2008
DOI: 10.1016/j.ins.2007.11.013
|View full text |Cite
|
Sign up to set email alerts
|

Unconditionally secure cryptosystems based on quantum cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
2

Year Published

2011
2011
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 44 publications
0
5
0
2
Order By: Relevance
“…If alike apparatus is alternated at 45 it will record slanting directions. Thus the alternated gadget is unusable for rectilinear track and vertical gadget for diagonal directive .henceforward cannot amount both concurrently thus confirming Heisenberg uncertainty principle [8]. BB84 Protocol was developed by Charles H, Bennett of the IBM Thomas J. Watson Research Centre and Gilles Brassard of the University of Montreal, quantum cryptography is wipe out information about the features before dimension .It uses two channels-quantum by which Alice and bob send polarized photons second is classical public channel by which they send ordinary messages such as comparing and conferring the signals sent through quantum channel [13].…”
Section: Quantum Cryptographymentioning
confidence: 75%
See 1 more Smart Citation
“…If alike apparatus is alternated at 45 it will record slanting directions. Thus the alternated gadget is unusable for rectilinear track and vertical gadget for diagonal directive .henceforward cannot amount both concurrently thus confirming Heisenberg uncertainty principle [8]. BB84 Protocol was developed by Charles H, Bennett of the IBM Thomas J. Watson Research Centre and Gilles Brassard of the University of Montreal, quantum cryptography is wipe out information about the features before dimension .It uses two channels-quantum by which Alice and bob send polarized photons second is classical public channel by which they send ordinary messages such as comparing and conferring the signals sent through quantum channel [13].…”
Section: Quantum Cryptographymentioning
confidence: 75%
“…A supplementary breakable end is key storage. It also cannot be used almost due to the practical infeasibility of keeping up photons for additional than a tiny helping of a second [8]..…”
Section: Quantum Cryptographymentioning
confidence: 99%
“…El intruso, entonces, puede ser detectado debido a la modificación que sufre el estado cuántico del sistema. Por lo tanto, el estudio y desarrollo de la criptología cuántica está enfocada a la investigación de un Protocolo de Distribución de Clave Cuántica (QKD) 5 que sea práctico y eficiente [5]. Además, recientemente se ha convertido en un tema importante de investigación en la mecánica cuántica.…”
Section: Importancia De La Criptografía Cuánticaunclassified
“…Los protocolos de distribución de claves más recientes se basan en el teorema de Bell [5,15]. Estos protocolos transmiten las partículas entrelazadas entre un emisor y un receptor, permitiendo a ambos comparar abiertamente sus partículas recibidas y verificar si sus estados cuánticos violan la desigualdad de Bell.…”
Section: Los Protocolos Qkd Basados En Las Desigualdades De Bellunclassified
“…Signature schemes are classified based on whether they use a known message or an unknown message [6]. Quantum signature is an alternative to digital signature and takes advantages of quantum mechanics to provide unconditionally secure information exchange [7].…”
Section: Introductionmentioning
confidence: 99%