-
601
-
602
Low-density random matrices for secret key extraction
Published 2014“…Motivated by the requirements of high-speed quantum key distribution, we study secret-key extraction methods with simple and efficient hardware implementations, in particular, linear transformations based on low-density random matrices. …”
Get full text
Get full text
Article -
603
Quality-improved and secure multicast delivery method in mobile IPv6 networks
Published 2011“…With widespread deployment of multicast over Wireless Local Area Networks (WLANs), several issues including fixed data rate transmission, multicast key distribution security, and overlapped multicast address have to be addressed for accommodating an efficient multicast scheme for WLANs. …”
Get full text
Conference or Workshop Item -
604
Women in physics: an interview with Urbasi Sinha
Published 2024-03-01“…Her research is in the field of quantum technologies, where she uses experimental methods to investigate quantum information processing, precision tests of quantum mechanics, photonic quantum computing as well as quantum communications including quantum key distribution (QKD) in free space, fibre and integrated photonics.…”
Get full text
Article -
605
Building a quantum wireless network
Published 2024“…Quantum Key Distribution (QKD) over optical fibres is a well-established area of research. …”
Conference item -
606
A classical groupoid model for quantum networks
Published 2017“…This network architecture allows the direct execution of a number of protocols that are usually associated with quantum networks, including teleportation, dense coding and secure key distribution.…”
Conference item -
607
Securing Group Patient Communication in 6G-Aided Dynamic Ubiquitous Healthcare with Real-Time Mobile DNA Sequencing
Published 2023-07-01“…Since heath data and medical information are very sensitive, security and privacy concerns in the communication systems have become extremely important. (3) Purpose: the author aims to propose a dynamic group-based patient-authenticated key distribution protocol for 6G-aided U-healthcare services enabled by mobile DNA sequencing. …”
Get full text
Article -
608
Transmission of O-band wavelength-division-multiplexed heralded photons over a noise-corrupted optical fiber channel
Published 2014“…We discussed and clarified the prospects and limitations of the photon heralding scheme for noise-tolerant quantum key distribution.…”
Get full text
Get full text
Journal Article -
609
Hybrid Cryptographic Approach for Internet Ofhybrid Cryptographic Approach for Internet Of things Applications: A Review
Published 2020“…On the other hand the asymmetric scheme solves the secret key distribution issue; yet the standalone technique is slow and consumes more computer resources compared to the symmetric encryption. …”
Get full text
Article -
610
A classical groupoid model for quantum networks
Published 2019-03-01“…This network architecture allows the direct execution of a number of protocols that are usually associated with quantum networks, including teleportation, dense coding and secure key distribution.…”
Get full text
Article -
611
Eavesdropping on quantum-cryptographical systems.
Published 1994“…In this paper, we analyze various eavesdropping techniques, which may be either translucent or opaque to the transmitted photons, and we estimate the error rate above which the key distribution is deemed unsafe and should be abandoned. © 1994 The American Physical Society.…”
Journal article -
612
Continuous-variable quantum cryptography with discrete alphabets: Composable security under collective Gaussian attacks
Published 2021-01-01“…We consider continuous-variable quantum key distribution with discrete-alphabet encodings. In particular, we study protocols where information is encoded in the phase of displaced coherent (or thermal) states, even though the results can be directly extended to any protocol based on finite constellations of displaced Gaussian states. …”
Get full text
Article -
613
Genuine multipartite Bell inequality for device-independent conference key agreement
Published 2020-05-01“…A class of genuine multipartite Bell inequalities is presented, which is designed for multipartite device-independent (DI) quantum key distribution (QKD). We prove the classical bounds of this inequality and compute DI secret-key rates based on its violation. …”
Get full text
Article -
614
Cryptographic Protection in Maintenance and Management System of Ground Vehicles
Published 2012-03-01“…Messages from BT to CC are signed. Key distribution is provided by Key Management Center. …”
Get full text
Article -
615
High-stability time-domain balanced homodyne detector for ultrafast optical pulse applications
Published 2011“…Low-noise, efficient, phase-sensitive time-domain optical detection is essential for foundational tests of quantum physics based on optical quantum states and the realization of numerous applications ranging from quantum key distribution to coherent classical telecommunications. …”
Conference item -
616
Effects of reduced measurement independence on Bell-based randomness expansion.
Published 2012“…With the advent of quantum information, the violation of a Bell inequality is used to witness the absence of an eavesdropper in cryptographic scenarios such as key distribution and randomness expansion. One of the key assumptions of Bell's theorem is the existence of experimental "free will," meaning that measurement settings can be chosen at random and independently by each party. …”
Journal article -
617
On the Development of a Protection Profile Module for Encryption Key Management Components
Published 2023-01-01“…The quantum-safe aspect of key distribution protocols is further investigated to support EKM products with quantum-resistant algorithms and quantum key distribution features. …”
Get full text
Article -
618
Exact rate analysis for quantum repeaters with imperfect memories and entanglement swapping as soon as possible
Published 2023-05-01“…In an even more realistic setting, we consider additional tools and parameters such as memory cutoffs, multiplexing, initial state and swapping gate fidelities, and finite link coupling efficiencies in order to identify potential regimes in memory-assisted quantum key distribution beyond one middle station that exceed the rates of the smallest quantum repeaters as well as those obtainable in all-optical schemes unassisted by stationary memory qubits and two-way classical communication. …”
Get full text
Article -
619
Hybrid cryptographic approach for internet of things applications: a review
Published 2020“…On the other hand the asymmetric scheme solves the secret key distribution issue; yet the standalone technique is slow and consumes more computer resources compared to the symmetric encryption. …”
Get full text
Article -
620
THE RISE OF MOBILE BANKING
Published 2015-12-01“…The paper aims to provide an overview of the latest electronic financial channel, underlining various aspects of mobile banking as it represents a key distribution channel for a growing number of customers.…”
Get full text
Article