Results 41 to 50 of about 2,069,680 (303)

Role of causality in ensuring unconditional security of relativistic quantum cryptography [PDF]

open access: yes, 2001
The problem of unconditional security of quantum cryptography (i.e. the security which is guaranteed by the fundamental laws of nature rather than by technical limitations) is one of the central points in quantum information theory.
A. Einstein   +23 more
core   +2 more sources

Unconditional security of practical quantum key distribution

open access: yesThe European Physical Journal D, 2007
We present a complete protocol for BB84 quantum key distribution for a realistic setting (noise, loss, multi-photon signals of the source) that covers many of todays experimental implementations. The security of this protocol is shown against an eavesdropper having unrestricted power to manipulate the signals coherently on their path from sender to ...
Inamori, Hitoshi   +2 more
openaire   +2 more sources

Weak randomness completely trounces the security of QKD [PDF]

open access: yes, 2012
In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating parties (Alice and Bob).
C. H. Bennett   +8 more
core   +2 more sources

Group Signatures: Unconditional Security for Members

open access: yesDAIMI Report Series, 1994
First a detailed definition of group signatures, originally suggested by Chaum and van {Heijst}, is given. Such signatures allow members of a group to sign messages anonymously on behalf of the group subject to the constraint that, in case of disputes later on, a designated authority can identify the signer.
Chen Lidong, Torben Pryds Pedersen
openaire   +2 more sources

A simple proof of the unconditional security of quantum key distribution [PDF]

open access: yes, 1999
Quantum key distribution is the most well-known application of quantum cryptography. Previous proposed proofs of security of quantum key distribution contain various technical subtleties.
Ben-Or M   +12 more
core   +3 more sources

Random-Resistor-Random-Temperature Kirchhoff-Law-Johnson-Noise (RRRT-KLJN) Key Exchange

open access: yesMetrology and Measurement Systems, 2016
We introduce two new Kirchhoff-law-Johnson-noise (KLJN) secure key distribution schemes which are generalizations of the original KLJN scheme. The first of these, the Random-Resistor (RR-) KLJN scheme, uses random resistors with values chosen from a ...
Kish Laszlo B., Granqvist Claes G.
doaj   +1 more source

Cable Capacitance Attack against the KLJN Secure Key Exchange

open access: yesInformation, 2015
The security of the Kirchhoff-law-Johnson-(like)-noise (KLJN) key exchange system is based on the fluctuation-dissipation theorem of classical statistical physics.
Hsien-Pu Chen   +3 more
doaj   +1 more source

A Review of Security Evaluation of Practical Quantum Key Distribution System

open access: yesEntropy, 2022
Although the unconditional security of quantum key distribution (QKD) has been widely studied, the imperfections of the practical devices leave potential loopholes for Eve to spy the final key.
Shihai Sun, Anqi Huang
doaj   +1 more source

Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security [PDF]

open access: yesJournal of Cryptology, 2000
We devise a simple modification that essentially doubles the efficiency of the BB84 quantum key distribution scheme proposed by Bennett and Brassard.We also prove the security of our modified scheme against the most general eavesdropping attack that is ...
H. Lo, H. Chau, M. Ardehali
semanticscholar   +1 more source

On the Composability of Statistically Secure Random Oblivious Transfer

open access: yesEntropy, 2020
We show that random oblivious transfer protocols that are statistically secure according to a definition based on a list of information-theoretical properties are also statistically universally composable.
Rafael Dowsley   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy