2019
DOI: 10.3390/e21090872
|View full text |Cite
|
Sign up to set email alerts
|

Integrating Classical Preprocessing into an Optical Encryption Scheme

Abstract: Traditionally, cryptographic protocols rely on mathematical assumptions and results to establish security guarantees. Quantum cryptography has demonstrated how physical properties of a communication channel can be leveraged in the design of cryptographic protocols, too. Our starting point is the AlphaEta protocol, which was designed to exploit properties of coherent states of light to transmit data securely over an optical channel. AlphaEta aims to draw security from the uncertainty of any measurement of the t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(11 citation statements)
references
References 19 publications
0
11
0
Order By: Relevance
“…The second motivating application is due to Pham et al [13], who studied the use of all-or-nothing transforms in the secure transmission of information across two channels, where one of the channels is using optical encryption to provide security. Their results are valid if the secure channel is achieved using another information theoretically secure scheme, for example, a one-time pad.…”
Section: Corollary 2 [17]mentioning
confidence: 99%
See 4 more Smart Citations
“…The second motivating application is due to Pham et al [13], who studied the use of all-or-nothing transforms in the secure transmission of information across two channels, where one of the channels is using optical encryption to provide security. Their results are valid if the secure channel is achieved using another information theoretically secure scheme, for example, a one-time pad.…”
Section: Corollary 2 [17]mentioning
confidence: 99%
“…Since we know which output blocks are transmitted over the secure channel, the all-or-nothing transform only needs to satisfy a weaker condition, namely that no information can be obtained about any input block as long as the output blocks that are sent over the secure channel are not available. Consequently, Pham et al [13] define restricted AONTs so that they satisfy this condition. We investigate these AONTs further in Section 4.…”
Section: Corollary 2 [17]mentioning
confidence: 99%
See 3 more Smart Citations