Secure Communication with a Publicly Known Key

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure communication with a publicly known key

We present a scheme for direct and confidential communication between Alice and Bob, where there is no need for establishing a shared secret key first, and where the key used by Alice even will become known publicly. The communication is based on the exchange of single photons and each and every photon transmits one bit of Alice’s message without revealing any information to a potential eavesdr...

متن کامل

N ov 2 00 1 Secure communication with a publicly known key

We present a scheme for direct and confidential communication between Alice and Bob, where there is no need for establishing a shared secret key first, and where the key used by Alice even will become known publicly. The communication is based on the exchange of single photons and each and every photon transmits one bit of Alice’s message without revealing any information to a potential eavesdr...

متن کامل

Key-Based Scrambling for Secure Image Communication

Secure image communication is becoming increasingly important due to theft and manipulation of its content. Law enforcement agents may find it increasingly difficult to stay afloat above the ill intentions of hackers. We have been able to develop an image scrambling algorithm that is very simple to implement but almost impossible to breach with a probability less than 5x10− 300. This is possibl...

متن کامل

Key Generation for Secure High Speed Communication

-A new key generation technique for high speed communication is presented. Starting with a short random sequence it generates a pseudo random sequence over {0,1} with good properties for a one time pad encryption. Since this generation is based on extremely simple boolean operations it allows for even higher data rates than standard symmetric crypto algorithms.

متن کامل

Quantum key distribution with high loss: toward global secure communication.

We propose a decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss: A legitimate user intentionally and randomly replaces signal pulses by multiphoton pulses (decoy pulses). Then they check the loss of the decoy pulses. If the loss of the decoy pulses is abnormally less than that of signal pulse...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Acta Physica Polonica A

سال: 2002

ISSN: 0587-4246,1898-794X

DOI: 10.12693/aphyspola.101.357