• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 25
Next 10 →

Secure Ballots Using Quantum Cryptography

by Lester Houston Iii
"... Quantum cryptography is an emerging technology in the field of cryptographic systems where quantum mechanics is used to guarantee secure communication between two parties. In simple terms, quantum cryptography uses the principles of quantum mechanics to provide communication between two parties wher ..."
Abstract - Add to MetaCart
, the principles that make quantum cryptography secure and the quantum key distribution protocols used to perform quantum key distribution. This paper will also discuss the flaws of quantum cryptographic systems along with the plans for enhancing current quantum cryptographic systems.

Security aspects of practical quantum cryptography

by Gilles Brassard, Norbert Lütkenhaus, Tal Mor, Barry C. Sanders - In Advances in Cryptology— EUROCRYPT2000 (2000
"... Abstract. The use of quantum bits (qubits) in cryptography holds the promise of secure cryptographic quantum key distribution schemes. Unfortunately, the implemented schemes are often operated in a regime which excludes unconditional security. We provide a thorough investigation of security issues f ..."
Abstract - Cited by 11 (1 self) - Add to MetaCart
Abstract. The use of quantum bits (qubits) in cryptography holds the promise of secure cryptographic quantum key distribution schemes. Unfortunately, the implemented schemes are often operated in a regime which excludes unconditional security. We provide a thorough investigation of security issues

DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY.

by Ajit Singh, Nidhi Sharma
"... Nowadays security in communication is increasingly important to the network communication because many categories of data are required restriction on authorization of access, modify, delete and insert. Quantum cryptography is one of the solutions that use property of polarization to ensure that tran ..."
Abstract - Add to MetaCart
that transmitted data is not tampered. The research paper provides the mechanism that enhances the data security in quantum cryptography during exchange of information. In first phase detailed explanation of Quantum key distribution’s BB84 protocol is given. BB84 protocol is used as the basis for the mechanism

Quantum Cryptography Verification

by Rambabu Saini, Shavita Shiwani
"... Today secure communications is increasingly more important to the intended communicators without being intercepted by eavesdroppers. Quantum cryptography promises to revolutionize ze secure communication which solves the key distribution problem in cryptographic system by providing a secure communic ..."
Abstract - Add to MetaCart
communication channel between two parties with high security guaranteed by the fundamental lows of the physics. Quantum cryptography provides the solution that uses property of polarization to ensure that transmitted data is not disturbed. Basic protocols for QKD provide maximum 25 % (B92 protocol) and 50 % (BB

Enhancement of Network Security Techniques using Quantum Cryptography 1

by Navleen Kaur, Sarabpreet Singh
"... Abstract—Quantum cryptography uses the law of quantum physics for unconditionally secure data communications. This is a main achievement because the cryptography currently in use, known as conventional cryptography, relies completely on the hardness of a mathematical equation. The advances in quantu ..."
Abstract - Add to MetaCart
Abstract—Quantum cryptography uses the law of quantum physics for unconditionally secure data communications. This is a main achievement because the cryptography currently in use, known as conventional cryptography, relies completely on the hardness of a mathematical equation. The advances

Current Refuge Trends using Classical and Quantum Cryptography

by Rohit Kumar, Samudra Gupt Maurya, Ritika Chugh, P. V. Manoj
"... Abstract: Cryptography is the knowledge of keeping private information from unofficial access of ensuring data integrity and endorsement, and it is the strongest tool for scheming against much category of security threats. Role of cryptography appears in several secured area like government agencies ..."
Abstract - Add to MetaCart
agencies, large banks, telecommunications companies and additional corporations who handle sensitive or military data. Quantum cryptography is a capable technology in which two revelries may simultaneously generate mutual, secret cryptographic key material expending the transmission of quantum states

A Survey on Recent Security Trends using Quantum Cryptography

by T. Rubya, N. Prema Latha, B. Sangeetha
"... Abstract: Cryptography is the science of keeping private information from unauthorized access of ensuring data integrity and authentication, and it is the strongest tool for controlling against much kind of security threats. Role of cryptography appears in many secured area like government agencies, ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
, large banks, telecommunications companies and other corporations who handle sensitive or military data. Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. This paper

Using Quantum Key Distribution within IPSEC to secure MAN communications

by M. A. Sfaxi, S. Ghernaouti-hélie, G. Ribordy, O. Gay - In MAN 2005 conference , 2005
"... ABSTRACT. Quantum cryptography could be integrated in various existing concepts and protocols to secure Metropolitan Area Networks communications. One of the possible use of quantum cryptography is within IPSEC. The applications of quantum cryptography are linked to telecommunication services that r ..."
Abstract - Cited by 11 (0 self) - Add to MetaCart
ABSTRACT. Quantum cryptography could be integrated in various existing concepts and protocols to secure Metropolitan Area Networks communications. One of the possible use of quantum cryptography is within IPSEC. The applications of quantum cryptography are linked to telecommunication services

Direct Use of Secret Key in Quantum Cryptography

by Horace P. Yuen
"... For single-photon quantum key generation between two users, it is shown that for collective attacks the use of a shared secret key extended via a pseudo-random number generator may simultaneously enhance the security and efficiency of the cryptosystem. This effect arises from the intrinsic performan ..."
Abstract - Cited by 3 (2 self) - Add to MetaCart
For single-photon quantum key generation between two users, it is shown that for collective attacks the use of a shared secret key extended via a pseudo-random number generator may simultaneously enhance the security and efficiency of the cryptosystem. This effect arises from the intrinsic

Three Party Authenticated Key Distribution using Quantum Cryptography

by V. Padmaja, Sayeed Yasin
"... ABSTRACT: Cryptography is the science of writing in secret message and is an ancient art. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly over the Internet. Over the last two decades an intere ..."
Abstract - Add to MetaCart
, the security of the quantum cryptography is ensured by laws of Quantum Physics. In this paper, we present a method for three party authentication using quantum cryptography. Our method depends on partial trusted third party, so that the key is not revealed to the trusted third party.
Next 10 →
Results 1 - 10 of 25
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University