نتایج جستجو برای: eavesdropper attack

تعداد نتایج: 81837  

Journal: :Quantum Information & Computation 2007
Hoi-Kwong Lo John Preskill

We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the key information is encoded in the relative phase of a coherent-state reference pulse and a weak coherent-state signal pulse, as in some practical implementations of the protocol. In contrast to previous work, our proof applies even if the eavesdropper knows the phase of the reference pul...

2017
Guilherme Oliveira Samuel Mafra Evelio Fernández

Eavesdropping is a major concern in Cognitive Radio relay systems, due to the broadcast nature of these systems. Physical Layer Security (PLS) has been seen as a good alternative to enhance the secrecy performance of these networks. Based on the concept of perfect secrecy, PLS uses an information-theoretic approach to prevent secondary transmissions from malicious attacks. In this paper, the Se...

2009
Yongdong Wu Feng Bao

The security of content distribution is a critical issue that all the content providers have to treat seriously in order to guarantee their business. Emmanuel and Kankanhalli proposed an efficient videobroadcast scheme in [1] which is able to distribute video to many subscribers by multicasting one video copy only. The scheme is also designed to achieve the security such that the illegal distri...

Journal: :Information Sciences 2022

A multi-party quantum key distribution protocol based on repetitive code is designed in this paper for the first time. First we encode classical sequence accordance with code. Then unitary transformation of state corresponding to encoded carried out by using parameters from (t, n) threshold protocol. Furthermore, derive two thresholds whether or not reserving measured values received sequence, ...

Journal: :IEEE Systems Journal 2021

With the evolution of wireless communication networks (WCNs), absolute fulfillment security occupies fundamental concern. In view security, we have identified another research direction based on attenuation impact rain in WCN. An approach is initiated by an eavesdropper which a secure environment degraded generating artificial (AR), creates abatement secrecy rate, and cybersecurity gets comprom...

Journal: :Entropy 2017
Chao Qi Yanling Chen A. J. Han Vinck

In this paper, we investigate the effect of output quantization on the secrecy capacity of the binary-input Gaussian wiretap channel. As a result, a closed-form expression with infinite summation terms of the secrecy capacity of the binary-input Gaussian wiretap channel is derived for the case when both the legitimate receiver and the eavesdropper have unquantized outputs. In particular, comput...

2011
Paolo Falcarin

A COMPUTER SYSTEM’S security can be compromised in many ways— a denial-of-service attack can make a server inoperable, a worm can destroy a user’s private data, or an eavesdropper can reap fi nancial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack. What all these scenarios have in common is that the adversary is an...

Journal: :CoRR 2013
Amitav Mukherjee A. Lee Swindlehurst

The classic MIMO wiretap channel comprises a passive eavesdropper that attempts to intercept communications between an authorized transmitter-receiver pair, each node being equipped with multiple antennas. In a dynamic network, it is imperative that the presence of an eavesdropper be determined before the transmitter can deploy robust secrecyencoding schemes as a countermeasure. This is a diffi...

2008
Laszlo B. Kish Olivier Saidi

In the case of the need of extraordinary security, Kirchhoff-loop-Johnson-(like)-noise ciphers can easily be integrated on existing types of digital chips in order to provide secure data communication between hardware processors, memory chips, hard disks and other units within a computer or other data processor system. The secure key exchange can take place at the very first run and the system ...

2013
Paul Jouguet

This thesis focuses on a cryptographic primitive that allows two distant parties, usually called Alice and Bob, to generate an arbitrary amount of secret key even in the presence of an eavesdropper, provided that they share a short initial secret message. This primitive is called quantum key distribution, or in short QKD; and differs from classical key distribution primitives in the sense that ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید