To see the other types of publications on this topic, follow the link: Quantum communication Cryptography.

Journal articles on the topic 'Quantum communication Cryptography'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Quantum communication Cryptography.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Teja, Penumantra Satya Sai, Mounika Lakshmi P, and Vinay Kumar K. "A Secure Communication through Quantum Key Distribution Protocols." International Research Journal of Electronics and Computer Engineering 4, no. 3 (2018): 14. http://dx.doi.org/10.24178/irjece.2018.4.3.14.

Full text
Abstract:
Quantum cryptography is a new method of communication offering the security of the inviolability by using Law of Nature.Quantum Cryptography uses different secure communication by applying the phenomena of quantum physics. Unlike traditional classical cryptography, which uses mathematical techniques to restrict eavesdroppers, quantum cryptography is focused on the properties of physics of light for information. Quantum cryptography depends only on the validity of quantum theory, i.e., it is guarantied directly by the laws of physics. This is a different from any classical cryptographic techniq
APA, Harvard, Vancouver, ISO, and other styles
2

Muruganantham, B., P. Shamili, S. Ganesh Kumar, and A. Murugan. "Quantum cryptography for secured communication networks." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (2020): 407. http://dx.doi.org/10.11591/ijece.v10i1.pp407-414.

Full text
Abstract:
Quantum cryptography is a method for accessing data with the cryptosystem more efficiently. The network security and the cryptography are the two major properties in securing the data in the communication network. The quantum cryptography uses the single photon passing through the polarization of a photon. In Quantum Cryptography, it's impossible for the eavesdropper to copy or modify the encrypted messages in the quantum states in which we are sending through the optical fiber channels. Cryptography performed by using the protocols BB84 and B92 protocols. The two basic algorithms of quantum c
APA, Harvard, Vancouver, ISO, and other styles
3

VIDAL, G., M. S. BAPTISTA, and H. MANCINI. "FUNDAMENTALS OF A CLASSICAL CHAOS-BASED CRYPTOSYSTEM WITH SOME QUANTUM CRYPTOGRAPHY FEATURES." International Journal of Bifurcation and Chaos 22, no. 10 (2012): 1250243. http://dx.doi.org/10.1142/s0218127412502434.

Full text
Abstract:
We present the fundamentals of a cryptographic method based on a hyperchaotic system and a protocol which inherits some properties of the quantum cryptography that can be straightforwardly applied on the existing communication systems of nonoptical communication channels. It is an appropriate tool to provide security on software applications for VoIP, as in Skype, dedicated to voice communication through Internet. This would enable that an information packet be sent through Internet preventing attacks with strategies similar to that employed if this same packet is transferred in an optical cha
APA, Harvard, Vancouver, ISO, and other styles
4

Bykovsky, A. Yu, and I. N. Kompanets. "Quantum cryptography and combined schemes of quantum cryptography communication networks." Quantum Electronics 48, no. 9 (2018): 777–801. http://dx.doi.org/10.1070/qel16732.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

IMOTO, Nobuyuki. "Photonic communication and quantum cryptography." Review of Laser Engineering 29, Supplement (2001): 193–94. http://dx.doi.org/10.2184/lsj.29.supplement_193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dayo Alowolodu, Olufunso, Gabriel K Adelaja, Boniface K Alese, and Olufunke Catherine Olayemi. "Medical Image Security Using Quantum Cryptography." Issues in Informing Science and Information Technology 15 (2018): 057–67. http://dx.doi.org/10.28945/4008.

Full text
Abstract:
Aim/Purpose: Medical images are very sensitive data that can be transferred to medical laboratories, professionals, and specialist for referral cases or consultation. Strict security measures must be utilized to keep these data secured in computer networks when transferred to another party. On a daily basis, unauthorized users derive ways to gain access to sensitive patient medical information. Background: One of the best ways to which medical image could be kept secured is through the use of quantum cryptography Methodology : Applying the principles of quantum mechanics to cryptography has le
APA, Harvard, Vancouver, ISO, and other styles
7

Zhou, Zishuai, Qisheng Guang, Chaohui Gao, Dong Jiang, and Lijun Chen. "Measurement-Device-Independent Two-Party Cryptography with Error Estimation." Sensors 20, no. 21 (2020): 6351. http://dx.doi.org/10.3390/s20216351.

Full text
Abstract:
We present an innovative method for quantum two-party cryptography. Our protocol introduces joint measurement and error estimation to improve the security of two-party cryptographic protocols. Our protocol removes the assumption of the attacker’s limited power and catches the attacking actions through highly estimated bit error rate. Our protocol is formally proved to be secure against both eavesdroppers and dishonest communication parties. We also utilize our designed protocol to construct two specific two-party cryptographic applications: Quantum bit commitment and quantum password identific
APA, Harvard, Vancouver, ISO, and other styles
8

Dolgochub, Evgeny A., and Alexey N. Polikanin. "ANALYSIS OF QUANTUM BB84 AND B92 ENCRYPTION ALGORITHMS." Interexpo GEO-Siberia 6, no. 1 (2020): 125–30. http://dx.doi.org/10.33764/2618-981x-2020-6-1-125-130.

Full text
Abstract:
A communication channel protected by quantum cryptography cannot be hacked under ideal conditions. But only because there are currently no suitable hacking methods available. All existing methods of breaking cryptographic networks are aimed at mathematical models of ciphers. However, if we follow the rule that the stability of a system is determined by the stability of its weakest link, we can see the opposite. Quantum cryptography is a promising young and developing field in the field of information security. Every specialist in the field of information security is interested in creating a pe
APA, Harvard, Vancouver, ISO, and other styles
9

Et. al., Rydhm Beri ,. "A Contemporary Study on Quantum-Computing Security Mechanisms in 5G Networks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 450–55. http://dx.doi.org/10.17762/turcomat.v12i2.835.

Full text
Abstract:
5G communication technology works with the integration of several technologies viz. Cloud Computing, network partitioning and software based networks. This integration allows the communication between thousands of device across the world which have enormous issues related to data protection, data authenticity, and data confidentiality. So, there is an immense need of secure protocols to face or resolve security related issues related to design and operation of 5G network. Moreover, some structured cryptography protocols required to develop and accomplish data security in 5G communication. The
APA, Harvard, Vancouver, ISO, and other styles
10

Bebrov, Georgi Petrov, and Rozalina Stefanova Dimova. "Quantum secure communication models comparison." ANNUAL JOURNAL OF TECHNICAL UNIVERSITY OF VARNA, BULGARIA 1, no. 1 (2017): 21–26. http://dx.doi.org/10.29114/ajtuv.vol1.iss1.27.

Full text
Abstract:
The paper concerns the quantum cryptography, more specifically, the quantum secure communication type of schemes. The main focus here is on making a comparison between the distinct secure quantum communication models – quantum secure direct communication and deterministic secure quantum communication, in terms of three parameters: resource efficiency, eavesdropping check efficiency, and security (degree of preserving the confidentiality).
APA, Harvard, Vancouver, ISO, and other styles
11

Wang, Chuan. "Quantum secure direct communication: Intersection of communication and cryptography." Fundamental Research 1, no. 1 (2021): 91–92. http://dx.doi.org/10.1016/j.fmre.2021.01.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Zhang, Hongliang, Dongxiao Quan, Changhua Zhu, and Zhigang Li. "A Quantum Cryptography Communication Network Based on Software Defined Network." ITM Web of Conferences 17 (2018): 01008. http://dx.doi.org/10.1051/itmconf/20181701008.

Full text
Abstract:
With the development of the Internet, information security has attracted great attention in today’s society, and quantum cryptography communication network based on quantum key distribution (QKD) is a very important part of this field, since the quantum key distribution combined with one-time-pad encryption scheme can guarantee the unconditional security of the information. The secret key generated by quantum key distribution protocols is a very valuable resource, so making full use of key resources is particularly important. Software definition network (SDN) is a new type of network architect
APA, Harvard, Vancouver, ISO, and other styles
13

Pirandola, Stefano, Stefano Mancini, Seth Lloyd, and Samuel L. Braunstein. "Continuous-variable quantum cryptography using two-way quantum communication." Nature Physics 4, no. 9 (2008): 726–30. http://dx.doi.org/10.1038/nphys1018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

ENGLERT, BERTHOLD-GEORG, FANG-WEI FU, HARALD NIEDERREITER, and CHAOPING XING. "CODES FOR KEY GENERATION IN QUANTUM CRYPTOGRAPHY." International Journal of Quantum Information 03, supp01 (2005): 97–110. http://dx.doi.org/10.1142/s0219749905001286.

Full text
Abstract:
As an alternative to the usual key generation by two-way communication in schemes for quantum cryptography, we consider codes for key generation by one-way communication. We study codes that could be applied to the raw key sequences that are ideally obtained in recently proposed scenarios for quantum key distribution, which can be regarded as communication through symmetric four-letter channels.
APA, Harvard, Vancouver, ISO, and other styles
15

Wen, Xiao-Jun, Yong-Zhi Chen, Xin-Can Fan, Zheng-Zhong Yi, Zoe L. Jiang, and Jun-Bin Fang. "Quantum blockchain system." Modern Physics Letters B 35, no. 20 (2021): 2150343. http://dx.doi.org/10.1142/s0217984921503437.

Full text
Abstract:
Blockchain technology represented by Bitcoin and Ethereum has been deeply developed and widely used due to its broad application prospects such as digital currency and IoT. However, the security of the existing blockchain technologies built on the classical cryptography depends on the computational complexity problem. With the enhancement of the attackers’ computing power, especially the upcoming quantum computers, this kind of security is seriously threatened. Based on quantum hash, quantum SWAP test and quantum teleportation, a quantum blockchain system is proposed with quantum secure commun
APA, Harvard, Vancouver, ISO, and other styles
16

Wang, Ming-Ming, Jun-Li Liu, and Lin-Ming Gong. "Semiquantum secure direct communication with authentication based on single-photons." International Journal of Quantum Information 17, no. 03 (2019): 1950024. http://dx.doi.org/10.1142/s0219749919500242.

Full text
Abstract:
Semiquantum cryptography has drawn much attention in recent years since it simplifies the implementation of quantum cryptographic protocols. In this paper, we study semiquantum secure direct communication (SQSDC). Based on single-photons, we propose a two-step SQSDC protocol with identity authentication, which can be used to prevent impersonation and the man-in-the-middle attack. Different from previous protocols based on quantum entanglement or quantum memory, our protocol removes there restrictions for simplifying its physical implementation. We prove that our two-step SQSDC protocol is comp
APA, Harvard, Vancouver, ISO, and other styles
17

Nagata, Koji, and Tadao Nakamura. "Quantum Cryptography, Quantum Communication, and Quantum Computer in a Noisy Environment." International Journal of Theoretical Physics 56, no. 7 (2017): 2086–100. http://dx.doi.org/10.1007/s10773-017-3352-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Buhari, Abudhahir, Zuriati Ahmad Zukarnain, Roszelinda Khalid, and Wira Jaafar Ahmad Zakir Dato'. "A Generic Simulation Framework for Non-Entangled based Experimental Quantum Cryptography and Communication: Quantum Cryptography and Communication Simulator (QuCCs)." IOP Conference Series: Materials Science and Engineering 160 (November 2016): 012095. http://dx.doi.org/10.1088/1757-899x/160/1/012095.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

YANG, WEI, LIUSHENG HUANG, FANG SONG, and QIYAN WANG. "INFEASIBILITY OF QUANTUM CRYPTOGRAPHY WITHOUT EAVESDROPPING CHECK." International Journal of Modern Physics B 25, no. 08 (2011): 1061–67. http://dx.doi.org/10.1142/s0217979211058407.

Full text
Abstract:
Secure key distribution is impossible in pure classical environment. Unconditional secure key distribution is available when quantum means are introduced, assisted by a classical communication channel. What is possible when a quantum key distribution scheme is without classical communication? We present a general model with this constraint and show that quantum key distribution without classical eavesdropping check is in principle impossible. For an adversary can always succeed in obtaining the secret key via a special case of man-in-the-middle attack, namely intercept-and-forward attack witho
APA, Harvard, Vancouver, ISO, and other styles
20

Toyoshima, Morio, Yoshihisa Takayama, Werner Klaus, Hiroo Kunimori, Mikio Fujiwara, and Masahide Sasaki. "Free-space quantum cryptography with quantum and telecom communication channels." Acta Astronautica 63, no. 1-4 (2008): 179–84. http://dx.doi.org/10.1016/j.actaastro.2007.12.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

TOMITA, Akihisa, and Akio TAJIMA. "Fast Quantum Cryptography System Using Single Photon Communication." Review of Laser Engineering 36, no. 8 (2008): 487–92. http://dx.doi.org/10.2184/lsj.36.487.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Greenberger, Daniel, and Mark Hillary. "The Impossibility of Keyless Communication in Quantum Cryptography." Fortschritte der Physik 48, no. 5-7 (2000): 523–30. http://dx.doi.org/10.1002/(sici)1521-3978(200005)48:5/7<523::aid-prop523>3.0.co;2-w.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Goswami, Partha Sarathi, Tamal Chakraborty, and Abir Chattopadhyay. "Knapsack encoding for secured quantum key distribution protocol." Modern Physics Letters A 35, no. 36 (2020): 2050295. http://dx.doi.org/10.1142/s0217732320502958.

Full text
Abstract:
Quantum cryptography has of late opened up the possibilities of exploiting the characteristics of quantum mechanics in the realm of network security. An interesting problem in cryptography is the distribution of the encryption key between the two parties involved in communication. This paper proposes a secure quantum key distribution protocol using the properties of super increasing knapsack sequences. The mapping from the knapsack sequences to the quantum states is achieved by rotating a three-bit quantum tuple.
APA, Harvard, Vancouver, ISO, and other styles
24

Hall, Derek, and Timothy Sands. "Quantum Cryptography for Nuclear Command and Control." Computer and Information Science 13, no. 1 (2020): 72. http://dx.doi.org/10.5539/cis.v13n1p72.

Full text
Abstract:
The nuclear inventory of Russia and the USA currently comprises 12,685 warheads in a large network of vehicles; and the interconnected network is managed by a command and control communication system. This command and control communication system (C3) must also relay information from numerous airborne, space-born, and ground sensors throughout the network in potentially degraded environments and are nonetheless meant to securely hold transmissions that must be held to the highest standards of encryption. C3 systems are also arguably one of the most challenging systems to develop, since they re
APA, Harvard, Vancouver, ISO, and other styles
25

WANG, Chuan. "Experimental realization of quantum cryptography communication in free space." Science in China Series G 48, no. 2 (2005): 237. http://dx.doi.org/10.1360/04yw0185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Hiroki, Takesue, Diamanti Eleni, Thew Rob, and Yuan Zhiliang. "Introduction to the Issue on Quantum Communication and Cryptography." IEEE Journal of Selected Topics in Quantum Electronics 21, no. 3 (2015): 3–4. http://dx.doi.org/10.1109/jstqe.2015.2436231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Zhou, Ri-gui, Wei Li, Tian-tian Huan, Chen-yi Shen, and Hai-sheng Li. "An Online Banking System Based on Quantum Cryptography Communication." International Journal of Theoretical Physics 53, no. 7 (2014): 2177–90. http://dx.doi.org/10.1007/s10773-013-1991-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

ASSAD, SYED M., JUN SUZUKI, and BERTHOLD-GEORG ENGLERT. "RAW-DATA ATTACKS IN QUANTUM CRYPTOGRAPHY WITH PARTIAL TOMOGRAPHY." International Journal of Quantum Information 04, no. 06 (2006): 1003–12. http://dx.doi.org/10.1142/s0219749906002365.

Full text
Abstract:
We consider a variant of the BB84 protocol for quantum cryptography, the prototype of tomographically incomplete protocols, where the key is generated by one-way communication rather than the usual two-way communication. Our analysis, backed by numerical evidence, establishes thresholds for eavesdropping attacks on the raw data and on the generated key at quantum bit error rates of 10% and 6.15%, respectively. Both thresholds are lower than the threshold for unconditional security in the standard BB84 protocol.
APA, Harvard, Vancouver, ISO, and other styles
29

Ekert, Artur, Alastair Kay, and James Pope. "Turing, ciphers and quanta." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 370, no. 1971 (2012): 3418–31. http://dx.doi.org/10.1098/rsta.2011.0324.

Full text
Abstract:
Alan Turing has certainly contributed to a widespread belief that the quest for a perfect, unbreakable, cipher is a futile pursuit. The ancient art of concealing information has, in the past, been matched by the ingenuity of code-breakers, but no longer! With the advent of quantum cryptography, the hopes of would-be eavesdroppers have been dashed, perhaps for good. Moreover, recent research, building on schemes that were invented decades ago to perform quantum cryptography, shows that secure communication certified by a sufficient violation of a Bell inequality makes a seemingly insane scenari
APA, Harvard, Vancouver, ISO, and other styles
30

Et. al., Rojasree V. "Research Intuitions of Asymmetric Crypto System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (2021): 5024–33. http://dx.doi.org/10.17762/turcomat.v12i3.2016.

Full text
Abstract:
The fast moving world full of data exchange and communication technology, with all sensitive information of an individual virtually available anywhere and anytime, make the Internet world more critical in security aspects. The areas of risks are attended and assured to be safe by means of some sought of crypto mechanisms. The strength and vulnerability of the crypto mechanism defines the durability of the system. The encryption on the communication channel can implement either public or private key algorithms based on the area of applications. The public key cryptography is specifically design
APA, Harvard, Vancouver, ISO, and other styles
31

Pham, Hai, Rainer Steinwandt, and Adriana Suárez Corona. "Integrating Classical Preprocessing into an Optical Encryption Scheme." Entropy 21, no. 9 (2019): 872. http://dx.doi.org/10.3390/e21090872.

Full text
Abstract:
Traditionally, cryptographic protocols rely on mathematical assumptions and results to establish security guarantees. Quantum cryptography has demonstrated how physical properties of a communication channel can be leveraged in the design of cryptographic protocols, too. Our starting point is the AlphaEta protocol, which was designed to exploit properties of coherent states of light to transmit data securely over an optical channel. AlphaEta aims to draw security from the uncertainty of any measurement of the transmitted coherent states due to intrinsic quantum noise. We present a technique to
APA, Harvard, Vancouver, ISO, and other styles
32

Sun, P. C., Y. Mazurenko, and Y. Fainman. "Long-distance frequency-division interferometer for communication and quantum cryptography." Optics Letters 20, no. 9 (1995): 1062. http://dx.doi.org/10.1364/ol.20.001062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Sripakdee, Chatchawal. "Entangled Photon Source of Quantum Key Generator from Micro Ring Resonator for QKD Use." Applied Mechanics and Materials 879 (March 2018): 183–87. http://dx.doi.org/10.4028/www.scientific.net/amm.879.183.

Full text
Abstract:
The powerful novel invention of entangled photon source by using a nonlinear silica micro ring resonator for quantum cryptography use was established and investigated. This entangled photon pair was generated under the degenerated four wave mixing process under the phase mismatch adjusment. The corresponding entangled photon generation Hamiltonian was established and studied in term of EPR pair. The obtained entangled photon pairs can be applied to the quantum cryptography distribution under quantum teleportation process showing the feasible and suitable for quantum information communication v
APA, Harvard, Vancouver, ISO, and other styles
34

Kerenidis, Iordanis, and Stephanie Wehner. "Long distance two-party quantum crypto made simple." Quantum Information and Computation 12, no. 5&6 (2012): 448–60. http://dx.doi.org/10.26421/qic12.5-6-6.

Full text
Abstract:
Any two-party cryptographic primitive can be implemented using quantum communication under the assumption that it is difficult to store a large number of quantum states perfectly. However, achieving reliable quantum communication over long distances remains a difficult problem. Here, we consider a large network of nodes with only neighboring quantum links. We exploit properties of this cloud of nodes to enable any two nodes to achieve security even if they are not directly connected. Our results are based on techniques from classical cryptography and do not resort to technologically difficult
APA, Harvard, Vancouver, ISO, and other styles
35

Эскандери, М. М., Д. Б. Хорошко та С. Я. Килин. "Безошибочное различение когерентных состояний двухмодового оптического поля". Журнал технической физики 128, № 8 (2020): 1171. http://dx.doi.org/10.21883/os.2020.08.49716.83-20.

Full text
Abstract:
The procedure of a quantum measurement, the unambiguous state discrimination, is studied for the case of four two-mode coherent states of the optical field, interesting for information transmission via an optical communication channel. It is shown that a complex conjugation of the amplitude of one of the modes results in a better distinguishability of the states. An interferometric scheme is suggested for unambiguous discrimination of such states and the probability of successful discrimination is found. Applications of the considered state set are discussed for quantum cryptography, quantum t
APA, Harvard, Vancouver, ISO, and other styles
36

Dănilă, Octavian, Paul E. Sterian, and Andreea Rodica Sterian. "Perspectives on Entangled Nuclear Particle Pairs Generation and Manipulation in Quantum Communication and Cryptography Systems." Advances in High Energy Physics 2012 (2012): 1–10. http://dx.doi.org/10.1155/2012/801982.

Full text
Abstract:
Entanglement between two quantum elements is a phenomenon which presents a broad application spectrum, being used largely in quantum cryptography schemes and in physical characterisation of the universe. Commonly known entangled states have been obtained with photons and electrons, but other quantum elements such as quarks, leptons, and neutrinos have shown their informational potential. In this paper, we present the perspective of exploiting the phenomenon of entanglement that appears in nuclear particle interactions as a resource for quantum key distribution protocols.
APA, Harvard, Vancouver, ISO, and other styles
37

Kon, Wen Yu, and Charles Ci Wen Lim. "Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography." Entropy 23, no. 1 (2020): 54. http://dx.doi.org/10.3390/e23010054.

Full text
Abstract:
Private information retrieval (PIR) is a database query protocol that provides user privacy in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre. Symmetric private information retrieval (SPIR) takes PIR further by additionally offering database privacy, where the user cannot learn any additional entries of the database. Unconditionally secure SPIR solutions with multiple databases are known classically, but are unrealistic because they require long shared secret keys between the parties for secure communication and sha
APA, Harvard, Vancouver, ISO, and other styles
38

Timofeev, A. V., D. I. Pomozov, A. P. Makkaveev, and S. N. Molotkov. "Public classical communication in quantum cryptography: Error correction, integrity, and authentication." Journal of Experimental and Theoretical Physics 104, no. 5 (2007): 675–88. http://dx.doi.org/10.1134/s1063776107050019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Mihalkovich, Aleksejus, Eligijus Sakalauskas, and Kestutis Luksys. "Key Exchange Protocol Defined over a Non-Commuting Group Based on an NP-Complete Decisional Problem." Symmetry 12, no. 9 (2020): 1389. http://dx.doi.org/10.3390/sym12091389.

Full text
Abstract:
In this paper we present a cryptographic primitive based on non-commutative cryptography. This primitive is used for key exchange protocol (KEP) construction. We prove that the security of this primitive relies on a nondeterministic polynomial complete (NP-Complete) decisional problem. Recently there are no known quantum cryptanalysis algorithms effectively solving NP-Complete problems. So far, KEPs are widely used in secure communication channel creation, e.g., in hypertext transfer protocol secure (https://) and are based on traditional cryptographic primitives representing commutative crypt
APA, Harvard, Vancouver, ISO, and other styles
40

Wang, Xiao Zhi, and Zhi Gang Liu. "Network Seepage Flow Research Based on Complex Network." Applied Mechanics and Materials 608-609 (October 2014): 392–96. http://dx.doi.org/10.4028/www.scientific.net/amm.608-609.392.

Full text
Abstract:
Quantum communication is the information network communication cross technology developed in recent years. And it is a new communication technology by using network effects of quantum to carry out information transmission. Quantum communication is closely relative with quantum cryptography, quantum teleportation and quantum transport protocol. Quantum communication belongs to the complex network communication. Quantum bit is the basic unit of the network transmission. The wide range of application of quantum complex network is mainly the preparation of remote distance network seepage flow. In
APA, Harvard, Vancouver, ISO, and other styles
41

Fuchs, C. A., and M. Sasaki. "Squeezing quantum information through a classical channel: measuring the “quantumness” of a set of quantum states." Quantum Information and Computation 3, no. 5 (2003): 377–404. http://dx.doi.org/10.26421/qic3.5-1.

Full text
Abstract:
In this paper we propose a general method to quantify how ``quantum'' a set of quantum states is. The idea is to gauge the quantumness of the set by the worst-case difficulty of transmitting the states through a purely classical communication channel. Potential applications of this notion arise in quantum cryptography, where one might like to use an alphabet of states that promises to be the most sensitive to quantum eavesdropping, and in laboratory demonstrations of quantum teleportation, where it is necessary to check that quantum entanglement has actually been used in the protocol.
APA, Harvard, Vancouver, ISO, and other styles
42

B M, Chandrakala, and S. C. Linga Reddy. "Secure and Efficient Bi-Directional Proxy Re-Encyrption Technique." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 3 (2018): 1143. http://dx.doi.org/10.11591/ijeecs.v12.i3.pp1143-1150.

Full text
Abstract:
&lt;p&gt;&lt;span style="font-size: small;"&gt;&lt;span&gt;The low cost availability of smart devices and broadband connection has led to rapid growth of communication over Internet. As of today the internet based communication service is widely used in various application services such as in E-Mail transaction of sensitive data (medical data), online money transaction etc. all these services requires a strong security. There has been continuous ongoing research by various cryptanalyst to enhance security of cryptography especially in semi-untrusted server. However, performance, computation ti
APA, Harvard, Vancouver, ISO, and other styles
43

Lopes, Minal, and Nisha Sarwade. "Optimized decoy state QKD for underwater free space communication." International Journal of Quantum Information 16, no. 02 (2018): 1850019. http://dx.doi.org/10.1142/s0219749918500193.

Full text
Abstract:
Quantum cryptography (QC) is envisioned as a solution for global key distribution through fiber optic, free space and underwater optical communication due to its unconditional security. In view of this, this paper investigates underwater free space quantum key distribution (QKD) model for enhanced transmission distance, secret key rates and security. It is reported that secure underwater free space QKD is feasible in the clearest ocean water with the sifted key rates up to 207[Formula: see text]kbps. This paper extends this work by testing performance of optimized decoy state QKD protocol with
APA, Harvard, Vancouver, ISO, and other styles
44

Gavinsky, Dmitry, Julia Kempe, Iordanis Kerenidis, Ran Raz, and Ronald de Wolf. "Exponential Separation for One-Way Quantum Communication Complexity, with Applications to Cryptography." SIAM Journal on Computing 38, no. 5 (2009): 1695–708. http://dx.doi.org/10.1137/070706550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Sangeetha, S., and S. Sathappan. "Quantum based Cryptography for Secured Data Communication in Mobile Ad-Hoc Network." ScieXplore: International Journal of Research in Science 3, no. 2 (2016): 57. http://dx.doi.org/10.15613/sijrs/2016/v3i2/157299.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

DÖSCHER, C., and M. KEYL. "AN INTRODUCTION TO QUANTUM COIN TOSSING." Fluctuation and Noise Letters 02, no. 04 (2002): R125—R137. http://dx.doi.org/10.1142/s0219477502000944.

Full text
Abstract:
We review the quantum version of a well known problem of cryptography called coin tossing ("flipping a coin via telephone"). It can be regarded as a game where two remote players (who distrust each other) try to generate a uniformly distributed random bit which is common to both parties. The only resource they can use to perform this task is a classical or quantum communication channel. In this paper we provide a general overview over such coin tossing protocols, concerning in particular their security.
APA, Harvard, Vancouver, ISO, and other styles
47

Sasaki, Masahide, Hiroyuki Endo, Mikio Fujiwara, et al. "Quantum photonic network and physical layer security." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 375, no. 2099 (2017): 20160243. http://dx.doi.org/10.1098/rsta.2016.0243.

Full text
Abstract:
Quantum communication and quantum cryptography are expected to enhance the transmission rate and the security (confidentiality of data transmission), respectively. We study a new scheme which can potentially bridge an intermediate region covered by these two schemes, which is referred to as quantum photonic network. The basic framework is information theoretically secure communications in a free space optical (FSO) wiretap channel, in which an eavesdropper has physically limited access to the main channel between the legitimate sender and receiver. We first review a theoretical framework to qu
APA, Harvard, Vancouver, ISO, and other styles
48

Mayers, D., and A. Yao. "Self testing quantum apparatus." Quantum Information and Computation 4, no. 4 (2004): 273–86. http://dx.doi.org/10.26421/qic4.4-3.

Full text
Abstract:
We study, in the context of quantum information and quantum communication, a configuration of devices that includes (1) a source of some unknown bipartite quantum state that is claimed to be the Bell state $\Phi^+$ and (2) two spatially separated but otherwise unknown measurement apparatus, one on each side, that are each claimed to execute an orthogonal measurement at an angle $\theta \in \{-\pi/8, 0, \pi/8\}$ that is chosen by the user. We show that, if the nine distinct probability distributions that are generated by the self checking configuration, one for each pair of angles, are consiste
APA, Harvard, Vancouver, ISO, and other styles
49

Coladangelo, Andrea, and Or Sattath. "A Quantum Money Solution to the Blockchain Scalability Problem." Quantum 4 (July 16, 2020): 297. http://dx.doi.org/10.22331/q-2020-07-16-297.

Full text
Abstract:
We put forward the idea that classical blockchains and smart contracts are potentially useful primitives not only for classical cryptography, but for quantum cryptography as well. Abstractly, a smart contract is a functionality that allows parties to deposit funds, and release them upon fulfillment of algorithmically checkable conditions, and can thus be employed as a formal tool to enforce monetary incentives. In this work, we give the first example of the use of smart contracts in a quantum setting. We describe a simple hybrid classical-quantum payment system whose main ingredients are a cla
APA, Harvard, Vancouver, ISO, and other styles
50

Singh, Kunwar, C. Pandu Rangan, and A. K. Banerjee. "Lattice Based Mix Network for Location Privacy in Mobile System." Mobile Information Systems 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/963628.

Full text
Abstract:
In 1981, David Chaum proposed a cryptographic primitive for privacy calledmix network(Mixnet). A mixnet is cryptographic construction that establishes anonymous communication channel through a set of servers. In 2004, Golle et al. proposed a new cryptographic primitive called universal reencryption which takes the input as encrypted messages under the public key of the recipients not the public key of the universal mixnet. In Eurocrypt 2010, Gentry, Halevi, and Vaikunthanathan presented a cryptosystem which is an additive homomorphic and a multiplicative homomorphic for only one multiplication
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!