نتایج جستجو برای: eavesdropper attack

تعداد نتایج: 81837  

Journal: :Photonics 2022

The security analysis of the Ekert 1991 (E91), Bennett 1992 (B92), six-state protocol, Scarani–Acín–Ribordy–Gisin 2004 (SARG04) quantum key distribution (QKD) protocols, and their variants have been studied in presence collective-rotation noise channels. However, besides Bennett–Brassard 1984 (BB84) being first proposed, extensively studied, essential its proof under is still missing. Thus, we ...

Journal: :Quantum Information Processing 2022

Steganography is the science of hiding and communicating a secret message by embedding it in an innocent looking text such that eavesdropper unaware its existence. Previously, attempts were made to establish steganography using quantum key distribution (QKD). Recently, has been shown protocols are vulnerable certain steganalysis attack can detect presence hidden suppress entire communication. I...

Journal: :IEEE Transactions on Automatic Control 2021

We consider remote state estimation in the presence of an active eavesdropper. A sensor forward local estimates to a estimator over network, which may be eavesdropped by intelligent adversary. Aiming at improving eavesdropping performance efficiently, adversary adaptively alternate between and mode. In contrast eavesdropping, attack enables sabotage data transfer estimator, improve reception it...

Journal: :IEEE Transactions on Information Theory 2021

It is natural in a quantum network system that multiple users intend to send their message respective receivers, which called unicast network. We propose canonical method derive secure code over from classical code. Our correctly transmits states when there no attack. also guarantees the secrecy of transmitted state even with existence an attack satisfies certain condition. In our security proo...

2011
Nedal Tahat Zead Mustafa A. K. Alomari

The past years have seen many attempts to construct identity based signature schemes on a single hard problem, like factoring or discrete logarithms. But in the near future, those systems will no longer be secure if the solution of factoring or discrete logarithms problems is discovered. In this paper, we propose a new identification based signature scheme on factoring (FAC) problem and discret...

Journal: :CoRR 2018
Payap Sirinam Mohsen Imani Marc Juárez Matthew Wright

Website fingerprinting enables a local eavesdropper to determine which websites a user is visiting over an encrypted connection. State-of-the-art website fingerprinting attacks have been shown to be effective even against Tor. Recently, lightweight website fingerprinting defenses for Tor have been proposed that substantially degrade existing attacks: WTF-PAD and Walkie-Talkie. In this work, we ...

2003

In this paper, three quantum key distribution protocols will be presented. The first protocol considered is the Ekert protocol for qubit systems based on the famous Einstein-Podolsky-Rosen experiment, and using the Bell inequality as a test of channel security. The Ekert protocol will then be extended to a qutrit system for our second protocol. Finally, a protocol based on mutually complementar...

Journal: :Nature communications 2011
Ilja Gerhardt Qin Liu Antía Lamas-Linares Johannes Skaar Christian Kurtsiefer Vadim Makarov

Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality it significantly relies on the physical implementation. Technological imperfections of QKD systems have been previously explored, but no attack on an established QKD connection has been realized so far. Here we show the first full-f...

Journal: :Comput. J. 2012
Shui Yu Wanlei Zhou Weijia Jia Jiankun Hu

The majority of current anonymous systems focus on improving anonymity at the network and website level in order to defend against traffic analysis attacks. However, the vulnerability of the connections between end users and the anonymous network do not attract any attention yet. For the first time, we reveal an end user browsing dynamics based attack on anonymous browsing systems at the LAN wh...

2004
Qing-yu Cai

We present a real one-time-pad key communication protocol that allows the secure direct communication. With the quantum nonlocality, Alice and Bob (the communicators) can send message to each other in a deterministic manner by using local operations and a reliable public channel. The security of this protocol is based on the ‘High fidelity implies low entropy’. Actually, the eavesdropper-Eve ca...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید