Wyniki wyszukiwania dla: SECRET-KEY - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: SECRET-KEY

Wyniki wyszukiwania dla: SECRET-KEY

  • Multipartite secret key distillation and bound entanglement

    Publikacja

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable...

    Pełny tekst do pobrania w portalu

  • Efficient bounds on quantum-communication rates via their reduced variants

    Publikacja

    - PHYSICAL REVIEW A - Rok 2010

    We investigate one-way communication scenarios where Bob operating on his component can transfer some subsystem to the environment. We define reduced versions of quantum-communication rates and, further, prove upper bounds on a one-way quantum secret key, distillable entanglement, and quantum-channel capacity by means of their reduced versions. It is shown that in some cases they drastically improve their estimation.

    Pełny tekst do pobrania w portalu

  • Device-independent quantum key distribution based on measurement inputs

    Publikacja

    - PHYSICAL REVIEW A - Rok 2015

    We provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....

    Pełny tekst do pobrania w portalu

  • Quantum privacy witness

    Publikacja

    - PHYSICAL REVIEW A - Rok 2012

    While it is usually known that the mean value of a single observable is enough to detect entanglement or its distillability, the counterpart of such an approach in the case of quantum privacy has been missing. Here we develop the concept of a privacy witness, i.e., a single observable that may detect the presence of the secure key even in the case of bound entanglement. Then we develop the notion of secret-key estimation based...

    Pełny tekst do pobrania w portalu

  • Strong Monogamies of No-Signaling Violations for Bipartite Correlation Bell Inequalities

    Publikacja

    - PHYSICAL REVIEW LETTERS - Rok 2014

    The phenomenon of monogamy of Bell inequality violations is interesting both from the fundamental perspective as well as in cryptographic applications such as the extraction of randomness and secret bits. In this article, we derive new and stronger monogamy relations for violations of Bell inequalities in general no-signaling theories. These relations are applicable to the class of binary output correlation inequalities known as...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm

    Publikacja

    - Rok 2014

    We consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Silent Signals The Covert Network Shaping the Future

    Publikacja

    - Rok 2007

    Silent Signals The Covert Network Shaping the Future In a world dominated by information flow and rapid technological advancements, the existence of hidden networks and unseen influences has never been more relevant. "Silent Signals: The Covert Network Shaping the Future" delves deep into the mysterious and often opaque world of covert communication networks. This influential work sheds light on the silent...

    Pełny tekst do pobrania w portalu

  • Incorporating Iris, Fingerprint and Face Biometric for Fraud Prevention in e-Passports Using Fuzzy Vault

    Publikacja

    - IET Image Processing - Rok 2019

    A unified frame work which provides a higher security level to e-passports is proposed. This framework integrates face, iris and fingerprint images. It involves three layers of security: the first layer maps a biometric image to another biometric image which is called biostego image. Three mapping schemes are proposed: the first scheme maps single biometric image to single biostego image, the second scheme maps dual biometric images...

    Pełny tekst do pobrania w portalu

  • Trade-offs in multiparty Bell-inequality violations in qubit networks

    Publikacja

    - PHYSICAL REVIEW A - Rok 2018

    Two overlapping bipartite binary input Bell inequalities cannot be simultaneously violated as this would contradict the usual no-signalling principle. This property is known as monogamy of Bell inequality violations and generally Bell monogamy relations refer to trade-offs between simultaneous violations of multiple inequalities. It turns out that multipartite Bell inequalities admit weaker forms of monogamies that allow for violations...

    Pełny tekst do pobrania w portalu