Secure communication with a publicly known key

نویسندگان

  • Almut Beige
  • Berthold-Georg Englert
  • Christian Kurtsiefer
  • Harald Weinfurter
چکیده

We present a scheme for direct and confidential communication between Alice and Bob, where there is no need for establishing a shared secret key first, and where the key used by Alice even will become known publicly. The communication is based on the exchange of single photons and each and every photon transmits one bit of Alice’s message without revealing any information to a potential eavesdropper. PACS: 03.67.Dd, 42.79.Sz

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

N ov 2 00 1 Secure communication with a publicly known key

We present a scheme for direct and confidential communication between Alice and Bob, where there is no need for establishing a shared secret key first, and where the key used by Alice even will become known publicly. The communication is based on the exchange of single photons and each and every photon transmits one bit of Alice’s message without revealing any information to a potential eavesdr...

متن کامل

Linux Based Implementation of MACSec Key Agreement ( MKA )

–IEEE 802.1AE and IEEE 802.1AF are two IEEE 802.1X standards providing security to the data link layer. The IEEE 802.1AE is the IEEE MAC Security standard (also known as MACSec), it defines data confidentiality and integrity for media access independent protocols but lacks in providing key management and the establishment of secure associations. IEEE 802.1AF MACSec Key Agreement will facilitate...

متن کامل

Enhanced secure key exchange systems based on the Johnson-noise scheme

We introduce seven new versions of the Kirchhoff-Law-Johnson-(like)-Noise (KLJN) classical physical secure key exchange scheme. While these practical improvements offer progressively enhanced security and/or speed for the non-ideal conditions, the fundamental physical laws providing the security remain the same. In the "intelligent" KLJN (iKLJN) scheme, Alice and Bob utilize the fact that they ...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008