Results 1  10
of
251
Experimental Quantum Cryptography
 Journal of Cryptology
, 1992
"... We describe results from an apparatus and protocol designed to implement quantum key distribution, by which two users, who share no secret information initially: 1) exchange a random quantum transmission, consisting of very faint flashes of polarized light; 2) by subsequent public discussion of the ..."
Abstract

Cited by 266 (20 self)
 Add to MetaCart
We describe results from an apparatus and protocol designed to implement quantum key distribution, by which two users, who share no secret information initially: 1) exchange a random quantum transmission, consisting of very faint flashes of polarized light; 2) by subsequent public discussion
Quantum Cryptography: A Survey
, 2005
"... We survey some results in quantum cryptography. After a brief introduction to classical cryptography, we provide the physical and mathematical background needed and present some fundamental protocols from quantum cryptography, including quantum key distribution and quantum bit commitment protocols. ..."
Abstract
 Add to MetaCart
We survey some results in quantum cryptography. After a brief introduction to classical cryptography, we provide the physical and mathematical background needed and present some fundamental protocols from quantum cryptography, including quantum key distribution and quantum bit commitment protocols
Quantum Cryptography: A Survey
, 2005
"... We survey some results in quantum cryptography. After a brief introduction to classical cryptography, we provide the quantummechanical background needed to present some fundamental protocols from quantum cryptography. In particular, we review quantum key distribution via the BB84 protocol and its s ..."
Abstract
 Add to MetaCart
We survey some results in quantum cryptography. After a brief introduction to classical cryptography, we provide the quantummechanical background needed to present some fundamental protocols from quantum cryptography. In particular, we review quantum key distribution via the BB84 protocol and its
Quantum Cryptography and Quantum Key Distribution
"... Why Quantum Cryptography? As we have seen during the course, modern cryptography relies on the computational inability of an adversary to break an encryption scheme in polynomial time. While this is in general a strong enough assumption, it is not enough to guarantee the longterm security of an enc ..."
Abstract
 Add to MetaCart
by increasing the key size [4]. Figure 1: Short example of Alice and Bob sharing a key using QKD, such as in BB84 QKD up to the error estimation step Quantum Key Distribution One interesting possibility using quantum cryptography is quantum key distribution (QKD) which allows two parties (Alice and Bob
Quantum Cryptography or Quantum Key Distribution
, 2001
"... The technolgical possibilities of a realistic eavesdropper are discussed. Two eavesdropping strategies taking profit of multiphoton pulses in faint laser QKD are presented. We conclude that, as long as storage of Qubits is technically impossible, faint laser QKD is not limited by this security issue ..."
Abstract
 Add to MetaCart
The technolgical possibilities of a realistic eavesdropper are discussed. Two eavesdropping strategies taking profit of multiphoton pulses in faint laser QKD are presented. We conclude that, as long as storage of Qubits is technically impossible, faint laser QKD is not limited by this security
Quantum and Post Quantum Cryptography
"... Public key cryptography is widely used for signing contracts, electronic voting, encryption, and to secure transactions over the Internet. The discovery by Peter Shor, in 1994, of an efficient algorithm based on quantum mechanics for factoring large integers and computing discrete logarithms undermi ..."
Abstract
 Add to MetaCart
. In this paper, we provide a survey of quantum and post quantum cryptography. We review the principle of a quatum computer as well as Shor’s algorithm and quantum key distribution. Then, we review some cryptosystems undermined by Shor’s algorithm as well as some post quantum cryptosystems, that are believed
Quantum Cryptography
"... Abstract — For ages,mathematicians have searched for a system that would allow two people to exchangemessages in perfect privacy.Quantum cryptography wins to make data secure using fundamentalphysical principles such Heisenbers uncertainty principle and cloning theorem.probably its bestknown applica ..."
Abstract
 Add to MetaCart
application today is quantum key distribution,which allow two parties to protect theirsecret communication from prying eyes of an evesdropper.Transport layer security is designedto provide communication security over the internet.TLS use X.509 certi_cates and hence asymmetric cryptography to authenticate
Research Directions in Quantum Cryptography and Quantum Key Distribution
"... Abstract Quantum cryptography is an approach to securing communications by applying the phenomena of quantum physics. Quantum cryptography provides secure communication whose security depends only on the validity of quantum theory. Interesting characteristics of quantum mechanics includes the exist ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
Abstract Quantum cryptography is an approach to securing communications by applying the phenomena of quantum physics. Quantum cryptography provides secure communication whose security depends only on the validity of quantum theory. Interesting characteristics of quantum mechanics includes
Quantum Cryptography
, 2002
"... Classical digital cryptography is concerned with the problem of providing secure and secret communication over a medium which guarantees neither of these functions. This provision is achieved through the encryption of data at the sender, and the decryption of that cyphertext at the receiver (an encr ..."
Abstract
 Add to MetaCart
cryptography is looking to solve: the Key Distribution Problem. 2 The Quantum Perspective
1 Securing Key Distribution with Quantum Cryptography
, 2004
"... Quantum cryptography recently made headlines this year when European Union members announced their intention to invest $13 million in the research and development of a secure communications system based on this ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
Quantum cryptography recently made headlines this year when European Union members announced their intention to invest $13 million in the research and development of a secure communications system based on this
Results 1  10
of
251