Unconditional security at a low cost
نویسنده
چکیده
By simulating four quantum key distribution (QKD) experiments and analyzing one decoy-state QKD experiment, we compare two data post-processing schemes based on security against individual attack by Lütkenhaus, and unconditional security analysis by Gottesman-Lo-Lütkenhaus-Preskill. Our results show that these two schemes yield close performances. Since the Holy Grail of QKD is its unconditional security, we conclude that one is better off considering unconditional security, rather than restricting to individual attacks.
منابع مشابه
Evaluating the Satisfaction Rate of Low-Income Communities about Low-Cost Housing (Case Study: Abadeh Mehr Housing in Iran)
As cited in the constitution of the Islamic republic of Iran, it's one of the responsibilities of the government to provide appropriate housing for the people of Iran. The main aim of current study was to assess satisfaction rate of a Mehr housing residents in Fars province, southwest of Iran. Randomly selected heads of 100 households residents of Abadeh Mehr housing for at least 1 year were as...
متن کاملEfficient k-out-of-n oblivious transfer protocol
A new k-out-of-n oblivious transfer protocol is presented in this paper. The communication cost of our scheme are n+1 messages of sender to receiver and k messages from the receiver to sender. To the best knowledge of the authors, the communication complexity of our scheme is the least. Also, our scheme has a lower computation cost with (k+1)n modular exponentiations for sender and 3k modular e...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملAchieving computational and unconditional security in authentication watermarking: analysis, insights, and algorithms
This paper focuses on the analysis and enhancement of watermark-based security strategies for multimedia authentication. Based on an authentication game between a transmitter and its authorized receiver, and an opponent, security of authentication watermarking is measured by the opponent’s inability to launch a successful attack. In this work, we consider two traditional classes of security for...
متن کاملUnconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation.
We present a continuous-variable quantum key distribution protocol combining a discrete modulation and reverse reconciliation. This protocol is proven unconditionally secure and allows the distribution of secret keys over long distances, thanks to a reverse reconciliation scheme efficient at very low signal-to-noise ratio.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006