Results 1 to 10 of about 13,252 (232)
Since the introduction of the ring-learning with errors problem, the number theoretic transform (NTT) based polynomial multiplication algorithm has been studied extensively.
Jose Maria Bermudo Mera +2 more
doaj +1 more source
Experimental demonstration of the DPTS QKD protocol over a 170 km fiber link [PDF]
Quantum key distribution (QKD) is a promising technology aiming at solving the security problem arising from the advent of quantum computers. While the main theoretical aspects are well developed today, limited performances, in terms of achievable link ...
Bacco, Davide +6 more
core +2 more sources
Orthogonal-state-based protocols of quantum key agreement [PDF]
Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based
Alam, Nasir +2 more
core +1 more source
Efficient reconciliation protocol for discrete-variable quantum key distribution
Reconciliation is an essential part of any secret-key agreement protocol and hence of a Quantum Key Distribution (QKD) protocol, where two legitimate parties are given correlated data and want to agree on a common string in the presence of an adversary ...
Alléaume, Romain +3 more
core +1 more source
Quantum key distribution and cryptography: a survey [PDF]
I will try to partially answer, based on a review on recent work, the following question: Can QKD and more generally quantum information be useful to cover some practical security requirements in current (and future) IT infrastructures ?
+23 more
core +1 more source
Decoy state quantum key distribution with two-way classical post-processing [PDF]
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution protocols when a coherent state source is used.
C. H. Bennett +14 more
core +1 more source
Key recycling in authentication
In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad.
Portmann, Christopher
core +1 more source
Provably-secure symmetric private information retrieval with quantum cryptography
Private information retrieval (PIR) is a database query protocol that provides user privacy, in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre.
Kon, Wen Yu, Lim, Charles Ci Wen
core +1 more source
Philosophical Aspects of Quantum Information Theory [PDF]
Quantum information theory represents a rich subject of discussion for those interested in the philosphical and foundational issues surrounding quantum mechanics for a simple reason: one can cast its central concerns in terms of a long-familiar question:
Timpson, Christopher G
core +2 more sources
Strategic Insights From Playing the Quantum Tic-Tac-Toe
In this paper, we perform a minimalistic quantization of the classical game of tic-tac-toe, by allowing superpositions of classical moves. In order for the quantum game to reduce properly to the classical game, we require legal quantum moves to be ...
Bennett C H Brassard G +15 more
core +1 more source

