• No results found

Two-party Quantum Cryptography

Cryptography  from  Post-Quantum  Assumptions

Cryptography from Post-Quantum Assumptions

... Oblivious Transfer from weakly Random-Self-Reducible Encryption Oblivious Transfer is a protocol in which a sender transfers one of potentially many pieces of information to a receiver, but remains oblivious as to what ...

79

A Simple Security Proof for Entanglement Based Quantum Key Distribution

A Simple Security Proof for Entanglement Based Quantum Key Distribution

... of quantum cryptography, provides a se- cure method for distributing cryptographic keys between two parties conventionally known as Alice (sender) and Bob (receiver), who are connected by a ...

8

Fidelity of quantum strategies with applications to cryptography

Fidelity of quantum strategies with applications to cryptography

... In this paper we consider multiple-round interactions between two parties involving the exchange of quantum information. There is a natural asymmetry between the parties as only one of the parties can send ...

20

Quantum Cryptography Beyond Quantum Key Distribution

Quantum Cryptography Beyond Quantum Key Distribution

... entangled quantum states, Alice and Bob are able to produce correlations that are stronger than all correlations they could obtain when sharing only classical ...among two players Alice and ...third ...

45

Authentication using key distribution protocol with cryptography

Authentication using key distribution protocol with cryptography

... of quantum cryptography is the ability of the two communicating users to detect the presence of any third party trying to gain knowledge of the ...of quantum mechanics: the process of ...

5

Communication through Photon Using Quantum Cryptography: A Survey

Communication through Photon Using Quantum Cryptography: A Survey

... Quantum cryptography is the technique of secret writing that uses the concept of quantum physics to develop a cryptosystem, which provide a secure communication between two parties by ...

6

Secure  Certification  of  Mixed  Quantum  States  with  Application  to  Two-Party  Randomness  Generation

Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation

... the quantum cryptography community, as it is one of the most natural tasks for which quantum protocols can perform something that is impossible ...are two versions of coin flipping: strong ...

33

Two secure non symmetric role 
		Key Agreement Protocols

Two secure non symmetric role Key Agreement Protocols

... some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic groups, in the context of Identity-Based cryptography have been ...proposed two novel Identity-Based ...

6

Security against eavesdropping in quantum cryptography

Security against eavesdropping in quantum cryptography

... of quantum cryptography is given by the fact that the four polarisation states are not four orthogonal states and so there exists no quantum non- demolition measurement which could distinguish ...

11

A Novel Approach for Simple Quantum Digital
signature based on Asymmetric Quantum
Cryptography

A Novel Approach for Simple Quantum Digital signature based on Asymmetric Quantum Cryptography

... key cryptography and once it is easy to break them, then digital signatures will also not be secure any ...also quantum cryptography has received a lot of ...generate quantum digital signature ...

5

Pairing Free Two Party Authenticated Protocols for Cryptography

Pairing Free Two Party Authenticated Protocols for Cryptography

... Hsieh et al. proposed an enhancement of the Saeednia's protocol where the reduction of the computational cost and the improvement of security aspects were made. However, Tseng et al. demonstrated that Hsieh's protocol ...

6

Emerging Paradigms in Quantum Error Correction and Quantum Cryptography

Emerging Paradigms in Quantum Error Correction and Quantum Cryptography

... of quantum error correction appears daunting in the face of several con- ceptual ...constructing quantum repetition codes analogous to classical repetition ...since quantum errors are continuous, it ...

135

Towards a quantum network with atomic ensembles

Towards a quantum network with atomic ensembles

... of quantum repeaters, however, introduces new challenges that need to be ...qubits. Quantum memory is essential, since all entanglement purification protocols have a probabilistic ...of quantum ...

279

Entropy Security in Quantum Cryptography

Entropy Security in Quantum Cryptography

... 2. T.Godhavari et al. [4] has shown about a unique quantitative security analysis for the quantum transceiver model proposed for quantum based secure information transmission. In this model follows the same ...

6

Review Article on Quantum Cryptography

Review Article on Quantum Cryptography

... the quantum transmission and the error correcting discussion, Alice and Bob find themselves with what might be thought of as an impure key, a shared body of data that is partly ...raw quantum data were ...

6

Benchmarking  Post-Quantum  Cryptography  in  TLS

Benchmarking Post-Quantum Cryptography in TLS

... Alongside the development and standardization of post-quantum algorithms in the NIST Post- Quantum Cryptography Standardization project, there have been various efforts to begin preparing the TLS ...

21

Pre-   and  post-quantum  Diffie--Hellman  from  groups,  actions,   and  isogenies

Pre- and post-quantum Diffie--Hellman from groups, actions, and isogenies

... commutative quadratic orders, these curves behave like ordinary curves, and the Couveignes–Rostovtsev–Stolbunov protocol carries over without modifica- tion. However, the fact that these curves necessarily have order p + ...

40

Comment  on  Quantum  Cryptography---Which  is  More  Important,  Signal  Security,  Information  Security  or  Communication  Reliability

Comment on Quantum Cryptography---Which is More Important, Signal Security, Information Security or Communication Reliability

... Classical cryptography aims to prevent the adversary from recovering the embedded information in communication signals or from cheating users. It assumes that an adversary can almost completely eliminate the ...

7

Florida: Party Activists in a Two-Party System

Florida: Party Activists in a Two-Party System

... were ten years ago, a majority of party activists still perceived divisions between different ideological viewpoints. Additionally, a majority saw differences between supporters of different leaders. On the other ...

18

Louisiana: Two-Party Growth and Increasing Party Polarization

Louisiana: Two-Party Growth and Increasing Party Polarization

... As one can see from Table 1, Republican candidates have been more successful in winning some offices than others. In the last 11 presidential elections, Louisiana voters have gone with the Republican nominee six times, ...

16

Show all 10000 documents...

Related subjects