Search results for: CRYPTOGRAPHIC PROTOCOLS - Bridge of Knowledge

Search

Search results for: CRYPTOGRAPHIC PROTOCOLS

Search results for: CRYPTOGRAPHIC PROTOCOLS

  • Cryptographic Protocols' Performance and Network Layer Security of RSMAD

    Publication

    W artykule omówiono architekturę bezpieczeństwa warstwy sieciowej Radiowego Systemu Monitorowania i Akwizycji Danych z urządzeń fotoradarowych (w skrócie RSMAD). Bezpieczeństwo w warstwie sieciowej tego systemu jest zapewniane przede wszystkim dzięki wykorzystaniu Virtual Private Network (w skrócie VPN). W tym celu zaimplementowano dwa protokoły IPsec i L2TP.Zastosowane mechanizmy ochrony danych, w tym typy i parametry VPNów zostały...

    Full text to download in external service

  • International Workshop on Group-Oriented Cryptographic Protocols

    Conferences

  • Multipartite secret key distillation and bound entanglement

    Publication

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable...

    Full text available to download

  • No Quantum Realization of Extremal No-Signaling Boxes

    Publication

    - PHYSICAL REVIEW LETTERS - Year 2016

    The study of quantum correlations is important for fundamental reasons as well as for quantum communication and information processing tasks. On the one hand, it is of tremendous interest to derive the correlations produced by measurements on separated composite quantum systems from within the set of all correlations obeying the no-signaling principle of relativity, by means of information-theoretic principles. On the other hand,...

    Full text to download in external service

  • General paradigm for distilling classical key from quantum states

    Publication

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2009

    In this paper, we develop a formalism for distilling aclassical key from a quantum state in a systematic way, expandingon our previous work on a secure key from bound entanglement(Horodecki et al., 2005). More detailed proofs, discussion, andexamples are provided of the main results. Namely, we demonstratethat all quantum cryptographic protocols can be recast in away which looks like entanglement theory, with the only changebeing...

    Full text to download in external service