Results 51 to 60 of about 2,069,680 (303)

Information-Theoretically Secure Voting Without an Honest Majority [PDF]

open access: yes, 2007
We present three voting protocols with unconditional privacy and information-theoretic correctness, without assuming any bound on the number of corrupt voters or voting authorities.
Broadbent, Anne, Tapp, Alain
core   +3 more sources

A New Quantum Blind Signature Scheme with BB84-State

open access: yesEntropy, 2019
The blind signature is widely used in cryptography applications because it can prevent the signer from gaining the original message. Owing to the unconditional security, the quantum blind signature is more advantageous than the classical one.
Feng-Lin Chen, Zhi-Hua Wang, Yong-Mo Hu
doaj   +1 more source

Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel [PDF]

open access: yes, 2011
In a deterministic quantum key distribution (DQKD) protocol with a two-way quantum channel, Bob sends a qubit to Alice who then encodes a key bit onto the qubit and sends it back to Bob.
Hua Lu, C. Fung, Xiongfeng Ma, Q. Cai
semanticscholar   +1 more source

The Security of Nuclear Weapon-Free Zones: The Middle East as a Test Case for Unconditional Security Assurances

open access: yesJournal for Peace and Nuclear Disarmament, 2022
A just nuclear order based on voluntary abstinence by states and the promotion of nuclear weapon-free zones would require more credible negative security assurances than provided by the current non-proliferation regime.
Tarja Cronberg
doaj   +1 more source

Robustness of the BB84 quantum key distribution protocol against general coherent attacks [PDF]

open access: yes, 2005
It is demonstrated that for the entanglement-based version of the Bennett-Brassard (BB84) quantum key distribution protocol, Alice and Bob share provable entanglement if and only if the estimated qubit error rate is below 25% or above 75%. In view of the
Alber, G, Khalique, A, Nikolopoulos, G M
core   +2 more sources

Unconditional security against memory-bounded adversaries [PDF]

open access: yes, 1997
We propose a private-key cryptosystem and a protocol for key agreement by public discussion that are unconditionally secure based on the sole assumption that an adversary's memory capacity is limited. No assumption about her computing power is made.
Christian Cachin, Ueli Maurer
openaire   +1 more source

Unconditional security of a K-state quantum key distribution protocol [PDF]

open access: yesQuantum Information Processing, 2018
5 pages, 1 ...
Dariusz Kurzyk   +2 more
openaire   +4 more sources

An arbitrated quantum signature scheme [PDF]

open access: yes, 2001
The general principle for a quantum signature scheme is proposed and investigated based on ideas from classical signature schemes and quantum cryptography.
A. Barenco   +18 more
core   +2 more sources

Device-independent quantum key distribution with random key basis

open access: yesNature Communications, 2021
Device-independent quantum key distribution aims at the ultimate quantum-based unconditional security, but current protocols’ rates are quite far from anything practical.
René Schwonnek   +6 more
doaj   +1 more source

Elimination of a Second-Law-Attack, and All Cable-Resistance-Based Attacks, in the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System

open access: yesEntropy, 2014
We introduce the so far most efficient attack against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system. This attack utilizes the lack of exact thermal equilibrium in practical applications and is based on cable resistance losses and the ...
Laszlo B. Kish, Claes-Göran Granqvist
doaj   +1 more source

Home - About - Disclaimer - Privacy