Results 1 - 10
of
211
bb 2
, 2014
"... after BPP, while SK2 immunostaining shifted from a perinuclear pattern in sham atria to predominance at sites near or at the PV membrane. of the remodeling process (within hours) depend critically not only on rate but on site and pattern of ectopic activity [6]. In this study of isolated rabbit atri ..."
Abstract
- Add to MetaCart
atria, we noted that a 3 h intermittent burst pacing protocol mimicking ectopic foci in pulmonary
1 Attacks of BB84 protocol in quantum cryptography
, 1998
"... An optimal eavesdropping strategy for BB84 protocol in quantum cryptography is proposed. This scheme is based on the ‘indirect copying’. Under this scheme, eavesdropper can exactly obtain the exchanged information between the legitimate users without being detected. ..."
Abstract
- Add to MetaCart
An optimal eavesdropping strategy for BB84 protocol in quantum cryptography is proposed. This scheme is based on the ‘indirect copying’. Under this scheme, eavesdropper can exactly obtain the exchanged information between the legitimate users without being detected.
Noise Tolerance of the BB84 Protocol with Random Privacy Amplification
, 2008
"... We prove that BB84 protocol with random privacy amplification is secure with a higher key rate than Mayers’ estimate with the same error rate. Consequently, the tolerable error rate of this protocol is increased from 7.5 % to 11 %. We also extend this method to the case of estimating error rates sep ..."
Abstract
-
Cited by 10 (4 self)
- Add to MetaCart
We prove that BB84 protocol with random privacy amplification is secure with a higher key rate than Mayers’ estimate with the same error rate. Consequently, the tolerable error rate of this protocol is increased from 7.5 % to 11 %. We also extend this method to the case of estimating error rates
Improved one-way rates for BB84 and 6-state protocols
, 712
"... Abstract. We study the advantages to be gained in quantum key distribution (QKD) protocols by combining the techniques of local randomization, or noisy preprocessing, and structured (nonrandom) block codes. Extending the results of [Smith, Renes, and Smolin, quant-ph/0607018] pertaining to BB84, we ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
Abstract. We study the advantages to be gained in quantum key distribution (QKD) protocols by combining the techniques of local randomization, or noisy preprocessing, and structured (nonrandom) block codes. Extending the results of [Smith, Renes, and Smolin, quant-ph/0607018] pertaining to BB84, we
Quantum Cryptography: On the Security of the BB84 Key-Exchange Protocol
"... Abstract. In 1984, C.H. Bennet and G. Brassard proposed a new protocol aimed to solve the problem of symmetric cryptographic key exchange. This protocol was called BB84 after the name of its authors. While a traditional method would rely on public key cryptography (like RSA), the BB84 protocol takes ..."
Abstract
- Add to MetaCart
Abstract. In 1984, C.H. Bennet and G. Brassard proposed a new protocol aimed to solve the problem of symmetric cryptographic key exchange. This protocol was called BB84 after the name of its authors. While a traditional method would rely on public key cryptography (like RSA), the BB84 protocol
Revisiting Symmetric Incoherent Optimal Eavesdropping in BB84 Protocol
"... The famous BB84 protocol relies on the conjugate bases Z = {|0〉, |1〉} and and |− 〉 = |0〉−|1〉 √. Fuchs et. al. (Phy. Rev. A, 2 1997) presented an optimal eavesdropping strategy on the four-state BB84 protocol.} Later Bruß (Phys. Rev. Lett., 1998) described the use of the basis X = {|+〉,|−〉}, where | ..."
Abstract
- Add to MetaCart
The famous BB84 protocol relies on the conjugate bases Z = {|0〉, |1〉} and and |− 〉 = |0〉−|1〉 √. Fuchs et. al. (Phy. Rev. A, 2 1997) presented an optimal eavesdropping strategy on the four-state BB84 protocol.} Later Bruß (Phys. Rev. Lett., 1998) described the use of the basis X = {|+〉,|−〉}, where
Analysis of Various Attacks over BB84 Quantum Key Distribution Protocol
"... Quantum Key Distribution (QKD) networks are the best application of quantum cryptography in which we use the principles of quantum mechanics with classical cryptographic techniques to provide the unconditional security. This paper discusses the various attack strategies over BB84 quantum key distrib ..."
Abstract
- Add to MetaCart
Quantum Key Distribution (QKD) networks are the best application of quantum cryptography in which we use the principles of quantum mechanics with classical cryptographic techniques to provide the unconditional security. This paper discusses the various attack strategies over BB84 quantum key
Game Theory based View to the Quantum Key Distribution BB84 Protocol
"... Abstract- Quantum key distribution uses quantum mechanics to guarantee secure communication. BB84 is a widely used quantum key distribution that provides a way for two parties, a sender, Alice, and a receiver, Bob, to share an unconditionally secure key in the presence of an eavesdropper, Eve. In a ..."
Abstract
- Add to MetaCart
this model we show how game theory can be used to find the strategies for Alice, Bob and Eve. Keywords- BB84 protocol, static game theory, mixed strategy Nash equilibrium. I.
IMPLEMENTATION OF BB84 PROTOCOL ON UDP 802.11i
"... Cryptography nowadays is looking for a secure and trusted channel especially in key distribution between two legitimate parties without being intercepted or decipher by intruders either in wireless or wired communication medium. The invention of Quantum Cryptography as part of quantum mechanics has ..."
Abstract
- Add to MetaCart
. This paper will discuss the implementation of BB84 protocol in UDP 802.11i Wireless Local Area Network (WLAN). WLAN as a wireless links are much noisier and less reliable in general than wired links. This type of noise will generate different numbers of key length and also different level of error rate
Dim Coherent States As Signal States In The Bb84 Protocol: Is It Secure?
"... Practical realizations of quantum key distribution employ dim coherent states as an approximation to single photon states. The advantage is that dim coherent states are convenient to use. The draw-back is that the security proofs for quantum key distribution have to be adapted. Difficulties arising ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
Practical realizations of quantum key distribution employ dim coherent states as an approximation to single photon states. The advantage is that dim coherent states are convenient to use. The draw-back is that the security proofs for quantum key distribution have to be adapted. Difficulties arising from the use of signal states containing multi-photon contributions in combination with lossy channels have been pointed out earlier by Huttner et al.. In this paper I describe a first numerical bound allowing quantum key distribution using dim coherent signal states in the presence of noise.
Results 1 - 10
of
211