搜索结果: 1-7 共查到“物理学 Attack”相关记录7条 . 查询时间(0.078 秒)
Source attack of decoy-state quantum key distribution using phase information
Source attack decoy-state quantum key distribution phase information
2016/1/23
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many...
Wiesner's quantum money [5] is a simple, information-theoretically secure quantum cryptographic protocol. In his protocol, a mint issues quantum bills and anyone can query the mint to authenticate a ...
nse-Coding Attack on Three-Party Quantum Key Distribution Protocols
nse-Coding Attack Three-Party Quantum Key Distribution Protocols
2010/10/19
Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key d...
Avoiding the Detector Blinding Attack on Quantum Cryptography
Detector Blinding Attack Quantum Cryptography
2010/10/21
Although the protocols used for quantum key distribution (QKD) have been proven to be unconditionally secret, the security of actual hardware depends critically on the detail of their implementation. ...
We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanch...
Attack of Many Eavesdroppers via Optimal Strategy in Quantum Cryptography
Eavesdroppers Optimal Strategy Quantum Cryptography
2010/4/8
We examine a situation that $n$ eavesdroppers attack the Bennett-Brassard cryptographic protocol via their own optimal and symmetric strategies. Information gain and mutual information with sender for...
Detrended Fluctuation Analysis on Correlations of Complex Networks
Under Attack and Repair Strategy
correlations detrended fluctuation analysis complex networks
2007/8/15
2006Vol.45No.4pp.765-768DOI:
Detrended Fluctuation Analysis on Correlations of Complex Networks
Under Attack and Repair Strategy
CHI Li-Ping, YANG Chun-Bin, MA Ke, and CAI Xu
...