• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 4,477
Next 10 →

Analysis of Various Attacks over BB84 Quantum Key Distribution Protocol

by Rahul Aggarwal, Heeren Sharma, Deepak Gupta
"... Quantum Key Distribution (QKD) networks are the best application of quantum cryptography in which we use the principles of quantum mechanics with classical cryptographic techniques to provide the unconditional security. This paper discusses the various attack strategies over BB84 quantum key distrib ..."
Abstract - Add to MetaCart
Quantum Key Distribution (QKD) networks are the best application of quantum cryptography in which we use the principles of quantum mechanics with classical cryptographic techniques to provide the unconditional security. This paper discusses the various attack strategies over BB84 quantum key

A Method of Constructing CSS Codes with LDPC Codes for the BB84 Quantum Key Distribution Protocol

by unknown authors , 2007
"... Abstract—In this paper, we propose how to construct a pair of linear codes simply for the BB84 quantum key distribution protocol. This protocol allows unconditional security in the presence of an eavesdropper, and the pair of linear codes is used for error correction and privacy amplification. Since ..."
Abstract - Add to MetaCart
Abstract—In this paper, we propose how to construct a pair of linear codes simply for the BB84 quantum key distribution protocol. This protocol allows unconditional security in the presence of an eavesdropper, and the pair of linear codes is used for error correction and privacy amplification

Constructing CSS Codes with LDPC Codes for the BB84 Quantum Key Distribution Protocol

by Maki Ohata, Kanta Matsuura , 2007
"... Abstract—In this paper, we propose how to simply construct a pair of linear codes for the BB84 quantum key distribution protocol. This protocol allows unconditional security in the presence of an eavesdropper, and the pair of linear codes is used for error correction and privacy amplification. Since ..."
Abstract - Add to MetaCart
Abstract—In this paper, we propose how to simply construct a pair of linear codes for the BB84 quantum key distribution protocol. This protocol allows unconditional security in the presence of an eavesdropper, and the pair of linear codes is used for error correction and privacy amplification

Effects of preparation and measurement misalignments on the security of the BB84 quantum key distribution protocol

by Erik Woodhead, Stefano Pironio , 2013
"... The ideal Bennett-Brassard 1984 (BB84) quantum key distribution protocol is based on the preparation and measurement of qubits in two alternative bases differing by an angle of pi/2. Any real implementation of the protocol, though, will inevitably introduce misalignments in the preparation of the st ..."
Abstract - Add to MetaCart
The ideal Bennett-Brassard 1984 (BB84) quantum key distribution protocol is based on the preparation and measurement of qubits in two alternative bases differing by an angle of pi/2. Any real implementation of the protocol, though, will inevitably introduce misalignments in the preparation

Optimal Experimental Scheme for Practical BB84 Quantum Key Distribution Protocol with Weak Coherent Sources, Noisy and Lossy Channel

by Qing-yu Cai, State Key, Labatory Magnetic Resonces, Molecular Physics , 2005
"... It is the first scheme which allows the detection apparatus to achieve the photon number of arriving signals. Moreover, quantum bit error rates (QBERs) of multiphoton pulses can also be achieved precisely. Thus, our method is sensitive to the photon number splitting and resending (PNSR) attack, i.e. ..."
Abstract - Add to MetaCart
pulses detection apparatus, a quasi-single-photon protocol is presented to improve the security of the communication and the rate of the final key. We analyze that our scheme is optimal under today’s technology. Quantum key distribution (QKD) is a physically secure method, by which private key can

QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES

by Yoshito Kanamori, Seong-moo Yoo
"... This letter proposes a novel key distribution protocol with no key exchange in advance, which is secure as the BB84 quantum key distribution protocol. Our protocol utilizes a photon in superposition state for single-bit data transmission instead of a classical electrical/optical signal. The security ..."
Abstract - Add to MetaCart
This letter proposes a novel key distribution protocol with no key exchange in advance, which is secure as the BB84 quantum key distribution protocol. Our protocol utilizes a photon in superposition state for single-bit data transmission instead of a classical electrical/optical signal

Unconditional Security of Practical Quantum Key Distribution

by H. J. Hupkes , 2004
"... We present an extension of the first proof for the unconditional security of the BB84 quantum key distribution protocol which was given by Mayers. We remove the constraint that a perfect BB84 quantum source is required and the proof given here covers a range of practical quantum sources. Nothing is ..."
Abstract - Add to MetaCart
We present an extension of the first proof for the unconditional security of the BB84 quantum key distribution protocol which was given by Mayers. We remove the constraint that a perfect BB84 quantum source is required and the proof given here covers a range of practical quantum sources. Nothing

Key Rate Available from Mismatched Mesurements in the BB84 Protocol and the Uncertainty Principle

by Ryutaroh MATSUMOTO , Shun WATANABE , 2008
"... We consider the mismatched measurements in the BB84 quantum key distribution protocol, in which measuring bases are different from transmitting bases. We give a lower bound on the amount of a secret key that can be extracted from the mismatched measurements. Our lower bound shows that we can extrac ..."
Abstract - Add to MetaCart
We consider the mismatched measurements in the BB84 quantum key distribution protocol, in which measuring bases are different from transmitting bases. We give a lower bound on the amount of a secret key that can be extracted from the mismatched measurements. Our lower bound shows that we can

Reliability of Calderbank-Shor-Steane Codes and Security of Quantum Key Distribution

by Mitsuru Hamada , 2003
"... After Mayers (1996, 2001) gave a proof of the security of the Bennett-Brassard 1984 (BB84) quantum key distribution protocol, Shor and Preskill (2000) made a remarkable observation that a Calderbank-Shor-Steane (CSS) code had been implicitly used in the BB84 protocol and its security could be proven ..."
Abstract - Add to MetaCart
After Mayers (1996, 2001) gave a proof of the security of the Bennett-Brassard 1984 (BB84) quantum key distribution protocol, Shor and Preskill (2000) made a remarkable observation that a Calderbank-Shor-Steane (CSS) code had been implicitly used in the BB84 protocol and its security could

Eavesdropping or Disrupting a Communication — On the Weakness of Quantum Communications

by Zhengjun Cao
"... What is the behavior of an adversary to launch attacks against a communication? The good choice is to eavesdrop the communication such that the communicators can not detect the eavesdropping. The general choice is to disrupt the communication at low cost, say, measuring the transferred quantum signa ..."
Abstract - Add to MetaCart
signals in the well-known BB84 quantum key distribution protocol. The bad choice is to disrupt it at even high cost, such as severing copper or fiber, if it is necessary. In this note we remark that a quantum communication is very vulnerable to low cost attacks. The plan to build a large quantum photonic
Next 10 →
Results 1 - 10 of 4,477
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University