Results 11 to 20 of about 2,069,680 (303)

Attainable Unconditional Security for Shared-Key Cryptosystems

open access: yesInformation Sciences, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Fabrizio Biondi   +2 more
semanticscholar   +5 more sources

Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way post-processing [PDF]

open access: yesPhysical Review Letters, 2008
We derive a bound for the security of QKD with finite resources under one-way post-processing, based on a definition of security that is composable and has an operational meaning.
C. H. Bennett   +7 more
core   +2 more sources

Unconditional Security of Single-Photon Differential Phase Shift Quantum Key Distribution [PDF]

open access: yesPhysical Review Letters, 2009
In this Letter, we prove the unconditional security of single-photon differential phase shift quantum key distribution (DPS-QKD) protocol, based on the conversion to an equivalent entanglement-based protocol.
C. H. Bennett   +7 more
core   +2 more sources

Unconditional Security by the Laws of Classical Physics [PDF]

open access: yesMetrology and Measurement Systems, 2013
Abstract There is an ongoing debate about the fundamental security of existing quantum key exchange schemes. This debate indicates not only that there is a problem with security but also that the meanings of perfect, imperfect, conditional and unconditional (information theoretic) security in physically secure key exchange schemes are often ...
R. Mingesz   +7 more
semanticscholar   +4 more sources

Quantum key distribution based on private states: unconditional security over untrusted channels with zero quantum capacity [PDF]

open access: yesIEEE Transactions on Information Theory, 2007
We prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) [quant-ph/0309110] from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify
Horodecki, Karol   +4 more
core   +3 more sources

Normalized Unconditional ϵ-Security of Private-Key Encryption [PDF]

open access: yesEntropy, 2017
In this paper we introduce two normalized versions of non-perfect security for private-key encryption: one version in the framework of Shannon entropy, another version in the framework of Kolmogorov complexity.
Lvqing Bi, Songsong Dai, Bo Hu
doaj   +2 more sources

Collective attacks and unconditional security in continuous variable quantum key distribution [PDF]

open access: yesPhysical Review Letters, 2004
We present here an information theoretic study of Gaussian collective attacks on the continuous variable key distribution protocols based on Gaussian modulation of coherent states.
Grosshans, Frederic
core   +4 more sources

Unconditional security of coherent-state quantum key distribution with strong phase-reference pulse [PDF]

open access: yesPhysical Review Letters, 2004
We prove the unconditional security of a quantum key distribution protocol in which bit values are encoded in the phase of a weak coherent-state pulse relative to a strong reference pulse. In contrast to implementations in which a weak pulse is used as a
C. H. Bennett   +2 more
core   +3 more sources

Secure secret reconstruction and multi-secret sharing schemes with unconditional security [PDF]

open access: yesSecurity and Communication Networks, 2014
ABSTRACTIn Shamir's (t,n) secret sharing (SS) scheme, the secretsis divided intonshares by a dealer and is shared amongnshareholders in such a way that anytor more thantshares can reconstruct this secret; but fewer thantshares cannot obtain any information about the secrets.
L. Harn
semanticscholar   +2 more sources

Multi-Party Semi-Quantum Simultaneous Ascending Auction Protocol Based on Single-Particle States [PDF]

open access: yesEntropy
Simultaneous ascending auctions find extensive applications in spectrum licensing and advertising space allocation. However, existing quantum sealed-bid auction protocols suffer from dual limitations: they cannot support multi-item simultaneous bidding ...
Xiuqi Wu   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy