搜索结果: 1-12 共查到“理学 Quantum Cryptography”相关记录12条 . 查询时间(0.078 秒)
Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography
quantum cryptography gated avalanche photodiodes
2011/9/13
Semiconductor avalanche photodiodes (APDs) are commonly used for single photon detection in quantum key distribution. Recently, many attacks using bright illumination have been proposed to manipulate ...
Perfect eavesdropping on a quantum cryptography system
cryptography system Quantum Physics
2010/11/8
The stated goal of quantum key distribution (QKD) is to grow a secret key securely between two parties with a minimum of additional assumptions. The number of assumptions has been continuously reduced...
Position-Based Quantum Cryptography: Impossibility and Constructions
Quantum Cryptography Impossibility Constructions
2010/10/19
In this work, we study position-based cryptography in the quantum setting. The aim is to use the geographical position of a party as its only credential. On the negative side, we show that if adversar...
Post Quantum Cryptography from Mutant Prime Knots
Post Quantum Cryptography Mutant Prime Knots
2010/11/11
By resorting to basic features of topological knot theory we propose a (classical) cryptographic protocol based on the `difficulty' of decomposing complex knots generated as connected sums of prime kn...
Insecurity of position-based quantum cryptography protocols against entanglement attacks
Insecurity position-based quantum cryptography protocols entanglement attacks
2010/10/19
Recently, position-based quantum cryptography has been claimed to be unconditionally secure.
On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in ...
Thermal blinding of gated detectors in quantum cryptography
Thermal blinding gated detectors quantum cryptography
2010/10/19
It has previously been shown that the gated detectors of two commercially available quantum key
distribution (QKD) systems are blindable and controllable by an eavesdropper using continuouswave illum...
Avoiding the Detector Blinding Attack on Quantum Cryptography
Detector Blinding Attack Quantum Cryptography
2010/10/21
Although the protocols used for quantum key distribution (QKD) have been proven to be unconditionally secret, the security of actual hardware depends critically on the detail of their implementation. ...
Fully automated entanglement-based quantum cryptography system for telecom fiber networks
quantum cryptography system telecom fiber networks
2010/4/8
We present a quantum key distribution (QKD) system based on polarisation entanglement for use in telecom fibers. A QKD exchange up to 50km was demonstrated in the laboratory with a secure key rate of ...
Eavesdropping of two-way coherent-state quantum cryptography via Gaussian quantum cloning machines
two-way coherent-state quantum cryptography Gaussian quantum cloning machines
2010/4/9
We consider one of the quantum key distribution protocols recently introduced in Ref. [Pirandola et al., Nature Physics 4, 726 (2008)]. This protocol consists in a two-way quantum communication betwee...
Attack of Many Eavesdroppers via Optimal Strategy in Quantum Cryptography
Eavesdroppers Optimal Strategy Quantum Cryptography
2010/4/8
We examine a situation that $n$ eavesdroppers attack the Bennett-Brassard cryptographic protocol via their own optimal and symmetric strategies. Information gain and mutual information with sender for...
Quantum Resonance near Optimal Eavesdropping in Quantum Cryptography
Quantum Optimal Eavesdropping Quantum Cryptography
2010/4/7
We find a resonance behavior in the disturbance when an eavesdropper chooses a near-optimal strategy intentionally or unintentionally when the usual Bennett-Brassard cryptographic scheme is performed ...
We consider quantum cryptographic schemes where the carriers of information are 3-state particles. One protocol uses four mutually unbiased bases and appears to provide better security than obtainable...