Secure Communication with a Publicly Known Key
نویسندگان
چکیده
منابع مشابه
Secure communication with a publicly known key
We present a scheme for direct and confidential communication between Alice and Bob, where there is no need for establishing a shared secret key first, and where the key used by Alice even will become known publicly. The communication is based on the exchange of single photons and each and every photon transmits one bit of Alice’s message without revealing any information to a potential eavesdr...
متن کاملN ov 2 00 1 Secure communication with a publicly known key
We present a scheme for direct and confidential communication between Alice and Bob, where there is no need for establishing a shared secret key first, and where the key used by Alice even will become known publicly. The communication is based on the exchange of single photons and each and every photon transmits one bit of Alice’s message without revealing any information to a potential eavesdr...
متن کاملKey-Based Scrambling for Secure Image Communication
Secure image communication is becoming increasingly important due to theft and manipulation of its content. Law enforcement agents may find it increasingly difficult to stay afloat above the ill intentions of hackers. We have been able to develop an image scrambling algorithm that is very simple to implement but almost impossible to breach with a probability less than 5x10− 300. This is possibl...
متن کاملKey Generation for Secure High Speed Communication
-A new key generation technique for high speed communication is presented. Starting with a short random sequence it generates a pseudo random sequence over {0,1} with good properties for a one time pad encryption. Since this generation is based on extremely simple boolean operations it allows for even higher data rates than standard symmetric crypto algorithms.
متن کاملQuantum key distribution with high loss: toward global secure communication.
We propose a decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss: A legitimate user intentionally and randomly replaces signal pulses by multiphoton pulses (decoy pulses). Then they check the loss of the decoy pulses. If the loss of the decoy pulses is abnormally less than that of signal pulse...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Acta Physica Polonica A
سال: 2002
ISSN: 0587-4246,1898-794X
DOI: 10.12693/aphyspola.101.357