Results 61 to 70 of about 47,878 (305)

Security in quantum cryptography

open access: yesReviews of Modern Physics, 2022
Quantum cryptography exploits principles of quantum physics for the secure processing of information. A prominent example is secure communication, i.e., the task of transmitting confidential messages from one location to another. The cryptographic requirement here is that the transmitted messages remain inaccessible to anyone other than the designated ...
Christopher Portmann, Renato Renner
openaire   +2 more sources

Free-Space Quantum Key Distribution

open access: yes, 2016
Based on the firm laws of physics rather than unproven foundations of mathematical complexity, quantum cryptography provides a radically different solution for encryption and promises unconditional security.
Carrasco-Casado, Alberto   +2 more
core   +1 more source

Refining Quantum Cryptography [PDF]

open access: yesScience, 2011
Recent hacking efforts on quantum cryptography systems have resulted in new approaches for more secure communication networks.
Hughes, R., Nordholt, J.
openaire   +3 more sources

Quantum Advantage in Cryptography

open access: yesAIAA Journal, 2023
Ever since its inception, cryptography has been caught in a vicious circle: Cryptographers keep inventing methods to hide information, and cryptanalysts break them, prompting cryptographers to invent even more sophisticated encryption schemes, and so on. But could it be that quantum information technology breaks this circle?
Renato Renner, Ramona Wolf
openaire   +2 more sources

Composability in quantum cryptography

open access: yesNew Journal of Physics, 2009
In this article, we review several aspects of composability in the context of quantum cryptography. The first part is devoted to key distribution. We discuss the security criteria that a quantum key distribution protocol must fulfill to allow its safe use within a larger security application (e.g., for secure message transmission).
Müller-Quade, Jörn, Renner, Renato
openaire   +5 more sources

Learning with Errors is easy with quantum samples

open access: yes, 2018
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography.
Grilo, Alex B.   +2 more
core   +2 more sources

Quantum Cryptography Approaching the Classical Limit [PDF]

open access: yes, 2010
We consider the security of continuous-variable quantum cryptography as we approach the classical-limit, i.e., when the unknown preparation noise at the sender's station becomes significantly noisy or thermal (even by as much as 10,000 times the variance
A. S. Holevo   +7 more
core   +2 more sources

Experimental Quantum Cryptography [PDF]

open access: yesJournal of Cryptology, 1991
We describe initial results from an apparatus and protocol designed to implement quantum public key distribution, by which two users, who share no secret information initially: 1) exchange a random quantum transmission, consisting of very faint flashes of polarized light; 2) by subsequent public discussion of the sent and received versions of this ...
Charles H. Bennett   +4 more
openaire   +2 more sources

Circuit-noise-resilient virtual distillation

open access: yesCommunications Physics
Quantum error mitigation (QEM) is vital for improving quantum algorithms’ accuracy on noisy near-term devices. A typical QEM method, called Virtual Distillation (VD), can suffer from imperfect implementation, potentially leading to worse outcomes than ...
Xiao-Yue Xu   +4 more
doaj   +1 more source

Protocols and plan of quantum cryptography [PDF]

open access: yesVojnotehnički Glasnik, 2012
Along with the development of confidentiality of data and resources, there is a need to develop systems that would provide confidentiality. Currently, the most used systems are classical cryptographic systems and encryption public key systems.
Milorad S. Markagić
doaj   +1 more source

Home - About - Disclaimer - Privacy