نتایج جستجو برای: random key distribution

تعداد نتایج: 1361267  

Journal: :CoRR 2017
E. O. Kiktenko N. O. Pozhar A. V. Duplinskiy A. A. Kanapin A. S. Sokolov S. S. Vorobey A. V. Miller V. E. Ustimchik M. N. Anufriev A. S. Trushechkin R. R. Yunusov V. L. Kurochkin Y. V. Kurochkin A. K. Fedorov

E.O. Kiktenko, 2, 3 N.O. Pozhar, 3 A.V. Duplinskiy, 4 A.A. Kanapin, 5 A.S. Sokolov, S.S. Vorobey, A.V. Miller, V.E. Ustimchik, M.N. Anufriev, 3 A.S. Trushechkin, R.R. Yunusov, V.L. Kurochkin, Y.V. Kurochkin, and A.K. Fedorov ∗ Russian Quantum Center, Skolkovo, Moscow 143025, Russia Steklov Mathematical Institute of Russian Academy of Sciences, Moscow 119991, Russia Bauman Moscow State Technical...

2000
Hitoshi Inamori

We propose a proof of the security of EPR-based quantum key distribution against enemies with unlimited computational power. The proof holds for a protocol using interactive error-reconciliation scheme. We assume in this paper that the legitimate parties receive a given number of single photon signals and that their measurement devices are perfect.

2007
Ya Cao An-Min Wang

Based on the controlled order rearrange encryption (CORE) for quantum key distribution using EPR pairs[Fu.G.Deng and G.L.Long Phys.Rev.A68 (2003) 042315], we propose the generalized controlled order rearrangement encryption (GCORE) protocols of N qubits and N qutrits, concretely display them in the cases using 3-qubit, 2-qutrit maximally entangled basis states. We further indicate that our prot...

Journal: :CoRR 2009
Catalin Anghel

Catch 22 of cryptography -"Before two parties can communicate in secret, they must first communicate in secret". The weakness of classical cryptographic communication systems is that secret communication can only take place after a key is communicated in secret over a totally secure communication channel. Here comes quantum key distribution which takes advantage of certain phenomena that occur ...

Journal: :CoRR 2007
Partha Basuchowdhuri

This paper compares the popular quantum key distribution (QKD) protocol BB84 with the more recent Kak’s three-stage protocol and the latter is shown to be more secure. A theoretical representation of an authentication-aided version of Kak’s threestage protocol is provided that makes it possible to deal with man-in-the-middle attack.

2008
S. Cova M. Ghioni I. Rech A. Gulinatti A. Giudice P. Maccagnani

The progress in silicon planar device technologies has led single-photon avalanche diodes (SPAD) to emerge from the laboratory research phase and be commercially available from various manufactures. QKD systems can already exploit the available planar Si-SPAD devices, but they set strong demand for improved features and performance. A response can be given by new developments in a dedicated sil...

Journal: :CoRR 2007
James Harold Thomas

This paper introduces a variation on Kak’s three-stage quanutm key distribution protocol which allows for defence against the man in the middle attack. In addition, we introduce a new protocol, which also offers similar resiliance against such an attack.

2009
Cristian Bonato Andrea Tomaello Vania Da Deppo Giapiero Naletto Paolo Villoresi

Terrestrial QKD channels can connect two links with a maximum distance of few hundred kilometres. In the case of fibre links, this is due to the signal attenuation in the fibre; in the case of free-space link the losses are due to atmospheric turbulence and absorption. Free-space optical terminals exploiting satellite-based relays are the only resource that can enable global scale quantum key d...

Journal: :CoRR 2012
Jonathan Barrett Roger Colbeck Adrian Kent

Jonathan Barrett, ∗ Roger Colbeck, † and Adrian Kent 4, ‡ Royal Holloway, University of London, Egham Hill, Egham TW20 0EX, U.K. Institute for Theoretical Physics, ETH Zurich, 8093 Zurich, Switzerland. Centre for Quantum Information and Foundations, DAMTP, Centre for Mathematical Sciences, University of Cambridge, Wilberforce Road, Cambridge, CB3 0WA, U.K. Perimeter Institute for Theoretical Ph...

2001
T. C. Ralph

We discuss a quantum key distribution scheme in which small phase and amplitude modulations of quantum limited, CW light beams carry the key information. We identify universal constraints on the level of shared information between the intended receiver (Bob) and any eavesdropper (Eve) and use this to make a general evaluation of the security and efficiency of the scheme.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید