Results 1 - 10
of
411
Tittel, Practical aspects of Quantum cryptographic key distribution
- J. Cryptol
"... Abstract. Performance of various experimental realizations of quantum cryptographic protocols using polarization or phase coding are compared, including a new self-balanced interferometric setup using Faraday mirrors. The importance of detector noise is illustrated and means of reducing it are pres ..."
Abstract
-
Cited by 7 (1 self)
- Add to MetaCart
Abstract. Performance of various experimental realizations of quantum cryptographic protocols using polarization or phase coding are compared, including a new self-balanced interferometric setup using Faraday mirrors. The importance of detector noise is illustrated and means of reducing
QUANTUM CRYPTOGRAPHIC PROTOCOLS FOR SECURE COMMUNICATION
, 2009
"... Abstract: Quantum Cryptography offers a secure method of sharing sequences of random numbers to be used as cryptographic keys. It can potentially eliminate many of the weaknesses of classical cryptographic methods. In this paper, we survey some results in quantum cryptography. After a brief introduc ..."
Abstract
- Add to MetaCart
Abstract: Quantum Cryptography offers a secure method of sharing sequences of random numbers to be used as cryptographic keys. It can potentially eliminate many of the weaknesses of classical cryptographic methods. In this paper, we survey some results in quantum cryptography. After a brief
Cryptographic Distinguishability Measures for Quantum-Mechanical States
- IEEE Trans. Inform. Theory 45. No
, 1999
"... This paper, mostly expository in nature, surveys four measures of distinguishability for quantum-mechanical states. This is done from the point of view of the cryptographer with a particular eye on applications in quantum cryptography. Each of the measures considered is rooted in an analogous classi ..."
Abstract
-
Cited by 18 (0 self)
- Add to MetaCart
This paper, mostly expository in nature, surveys four measures of distinguishability for quantum-mechanical states. This is done from the point of view of the cryptographer with a particular eye on applications in quantum cryptography. Each of the measures considered is rooted in an analogous
Quantum Cryptography and Quantum Key Distribution
"... Why Quantum Cryptography? As we have seen during the course, modern cryptography relies on the computational inability of an adversary to break an encryption scheme in polynomial time. While this is in general a strong enough assumption, it is not enough to guarantee the long-term security of an enc ..."
Abstract
- Add to MetaCart
by increasing the key size [4]. Figure 1: Short example of Alice and Bob sharing a key using QKD, such as in BB84 QKD up to the error estimation step Quantum Key Distribution One inter-esting possibility using quantum cryptog-raphy is quantum key distribution (QKD) which allows two parties (Alice and Bob
Cryptographic Key Generation based on Contextual Information: A Review
"... With the capabilities of computing increasing by leaps and bounds, the need for trusted communication also rises. The present state of ensuring secure communication between devices largely re-lies on the use of cryptographic keys. The primitive and ad-vanced key generation strategies involve the use ..."
Abstract
- Add to MetaCart
for this purpose. This pa-per presents a detailed survey on the cryptographic techniques for key generation based on contextual information. A brief compar-ison on the current techniques is also presented in this survey.
Purpose
"... This article reviews exposure information available for trichloroethylene (TCE) and assesses the magnitude of human exposure. The primary sources releasing TCE into the environment are metal cleaning and degreasing operations. Releases occur into all media but mostly into the air due to its volatili ..."
Abstract
- Add to MetaCart
using TCE products in areas of poor ventilation. More current and more extensive data on TCE levels in indoor air, water, and soil are needed to better characterize the distribution of background exposures in the general population and elevated exposures in special subpopulations. Key words: exposure
SECURITY USING QUANTUM KEY DISTRIBUTION PROTOCOLS (QKDPs)
"... Abstract — Most cryptographic mechanisms such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key distribution mechanism is weak. Quantum Key Distribution or Quantum Cryptography is attracting muc ..."
Abstract
- Add to MetaCart
Abstract — Most cryptographic mechanisms such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key distribution mechanism is weak. Quantum Key Distribution or Quantum Cryptography is attracting
New lattice based cryptographic constructions
- In Proceedings of the 35th ACM Symposium on Theory of Computing
, 2003
"... We introduce the use of Fourier analysis on lattices as an integral part of a lattice based construction. The tools we develop provide an elegant description of certain Gaussian distributions around lattice points. Our results include two cryptographic constructions that are based on the worst-case ..."
Abstract
-
Cited by 45 (6 self)
- Add to MetaCart
We introduce the use of Fourier analysis on lattices as an integral part of a lattice based construction. The tools we develop provide an elegant description of certain Gaussian distributions around lattice points. Our results include two cryptographic constructions that are based on the worst
Some attacks on quantum-based cryptographic protocols
- Quant. Inform. and Comp
, 2005
"... Quantum-based cryptographic protocols are often said to enjoy security guaranteed by the fundamental laws of physics. However, subtle attacks that are outside the original design of the protocols may allow eavesdroppers to break those protocols. As an example, we will give a peeking attack against a ..."
Abstract
-
Cited by 8 (0 self)
- Add to MetaCart
a quantum key distribution scheme based on quantum memory. Moreover, if technological assumptions are made in the design of a quantum-based cryptographic protocol, then the actual security of the protocol may fall short of expectations. This is because it is often hard to quantify those
Detector decoy quantum key distribution
, 811
"... Abstract. Photon number resolving detectors can enhance the performance of many practical quantum cryptographic setups. In this paper, we employ a simple method to estimate the statistics provided by such a photon number resolving detector using only a threshold detector together with a variable att ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
communication protocols, we use it to prove security of an entanglement based quantum key distribution scheme with an untrusted source without the need of a squash model and by solely using this extra idea. In this sense, this detector decoy method can be seen as a different conceptual approach to adapt a
Results 1 - 10
of
411