Results 1 to 10 of about 2,069,680 (303)

Experimental demonstrations of unconditional security in a purely classical regime [PDF]

open access: yesScientific Reports, 2021
So far, unconditional security in key distribution processes has been confined to quantum key distribution (QKD) protocols based on the no-cloning theorem of nonorthogonal bases.
Byoung S. Ham
doaj   +8 more sources

Unconditional security from noisy quantum storage [PDF]

open access: yesIEEE Transactions on Information Theory, 2011
We consider the implementation of two-party cryptographic primitives based on the sole assumption that no large-scale reliable quantum storage is available to the cheating party. We construct novel protocols for oblivious transfer and bit commitment, and
Koenig, Robert   +2 more
core   +6 more sources

High Key Rate Quantum Conference Key Agreement With Unconditional Security [PDF]

open access: yesIEEE Access, 2021
Quantum cryptography is a major ingredient of the future quantum internet that promises various secure communication tasks. Quantum conference key agreement (CKA) is an important cryptographic primitive of quantum cryptography, which provides the ...
Xiao-Yu Cao   +5 more
doaj   +5 more sources

Unconditional Security of Three State Quantum Key Distribution Protocols [PDF]

open access: yesPhysical Review Letters, 2005
Quantum key distribution (QKD) protocols are cryptographic techniques with security based only on the laws of quantum mechanics. Two prominent QKD schemes are the BB84 and B92 protocols that use four and two quantum states, respectively. In 2000, Phoenix
Batuwantudawe, J.   +4 more
core   +5 more sources

Perspective - On the thermodynamics of perfect unconditional security [PDF]

open access: yesApplied Physics Letters, 2021
A secure key distribution (exchange) scheme is unconditionally secure if it is unbreakable against arbitrary technological improvements of computing power and/or any development of new algorithms.
Christiana Chamon, L. Kish
semanticscholar   +4 more sources

Noise properties in the ideal Kirchhoff-Law-Johnson-Noise secure communication system. [PDF]

open access: yesPLoS ONE, 2014
In this paper we determine the noise properties needed for unconditional security for the ideal Kirchhoff-Law-Johnson-Noise (KLJN) secure key distribution system using simple statistical analysis.
Zoltan Gingl, Robert Mingesz
doaj   +6 more sources

Unconditional security at a low cost [PDF]

open access: yesPhysical Review A, 2006
By simulating four quantum key distribution (QKD) experiments and analyzing one decoy-state QKD experiment, we compare two data post-processing schemes based on security against individual attack by L\"{u}tkenhaus, and unconditional security analysis by ...
C. H. Bennett   +9 more
core   +5 more sources

Unconditional security in quantum cryptography [PDF]

open access: yesJournal of the ACM, 1998
Basic techniques to prove the unconditional security of quantum crypto graphy are described. They are applied to a quantum key distribution protocol proposed by Bennett and Brassard [1984].
D. Mayers
semanticscholar   +3 more sources

Unconditional security of quantum key distribution over arbitrarily long distances [PDF]

open access: yesScience, 1998
Quantum key distribution is widely thought to offer unconditional security in communication between two users. Unfortunately, a widely accepted proof of its security in the presence of source, device, and channel noises has been missing.
H. Lo, H. Chau
semanticscholar   +7 more sources

Home - About - Disclaimer - Privacy