Results 121 to 130 of about 96,237 (302)

Secure quantum channels with correlated twin laser beams [PDF]

open access: yes, 2004
This work is the development and analysis of the recently proposed quantum cryptographic protocol, based on the use of the two-mode coherently correlated states. The protocol is supplied with the cryptographic control procedures. The quantum noise influence on the channel error properties is examined. State detection features are proposed.
arxiv   +1 more source

Vulnerabilities in Quantum Key Distribution Protocols [PDF]

open access: yes, 2003
Recently proposed quantum key distribution protocols are shown to be vulnerable to a classic man-in-the-middle attack using entangled pairs created by Eve. It appears that the attack could be applied to any protocol that relies on manipulation and return
Kuhn, D. Richard
core   +1 more source

Cheat Sensitive Quantum Bit Commitment

open access: yes, 2004
We define cheat sensitive cryptographic protocols between mistrustful parties as protocols which guarantee that, if either cheats, the other has some nonzero probability of detecting the cheating.
Adrian Kent   +8 more
core   +1 more source

The inductive approach to verifying cryptographic protocols [PDF]

open access: yesJournal of Computer Security, 1998
Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with infinite-state systems. Proofs are generated using Isabelle/HOL. The human effort required to analyze a protocol can be as little as a week or two, yielding a proof script that ...
openaire   +3 more sources

Flat and One-Variable Clauses: Complexity of Verifying Cryptographic Protocols with Single Blind Copying [PDF]

open access: yesarXiv, 2005
Cryptographic protocols with single blind copying were defined and modeled by Comon and Cortier using the new class $\mathcal C$ of first order clauses. They showed its satisfiability problem to be in 3-DEXPTIME. We improve this result by showing that satisfiability for this class is NEXPTIME-complete, using new resolution techniques.
arxiv  

Quantum authentication protocol [PDF]

open access: yesarXiv, 2000
In this letter, we proposed a quantum authentication protocol. The authentication process is implemented by the symmetric cryptographic scheme with quantum effects.
arxiv  

A min-entropy uncertainty relation for finite size cryptography

open access: yes, 2012
Apart from their foundational significance, entropic uncertainty relations play a central role in proving the security of quantum cryptographic protocols.
C. H. Bennett   +8 more
core   +1 more source

Abstraction for Epistemic Model Checking of Dining Cryptographers-based Protocols [PDF]

open access: yesarXiv, 2010
The paper describes an abstraction for protocols that are based on multiple rounds of Chaum's Dining Cryptographers protocol. It is proved that the abstraction preserves a rich class of specifications in the logic of knowledge, including specifications describing what an agent knows about other agents' knowledge.
arxiv  

Structure Attacks in Cryptographic Protocols [PDF]

open access: yes, 2001
Cryptographic protocols are in general difficult to analyze, and complicated attacks exposing security flaws have remained hidden years after a protocol is developed.
Mahlburg, Karl
core   +1 more source

The Laws of Physics and Cryptographic Security [PDF]

open access: yesarXiv, 2002
This paper consists of musings that originate mainly from conversations with other physicists, as together we've tried to learn some cryptography, but also from conversations with a couple of classical cryptographers. The main thrust of the paper is an attempt to explore the ramifications for cryptographic security of incorporating physics into our ...
arxiv  

Home - About - Disclaimer - Privacy