Results 1 - 10
of
25
Secure Ballots Using Quantum Cryptography
"... Quantum cryptography is an emerging technology in the field of cryptographic systems where quantum mechanics is used to guarantee secure communication between two parties. In simple terms, quantum cryptography uses the principles of quantum mechanics to provide communication between two parties wher ..."
Abstract
- Add to MetaCart
, the principles that make quantum cryptography secure and the quantum key distribution protocols used to perform quantum key distribution. This paper will also discuss the flaws of quantum cryptographic systems along with the plans for enhancing current quantum cryptographic systems.
Security aspects of practical quantum cryptography
- In Advances in Cryptology— EUROCRYPT2000 (2000
"... Abstract. The use of quantum bits (qubits) in cryptography holds the promise of secure cryptographic quantum key distribution schemes. Unfortunately, the implemented schemes are often operated in a regime which excludes unconditional security. We provide a thorough investigation of security issues f ..."
Abstract
-
Cited by 11 (1 self)
- Add to MetaCart
Abstract. The use of quantum bits (qubits) in cryptography holds the promise of secure cryptographic quantum key distribution schemes. Unfortunately, the implemented schemes are often operated in a regime which excludes unconditional security. We provide a thorough investigation of security issues
DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY.
"... Nowadays security in communication is increasingly important to the network communication because many categories of data are required restriction on authorization of access, modify, delete and insert. Quantum cryptography is one of the solutions that use property of polarization to ensure that tran ..."
Abstract
- Add to MetaCart
that transmitted data is not tampered. The research paper provides the mechanism that enhances the data security in quantum cryptography during exchange of information. In first phase detailed explanation of Quantum key distribution’s BB84 protocol is given. BB84 protocol is used as the basis for the mechanism
Quantum Cryptography Verification
"... Today secure communications is increasingly more important to the intended communicators without being intercepted by eavesdroppers. Quantum cryptography promises to revolutionize ze secure communication which solves the key distribution problem in cryptographic system by providing a secure communic ..."
Abstract
- Add to MetaCart
communication channel between two parties with high security guaranteed by the fundamental lows of the physics. Quantum cryptography provides the solution that uses property of polarization to ensure that transmitted data is not disturbed. Basic protocols for QKD provide maximum 25 % (B92 protocol) and 50 % (BB
Enhancement of Network Security Techniques using Quantum Cryptography 1
"... Abstract—Quantum cryptography uses the law of quantum physics for unconditionally secure data communications. This is a main achievement because the cryptography currently in use, known as conventional cryptography, relies completely on the hardness of a mathematical equation. The advances in quantu ..."
Abstract
- Add to MetaCart
Abstract—Quantum cryptography uses the law of quantum physics for unconditionally secure data communications. This is a main achievement because the cryptography currently in use, known as conventional cryptography, relies completely on the hardness of a mathematical equation. The advances
Current Refuge Trends using Classical and Quantum Cryptography
"... Abstract: Cryptography is the knowledge of keeping private information from unofficial access of ensuring data integrity and endorsement, and it is the strongest tool for scheming against much category of security threats. Role of cryptography appears in several secured area like government agencies ..."
Abstract
- Add to MetaCart
agencies, large banks, telecommunications companies and additional corporations who handle sensitive or military data. Quantum cryptography is a capable technology in which two revelries may simultaneously generate mutual, secret cryptographic key material expending the transmission of quantum states
A Survey on Recent Security Trends using Quantum Cryptography
"... Abstract: Cryptography is the science of keeping private information from unauthorized access of ensuring data integrity and authentication, and it is the strongest tool for controlling against much kind of security threats. Role of cryptography appears in many secured area like government agencies, ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
, large banks, telecommunications companies and other corporations who handle sensitive or military data. Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. This paper
Using Quantum Key Distribution within IPSEC to secure MAN communications
- In MAN 2005 conference
, 2005
"... ABSTRACT. Quantum cryptography could be integrated in various existing concepts and protocols to secure Metropolitan Area Networks communications. One of the possible use of quantum cryptography is within IPSEC. The applications of quantum cryptography are linked to telecommunication services that r ..."
Abstract
-
Cited by 11 (0 self)
- Add to MetaCart
ABSTRACT. Quantum cryptography could be integrated in various existing concepts and protocols to secure Metropolitan Area Networks communications. One of the possible use of quantum cryptography is within IPSEC. The applications of quantum cryptography are linked to telecommunication services
Direct Use of Secret Key in Quantum Cryptography
"... For single-photon quantum key generation between two users, it is shown that for collective attacks the use of a shared secret key extended via a pseudo-random number generator may simultaneously enhance the security and efficiency of the cryptosystem. This effect arises from the intrinsic performan ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
For single-photon quantum key generation between two users, it is shown that for collective attacks the use of a shared secret key extended via a pseudo-random number generator may simultaneously enhance the security and efficiency of the cryptosystem. This effect arises from the intrinsic
Three Party Authenticated Key Distribution using Quantum Cryptography
"... ABSTRACT: Cryptography is the science of writing in secret message and is an ancient art. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly over the Internet. Over the last two decades an intere ..."
Abstract
- Add to MetaCart
, the security of the quantum cryptography is ensured by laws of Quantum Physics. In this paper, we present a method for three party authentication using quantum cryptography. Our method depends on partial trusted third party, so that the key is not revealed to the trusted third party.
Results 1 - 10
of
25