revealing the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics Letters
سال: 2019
ISSN: 0013-5194,1350-911X
DOI: 10.1049/el.2019.2847