Results 41 to 50 of about 1,260,747 (157)

Quantum key distribution with trusted quantum relay [PDF]

open access: yesarXiv, 2005
A trusted quantum relay is introduced to enable quantum key distribution links to form the basic legs in a quantum key distribution network. The idea is based on the well-known intercept/resend eavesdropping. The same scheme can be used to make quantum key distribution between several parties. No entanglement is required.
arxiv  

Unidimensional continuous-variable quantum key distribution

open access: yes, 2015
We propose the continuous-variable quantum key distribution protocol based on the Gaussian modulation of a single quadrature of the coherent states of light, which is aimed to provide simplified implementation compared to the symmetrically modulated ...
Grosshans, Frédéric   +1 more
core   +3 more sources

Fake state attack on practically decoy state quantum key distribution [PDF]

open access: yesarXiv, 2012
In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments.
arxiv  

Double C-NOT attack on a single-state semi-quantum key distribution protocol and its improvement [PDF]

open access: yesarXiv, 2020
Recently, Zhang et al. proposed a single-state semi-quantum key distribution protocol (Int. J. Quantum Inf, 18, 4, 2020) to help a quantum participant to share a secret key with a classical participant. However, this study shows that an eavesdropper can use a double C-NOT attack to obtain parts of the final shared key without being detected by the ...
arxiv  

Can Quantum Key Distribution Be Secure [PDF]

open access: yes, 2014
The importance of quantum key distribution as a cryptographic method depends upon its purported strong security guarantee. The following gives reasons on why such strong security guarantee has not been validly established and why good QKD security is ...
Yuen, Horace P.
core  

Quantum Authentication and Quantum Key Distribution Protocol [PDF]

open access: yesarXiv, 2005
We propose a quantum key distribution protocol with quantum based user authentication. Our protocol is the first one in which users can authenticate each other without previously shared secret and then securely distribute a key where the key may not be exposed to even a trusted third party.
arxiv  

On the lightweight authenticated semi-quantum key distribution protocol without Trojan horse attack [PDF]

open access: yesarXiv, 2020
Recently, Tsai et al. (Laser Phys. Lett. 17, 075202, 2020) proposed a lightweight authenticated semi-quantum key distribution protocol for a quantum participant to share a secret key with a classical participant. However, this study points out that an attacker can use a modification attack to make both participants share a wrong key without being ...
arxiv  

Unconditionally Secure Multipartite Quantum Key Distribution [PDF]

open access: yesarXiv, 2003
We consider the problem of secure key distribution among $n$ trustful agents: the goal is to distribute an identical random bit-string among the $n$ agents over a noisy channel such that eavesdroppers learn little about it. We study the general situation where the only resources required are secure bipartite key distribution and authenticated classical
arxiv  

General model of quantum key distribution [PDF]

open access: yesDoklady Mathematics 72 (2005) 795, 2005
A general mathematical framework for quantum key distribution based on the concepts of quantum channel and Turing machine is suggested. The security for its special case is proved. The assumption is that the adversary can perform only individual (in essence, classical) attacks.
arxiv  

Unconditionally secure key distribution without quantum channel [PDF]

open access: yesarXiv
Key distribution plays a fundamental role in cryptography. Currently, the quantum scheme stands as the only known method for achieving unconditionally secure key distribution. This method has been demonstrated over distances of 508 and 1002 kilometers in the measurement-device-independent and twin-field configurations, respectively.
arxiv  

Home - About - Disclaimer - Privacy