نتایج جستجو برای: eavesdropper attack
تعداد نتایج: 81837 فیلتر نتایج به سال:
Security of Bennett–Brassard 1984 Quantum-Key Distribution under a Collective-Rotation Noise Channel
The security analysis of the Ekert 1991 (E91), Bennett 1992 (B92), six-state protocol, Scarani–Acín–Ribordy–Gisin 2004 (SARG04) quantum key distribution (QKD) protocols, and their variants have been studied in presence collective-rotation noise channels. However, besides Bennett–Brassard 1984 (BB84) being first proposed, extensively studied, essential its proof under is still missing. Thus, we ...
Steganography is the science of hiding and communicating a secret message by embedding it in an innocent looking text such that eavesdropper unaware its existence. Previously, attempts were made to establish steganography using quantum key distribution (QKD). Recently, has been shown protocols are vulnerable certain steganalysis attack can detect presence hidden suppress entire communication. I...
We consider remote state estimation in the presence of an active eavesdropper. A sensor forward local estimates to a estimator over network, which may be eavesdropped by intelligent adversary. Aiming at improving eavesdropping performance efficiently, adversary adaptively alternate between and mode. In contrast eavesdropping, attack enables sabotage data transfer estimator, improve reception it...
It is natural in a quantum network system that multiple users intend to send their message respective receivers, which called unicast network. We propose canonical method derive secure code over from classical code. Our correctly transmits states when there no attack. also guarantees the secrecy of transmitted state even with existence an attack satisfies certain condition. In our security proo...
The past years have seen many attempts to construct identity based signature schemes on a single hard problem, like factoring or discrete logarithms. But in the near future, those systems will no longer be secure if the solution of factoring or discrete logarithms problems is discovered. In this paper, we propose a new identification based signature scheme on factoring (FAC) problem and discret...
Website fingerprinting enables a local eavesdropper to determine which websites a user is visiting over an encrypted connection. State-of-the-art website fingerprinting attacks have been shown to be effective even against Tor. Recently, lightweight website fingerprinting defenses for Tor have been proposed that substantially degrade existing attacks: WTF-PAD and Walkie-Talkie. In this work, we ...
In this paper, three quantum key distribution protocols will be presented. The first protocol considered is the Ekert protocol for qubit systems based on the famous Einstein-Podolsky-Rosen experiment, and using the Bell inequality as a test of channel security. The Ekert protocol will then be extended to a qutrit system for our second protocol. Finally, a protocol based on mutually complementar...
Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality it significantly relies on the physical implementation. Technological imperfections of QKD systems have been previously explored, but no attack on an established QKD connection has been realized so far. Here we show the first full-f...
The majority of current anonymous systems focus on improving anonymity at the network and website level in order to defend against traffic analysis attacks. However, the vulnerability of the connections between end users and the anonymous network do not attract any attention yet. For the first time, we reveal an end user browsing dynamics based attack on anonymous browsing systems at the LAN wh...
We present a real one-time-pad key communication protocol that allows the secure direct communication. With the quantum nonlocality, Alice and Bob (the communicators) can send message to each other in a deterministic manner by using local operations and a reliable public channel. The security of this protocol is based on the ‘High fidelity implies low entropy’. Actually, the eavesdropper-Eve ca...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید