全部文献期刊会议图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Mahdi H. Al Hasani , Kais A. Al Naimee
来源:[J].Optics and Laser Technology(IF 1.365), 2019, Vol.119
摘要:Abstract(#br)In this paper the experimental and the numerical study of an optical key distribution quantum cryptography using BB84 protocol has been achieved. We create secret quantum key and the security of BB84 protocol is tested by inserting Eve in the system, the presence of ...
作者:Bi Qiao , Harry E. Ruda , Zeng Xianghua ...
来源:[J].Physica A: Statistical Mechanics and its Applications(IF 1.676), 2003, Vol.320, pp.357-370
摘要:Abstract(#br)A formulation is presented for quantum cryptography based on two mixed states in rigged Hilbert space. This is distinct from the usual scheme for quantum cryptography based on Hilbert space and Von Neumann quantum mechanics, excluding the effects of decoherence. We s...
作者:Linsen Wu , Yuhua Chen
来源:[J].Entropy(IF 1.347), 2015, Vol.17 (5), pp.2919-2931
摘要:... Classical cryptography widely used nowadays is based on computational complexity, which means that it assumes that solving some particular mathematical problems is hard on a classical computer. With the development of supercomputers and, potentially, quantum computers, classi...
作者:Serge Fehr
来源:[J].Foundations of Physics(IF 1.17), 2010, Vol.40 (5), pp.494-531
摘要:Abstract(#br)Quantum cryptography makes use of the quantum-mechanical behavior of nature for the design and analysis of cryptographic schemes. Optimally (but not always), quantum cryptography allows for the design of cryptographic schemes whose security is guaranteed solely by th...
作者:I. M. Arbekov , S. N. Molotkov
来源:[J].Journal of Experimental and Theoretical Physics(IF 0.921), 2017, Vol.125 (1), pp.50-64
摘要:The proof of the security of quantum key distribution is a rather complex problem. Security is defined in terms different from the requirements imposed on keys in classical cryptography. In quantum cryptography, the security of keys is expressed in terms of the closeness of the quantum...
作者:Florian Kammüller
来源:[J].Computers & Security(IF 1.158), 2019, Vol.87
摘要:Abstract(#br)In this paper, we present a proof calculus for Attack Trees and how its application to Quantum Cryptography is made possible by extending the framework to probabilistic reasoning on attacks. Attack trees are a well established and useful model for the construction of...
作者:Koji Nagata , Tadao Nakamura
来源:[J].International Journal of Theoretical Physics(IF 1.086), 2017, Vol.56 (7), pp.2086-2100
摘要:First, we study several information theories based on quantum computing in a desirable noiseless situation. (1) We present quantum key distribution based on Deutsch’s algorithm using an entangled state. (2) We discuss the fact that the Bernstein-Vazirani algorithm can be use...
作者:Laszlo Gyongyosi , Sandor Imre
来源:[J].Information Sciences(IF 3.643), 2014, Vol.285, pp.1-23
摘要:Abstract(#br)The security of quantum key distribution (QKD) relies on the no-cloning theorem, which allows no to copy perfectly a quantum system. An eavesdropping activity on the quantum channel perturbs the state of the quantum states, which results in noise at the receiver. The...
作者:Piotr Bilski , Wiesław Winiecki
来源:[J].Measurement(IF 1.13), 2013, Vol.46 (10), pp.4353-4361
摘要:... To decrease the threat of the adversary disguising as the authorized node and eavesdropping the transmission, the quantum cryptography scheme is used. The paper presents the modifications and practical implementation issues of such a communication scheme in the distributed me...
作者:Miloslav Dušek , Ondřej Haderka , Martin Hendrych
来源:[J].Optics Communications(IF 1.438), 1999, Vol.169 (1), pp.103-108
摘要:Abstract(#br)As it is very difficult to prepare a good approximation of one-photon states, practical quantum cryptography uses highly attenuated laser pulses which can well be represented by coherent states with average photon number below one photon. In such a case more than one...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×