Results 121 to 130 of about 96,237 (302)
Secure quantum channels with correlated twin laser beams [PDF]
This work is the development and analysis of the recently proposed quantum cryptographic protocol, based on the use of the two-mode coherently correlated states. The protocol is supplied with the cryptographic control procedures. The quantum noise influence on the channel error properties is examined. State detection features are proposed.
arxiv +1 more source
Vulnerabilities in Quantum Key Distribution Protocols [PDF]
Recently proposed quantum key distribution protocols are shown to be vulnerable to a classic man-in-the-middle attack using entangled pairs created by Eve. It appears that the attack could be applied to any protocol that relies on manipulation and return
Kuhn, D. Richard
core +1 more source
Cheat Sensitive Quantum Bit Commitment
We define cheat sensitive cryptographic protocols between mistrustful parties as protocols which guarantee that, if either cheats, the other has some nonzero probability of detecting the cheating.
Adrian Kent+8 more
core +1 more source
The inductive approach to verifying cryptographic protocols [PDF]
Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with infinite-state systems. Proofs are generated using Isabelle/HOL. The human effort required to analyze a protocol can be as little as a week or two, yielding a proof script that ...
openaire +3 more sources
Flat and One-Variable Clauses: Complexity of Verifying Cryptographic Protocols with Single Blind Copying [PDF]
Cryptographic protocols with single blind copying were defined and modeled by Comon and Cortier using the new class $\mathcal C$ of first order clauses. They showed its satisfiability problem to be in 3-DEXPTIME. We improve this result by showing that satisfiability for this class is NEXPTIME-complete, using new resolution techniques.
arxiv
Quantum authentication protocol [PDF]
In this letter, we proposed a quantum authentication protocol. The authentication process is implemented by the symmetric cryptographic scheme with quantum effects.
arxiv
A min-entropy uncertainty relation for finite size cryptography
Apart from their foundational significance, entropic uncertainty relations play a central role in proving the security of quantum cryptographic protocols.
C. H. Bennett+8 more
core +1 more source
Abstraction for Epistemic Model Checking of Dining Cryptographers-based Protocols [PDF]
The paper describes an abstraction for protocols that are based on multiple rounds of Chaum's Dining Cryptographers protocol. It is proved that the abstraction preserves a rich class of specifications in the logic of knowledge, including specifications describing what an agent knows about other agents' knowledge.
arxiv
Structure Attacks in Cryptographic Protocols [PDF]
Cryptographic protocols are in general difficult to analyze, and complicated attacks exposing security flaws have remained hidden years after a protocol is developed.
Mahlburg, Karl
core +1 more source
The Laws of Physics and Cryptographic Security [PDF]
This paper consists of musings that originate mainly from conversations with other physicists, as together we've tried to learn some cryptography, but also from conversations with a couple of classical cryptographers. The main thrust of the paper is an attempt to explore the ramifications for cryptographic security of incorporating physics into our ...
arxiv