2017 20th Conference of Open Innovations Association (FRUCT) 2017
DOI: 10.23919/fruct.2017.8071325
|View full text |Cite
|
Sign up to set email alerts
|

Symmetric encryption for error correction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…2. Alice generates a random key K and use it to encrypt C by a symmetric key algorithm [28] to obtain a new packet P. One possibility is to use an error correcting code such as [29] in order to overcome errors due to noisy channels or imperfect photon detectors. For optimal security, a one-time pad symmetric key whose length is at least as long as the message should be used.…”
Section: Dsqc Protocol Without Entanglementmentioning
confidence: 99%
“…2. Alice generates a random key K and use it to encrypt C by a symmetric key algorithm [28] to obtain a new packet P. One possibility is to use an error correcting code such as [29] in order to overcome errors due to noisy channels or imperfect photon detectors. For optimal security, a one-time pad symmetric key whose length is at least as long as the message should be used.…”
Section: Dsqc Protocol Without Entanglementmentioning
confidence: 99%