• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 211
Next 10 →

bb 2

by unknown authors , 2014
"... after BPP, while SK2 immunostaining shifted from a perinuclear pattern in sham atria to predominance at sites near or at the PV membrane. of the remodeling process (within hours) depend critically not only on rate but on site and pattern of ectopic activity [6]. In this study of isolated rabbit atri ..."
Abstract - Add to MetaCart
atria, we noted that a 3 h intermittent burst pacing protocol mimicking ectopic foci in pulmonary

1 Attacks of BB84 protocol in quantum cryptography

by Guihua Zeng, Xinmei Wang , 1998
"... An optimal eavesdropping strategy for BB84 protocol in quantum cryptography is proposed. This scheme is based on the ‘indirect copying’. Under this scheme, eavesdropper can exactly obtain the exchanged information between the legitimate users without being detected. ..."
Abstract - Add to MetaCart
An optimal eavesdropping strategy for BB84 protocol in quantum cryptography is proposed. This scheme is based on the ‘indirect copying’. Under this scheme, eavesdropper can exactly obtain the exchanged information between the legitimate users without being detected.

Noise Tolerance of the BB84 Protocol with Random Privacy Amplification

by Shun Watanabe, Ryutaroh Matsumoto, Tomohiko Uyematsu , 2008
"... We prove that BB84 protocol with random privacy amplification is secure with a higher key rate than Mayers’ estimate with the same error rate. Consequently, the tolerable error rate of this protocol is increased from 7.5 % to 11 %. We also extend this method to the case of estimating error rates sep ..."
Abstract - Cited by 10 (4 self) - Add to MetaCart
We prove that BB84 protocol with random privacy amplification is secure with a higher key rate than Mayers’ estimate with the same error rate. Consequently, the tolerable error rate of this protocol is increased from 7.5 % to 11 %. We also extend this method to the case of estimating error rates

Improved one-way rates for BB84 and 6-state protocols

by Oliver Kern, Joseph M. Renes , 712
"... Abstract. We study the advantages to be gained in quantum key distribution (QKD) protocols by combining the techniques of local randomization, or noisy preprocessing, and structured (nonrandom) block codes. Extending the results of [Smith, Renes, and Smolin, quant-ph/0607018] pertaining to BB84, we ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
Abstract. We study the advantages to be gained in quantum key distribution (QKD) protocols by combining the techniques of local randomization, or noisy preprocessing, and structured (nonrandom) block codes. Extending the results of [Smith, Renes, and Smolin, quant-ph/0607018] pertaining to BB84, we

Quantum Cryptography: On the Security of the BB84 Key-Exchange Protocol

by Thomas Baignères
"... Abstract. In 1984, C.H. Bennet and G. Brassard proposed a new protocol aimed to solve the problem of symmetric cryptographic key exchange. This protocol was called BB84 after the name of its authors. While a traditional method would rely on public key cryptography (like RSA), the BB84 protocol takes ..."
Abstract - Add to MetaCart
Abstract. In 1984, C.H. Bennet and G. Brassard proposed a new protocol aimed to solve the problem of symmetric cryptographic key exchange. This protocol was called BB84 after the name of its authors. While a traditional method would rely on public key cryptography (like RSA), the BB84 protocol

Revisiting Symmetric Incoherent Optimal Eavesdropping in BB84 Protocol

by Arpita Maitra, Goutam Paul
"... The famous BB84 protocol relies on the conjugate bases Z = {|0〉, |1〉} and and |− 〉 = |0〉−|1〉 √. Fuchs et. al. (Phy. Rev. A, 2 1997) presented an optimal eavesdropping strategy on the four-state BB84 protocol.} Later Bruß (Phys. Rev. Lett., 1998) described the use of the basis X = {|+〉,|−〉}, where | ..."
Abstract - Add to MetaCart
The famous BB84 protocol relies on the conjugate bases Z = {|0〉, |1〉} and and |− 〉 = |0〉−|1〉 √. Fuchs et. al. (Phy. Rev. A, 2 1997) presented an optimal eavesdropping strategy on the four-state BB84 protocol.} Later Bruß (Phys. Rev. Lett., 1998) described the use of the basis X = {|+〉,|−〉}, where

Analysis of Various Attacks over BB84 Quantum Key Distribution Protocol

by Rahul Aggarwal, Heeren Sharma, Deepak Gupta
"... Quantum Key Distribution (QKD) networks are the best application of quantum cryptography in which we use the principles of quantum mechanics with classical cryptographic techniques to provide the unconditional security. This paper discusses the various attack strategies over BB84 quantum key distrib ..."
Abstract - Add to MetaCart
Quantum Key Distribution (QKD) networks are the best application of quantum cryptography in which we use the principles of quantum mechanics with classical cryptographic techniques to provide the unconditional security. This paper discusses the various attack strategies over BB84 quantum key

Game Theory based View to the Quantum Key Distribution BB84 Protocol

by Mahboobeh Houshmand, Monireh Houshmand, Habib Rajabi Mashhadi
"... Abstract- Quantum key distribution uses quantum mechanics to guarantee secure communication. BB84 is a widely used quantum key distribution that provides a way for two parties, a sender, Alice, and a receiver, Bob, to share an unconditionally secure key in the presence of an eavesdropper, Eve. In a ..."
Abstract - Add to MetaCart
this model we show how game theory can be used to find the strategies for Alice, Bob and Eve. Keywords- BB84 protocol, static game theory, mixed strategy Nash equilibrium. I.

IMPLEMENTATION OF BB84 PROTOCOL ON UDP 802.11i

by Nur Hanani Kamarul Aizan, Zuriati Ahmad Zukarnain, Hishamuddin Zainuddin
"... Cryptography nowadays is looking for a secure and trusted channel especially in key distribution between two legitimate parties without being intercepted or decipher by intruders either in wireless or wired communication medium. The invention of Quantum Cryptography as part of quantum mechanics has ..."
Abstract - Add to MetaCart
. This paper will discuss the implementation of BB84 protocol in UDP 802.11i Wireless Local Area Network (WLAN). WLAN as a wireless links are much noisier and less reliable in general than wired links. This type of noise will generate different numbers of key length and also different level of error rate

Dim Coherent States As Signal States In The Bb84 Protocol: Is It Secure?

by Norbert Lütkenhaus
"... Practical realizations of quantum key distribution employ dim coherent states as an approximation to single photon states. The advantage is that dim coherent states are convenient to use. The draw-back is that the security proofs for quantum key distribution have to be adapted. Difficulties arising ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Practical realizations of quantum key distribution employ dim coherent states as an approximation to single photon states. The advantage is that dim coherent states are convenient to use. The draw-back is that the security proofs for quantum key distribution have to be adapted. Difficulties arising from the use of signal states containing multi-photon contributions in combination with lossy channels have been pointed out earlier by Huttner et al.. In this paper I describe a first numerical bound allowing quantum key distribution using dim coherent signal states in the presence of noise.
Next 10 →
Results 1 - 10 of 211
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University