Results 41 to 50 of about 2,069,680 (303)
Role of causality in ensuring unconditional security of relativistic quantum cryptography [PDF]
The problem of unconditional security of quantum cryptography (i.e. the security which is guaranteed by the fundamental laws of nature rather than by technical limitations) is one of the central points in quantum information theory.
A. Einstein +23 more
core +2 more sources
Unconditional security of practical quantum key distribution
We present a complete protocol for BB84 quantum key distribution for a realistic setting (noise, loss, multi-photon signals of the source) that covers many of todays experimental implementations. The security of this protocol is shown against an eavesdropper having unrestricted power to manipulate the signals coherently on their path from sender to ...
Inamori, Hitoshi +2 more
openaire +2 more sources
Weak randomness completely trounces the security of QKD [PDF]
In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating parties (Alice and Bob).
C. H. Bennett +8 more
core +2 more sources
Group Signatures: Unconditional Security for Members
First a detailed definition of group signatures, originally suggested by Chaum and van {Heijst}, is given. Such signatures allow members of a group to sign messages anonymously on behalf of the group subject to the constraint that, in case of disputes later on, a designated authority can identify the signer.
Chen Lidong, Torben Pryds Pedersen
openaire +2 more sources
A simple proof of the unconditional security of quantum key distribution [PDF]
Quantum key distribution is the most well-known application of quantum cryptography. Previous proposed proofs of security of quantum key distribution contain various technical subtleties.
Ben-Or M +12 more
core +3 more sources
Random-Resistor-Random-Temperature Kirchhoff-Law-Johnson-Noise (RRRT-KLJN) Key Exchange
We introduce two new Kirchhoff-law-Johnson-noise (KLJN) secure key distribution schemes which are generalizations of the original KLJN scheme. The first of these, the Random-Resistor (RR-) KLJN scheme, uses random resistors with values chosen from a ...
Kish Laszlo B., Granqvist Claes G.
doaj +1 more source
Cable Capacitance Attack against the KLJN Secure Key Exchange
The security of the Kirchhoff-law-Johnson-(like)-noise (KLJN) key exchange system is based on the fluctuation-dissipation theorem of classical statistical physics.
Hsien-Pu Chen +3 more
doaj +1 more source
A Review of Security Evaluation of Practical Quantum Key Distribution System
Although the unconditional security of quantum key distribution (QKD) has been widely studied, the imperfections of the practical devices leave potential loopholes for Eve to spy the final key.
Shihai Sun, Anqi Huang
doaj +1 more source
Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security [PDF]
We devise a simple modification that essentially doubles the efficiency of the BB84 quantum key distribution scheme proposed by Bennett and Brassard.We also prove the security of our modified scheme against the most general eavesdropping attack that is ...
H. Lo, H. Chau, M. Ardehali
semanticscholar +1 more source
On the Composability of Statistically Secure Random Oblivious Transfer
We show that random oblivious transfer protocols that are statistically secure according to a definition based on a list of information-theoretical properties are also statistically universally composable.
Rafael Dowsley +2 more
doaj +1 more source

