Narrow your search
Listing 1 - 10 of 28 << page
of 3
>>
Sort by

Book
Few-Mode-Fiber Platform for Quantum Communication Applications
Author:
ISBN: 9179293263 9179293271 Year: 2022 Publisher: Linkopings Universitet

Loading...
Export citation

Choose an application

Bookmark

Abstract

This thesis by Alvaro Alarcón Cuevas explores advancements in quantum communication through the development of a fiber-optic platform. The work addresses the challenges of data security in optical networks by implementing quantum key distribution (QKD) methods, which utilize natural properties rather than mathematical constructs for data encryption. The thesis introduces a novel approach that combines phase-coded systems with time-bin schemes, effectively reducing losses and demonstrating compatibility with existing optical networks. The study successfully transmits phase-coded single-photon states over a 500-meter few-mode fiber and supports orbital angular momentum (OAM) modes, paving the way for more efficient quantum communication systems. This research is intended for professionals and academics in the fields of quantum mechanics and optical engineering.


Book
Authentication in Quantum Key Distribution : Security Proof and Universal Hash Functions
Author:
ISBN: 9789175196251 Year: 2013 Publisher: Linkopings Universitet

Loading...
Export citation

Choose an application

Bookmark

Abstract

This dissertation by Aysajan Abidin explores Quantum Key Distribution (QKD), focusing on its security proof and the role of universal hash functions. The work examines the challenges associated with maintaining unconditional security in QKD, especially given the impracticality of immutable public communication channels. The text delves into the Wegman-Carter authentication scheme, analyzing its application in QKD with almost strongly universal hash functions to enhance security. Further, it addresses the necessity of using a one-time pad encryption to maintain the secrecy of hash functions. The dissertation is intended for researchers and professionals in the field of quantum cryptography and information security, offering new constructions and security proofs to advance QKD methods. The author's goal is to improve the efficiency and security of cryptographic key distribution systems.


Book
Breaking the Unbreakable : Exploiting Loopholes in Bell's Theorem to Hack Quantum Cryptography
Author:
ISBN: 9789176854600 Year: 2017 Publisher: Linkopings Universitet

Loading...
Export citation

Choose an application

Bookmark

Abstract

Jonathan Jogenfors' dissertation, 'Breaking the Unbreakable: Exploiting Loopholes in Bell’s Theorem to Hack Quantum Cryptography,' explores the vulnerabilities in quantum key distribution systems. By examining energy-time entangled systems, the work identifies loopholes that could be exploited by attackers. The thesis discusses the no-cloning theorem and the potential of quantum money, proposing a novel concept of Quantum Bitcoin, which integrates blockchain technology. The study aims to enhance the security of quantum cryptography and is intended for researchers and professionals in quantum physics and cryptography.


Book
Classical-Light Attack on Energy-Time Entangled Quantum Key Distribution, and Countermeasures
Author:
ISBN: 9789175191188 Year: 2015 Publisher: Linkopings Universitet

Loading...
Export citation

Choose an application

Bookmark

Abstract

This thesis explores vulnerabilities in energy-time entangled quantum key distribution (QKD) systems, particularly those using Franson-based setups. The author demonstrates how security proofs relying on Bell inequality violations can be faked, potentially compromising the system's integrity. Utilizing pulsed and classical light, an attacker can mimic secure conditions, highlighting significant risks. The work offers solutions to strengthen QKD systems against such attacks. This research is aimed at advancing secure quantum communication methods, suitable for academic and professional audiences in quantum physics and cryptography.


Book
Holistic approach to quantum cryptography in cyber security
Author:
ISBN: 1003296033 1003296033 100061445X 1000614506 Year: 2023 Publisher: Boca Raton, Florida ; London ; New York : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"This new book discusses the concepts while also highlighting the challenges in the field of quantum cryptography, also covering cryptographic techniques and cyber security techniques, in a single volume. It comprehensively covers important topics in the field of quantum cryptography with applications, including quantum key distribution, position-based quantum cryptography, quantum teleportation, quantum e-commerce, quantum cloning, cyber security techniques architectures and design, cyber security techniques management, software defined networks, and cyber security techniques for 5G communication. The text also discusses the security of practical quantum key distribution systems, applications and algorithms developed for quantum cryptography, as well as cyber security through quantum computing and quantum cryptography. The text will be beneficial for graduate students, academic researchers, and professionals working in the fields of electrical engineering, electronics and communications engineering, computer science, and information technology"--


Book
Quantum systems, channels, information : a mathematical introduction
Author:
Year: 2012 Publisher: Berlin : Walter de Gruyter GmbH & Co. KG,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The main emphasis of this work is the mathematical theory of quantum channels and their entropic and information characteristics. Quantum information theory is one of the key research areas, since it leads the way to vastly increased computing speeds by using quantum systems to store and process information. Quantum cryptography allows for secure communication of classified information. Research in the field of quantum informatics, including quantum information theory, is in progress in leading scientific centers throughout the world. The past years were marked with impressive progress made by several researchers in solution of some difficult problems, in particular, the additivity of the entropy characteristics of quantum channels. This suggests a need for a book that not only introduces the basic concepts of quantum information theory, but also presents in detail some of the latest achievements.


Book
Modern Cryptography Volume 2 : A Classical Introduction to Informational and Mathematical Principle.
Authors: --- ---
Year: 2023 Publisher: Singapore : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.


Dissertation
Mémoire
Authors: --- --- --- --- --- et al.
Year: 2024 Publisher: Liège Université de Liège (ULiège)

Loading...
Export citation

Choose an application

Bookmark

Abstract

In quantum cryptography, the first secure protocol to have been formalized is the BB84 protocol. In this master's thesis, we analyze its security under dissipation, weak measurements combined with artificial intelligence, and quantum feedback.


Periodical
IET quantum communication.
Author:
ISSN: 26328925 Year: 2020 Publisher: [Stevenage, Herts, U.K.] : [Hoboken N.J.] : Institution of Engineering and Technology, John Wiley & Sons [on behalf of The Institution of Engineering and Technology]


Book
Quantum cryptography in advanced networks
Author:
ISBN: 1839622504 1839622490 Year: 2019 Publisher: London, England : Intech,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 28 << page
of 3
>>
Sort by