Listing 1 - 10 of 28 | << page >> |
Sort by
|
Choose an application
This thesis by Alvaro Alarcón Cuevas explores advancements in quantum communication through the development of a fiber-optic platform. The work addresses the challenges of data security in optical networks by implementing quantum key distribution (QKD) methods, which utilize natural properties rather than mathematical constructs for data encryption. The thesis introduces a novel approach that combines phase-coded systems with time-bin schemes, effectively reducing losses and demonstrating compatibility with existing optical networks. The study successfully transmits phase-coded single-photon states over a 500-meter few-mode fiber and supports orbital angular momentum (OAM) modes, paving the way for more efficient quantum communication systems. This research is intended for professionals and academics in the fields of quantum mechanics and optical engineering.
Choose an application
This dissertation by Aysajan Abidin explores Quantum Key Distribution (QKD), focusing on its security proof and the role of universal hash functions. The work examines the challenges associated with maintaining unconditional security in QKD, especially given the impracticality of immutable public communication channels. The text delves into the Wegman-Carter authentication scheme, analyzing its application in QKD with almost strongly universal hash functions to enhance security. Further, it addresses the necessity of using a one-time pad encryption to maintain the secrecy of hash functions. The dissertation is intended for researchers and professionals in the field of quantum cryptography and information security, offering new constructions and security proofs to advance QKD methods. The author's goal is to improve the efficiency and security of cryptographic key distribution systems.
Choose an application
Jonathan Jogenfors' dissertation, 'Breaking the Unbreakable: Exploiting Loopholes in Bell’s Theorem to Hack Quantum Cryptography,' explores the vulnerabilities in quantum key distribution systems. By examining energy-time entangled systems, the work identifies loopholes that could be exploited by attackers. The thesis discusses the no-cloning theorem and the potential of quantum money, proposing a novel concept of Quantum Bitcoin, which integrates blockchain technology. The study aims to enhance the security of quantum cryptography and is intended for researchers and professionals in quantum physics and cryptography.
Choose an application
This thesis explores vulnerabilities in energy-time entangled quantum key distribution (QKD) systems, particularly those using Franson-based setups. The author demonstrates how security proofs relying on Bell inequality violations can be faked, potentially compromising the system's integrity. Utilizing pulsed and classical light, an attacker can mimic secure conditions, highlighting significant risks. The work offers solutions to strengthen QKD systems against such attacks. This research is aimed at advancing secure quantum communication methods, suitable for academic and professional audiences in quantum physics and cryptography.
Choose an application
"This new book discusses the concepts while also highlighting the challenges in the field of quantum cryptography, also covering cryptographic techniques and cyber security techniques, in a single volume. It comprehensively covers important topics in the field of quantum cryptography with applications, including quantum key distribution, position-based quantum cryptography, quantum teleportation, quantum e-commerce, quantum cloning, cyber security techniques architectures and design, cyber security techniques management, software defined networks, and cyber security techniques for 5G communication. The text also discusses the security of practical quantum key distribution systems, applications and algorithms developed for quantum cryptography, as well as cyber security through quantum computing and quantum cryptography. The text will be beneficial for graduate students, academic researchers, and professionals working in the fields of electrical engineering, electronics and communications engineering, computer science, and information technology"--
Data encryption (Computer science) --- Computer networks --- Quantum cryptography. --- Security measures.
Choose an application
The main emphasis of this work is the mathematical theory of quantum channels and their entropic and information characteristics. Quantum information theory is one of the key research areas, since it leads the way to vastly increased computing speeds by using quantum systems to store and process information. Quantum cryptography allows for secure communication of classified information. Research in the field of quantum informatics, including quantum information theory, is in progress in leading scientific centers throughout the world. The past years were marked with impressive progress made by several researchers in solution of some difficult problems, in particular, the additivity of the entropy characteristics of quantum channels. This suggests a need for a book that not only introduces the basic concepts of quantum information theory, but also presents in detail some of the latest achievements.
Information theory in physics. --- Quantum entropy. --- Quantum Computing. --- Quantum Cryptography. --- Quantum Information. --- Quantum Systems. --- Quantum Theory.
Choose an application
This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.
Post-Quantum Cryptography --- Gauss Lattice --- Reduction --- Learning With Errors --- FHE --- Fourier transform --- Ideal lattice --- NTRU --- Smoothing parameters --- Discrete Gaussian measure
Choose an application
In quantum cryptography, the first secure protocol to have been formalized is the BB84 protocol. In this master's thesis, we analyze its security under dissipation, weak measurements combined with artificial intelligence, and quantum feedback.
quantum physics --- quantum key distribution --- quantum cryptography --- BB84 --- homodyne measurement --- AI --- Physique, chimie, mathématiques & sciences de la terre > Physique
Choose an application
Quantum communication --- Quantum communication. --- Quantum communications --- Optical communications --- quantum cryptography --- optical fibre networks --- quantum optics --- quantum computing --- quantum wireless communication --- Teoria quàntica --- Teoria quàntica.
Choose an application
Cryptography. --- Quantum cryptography. --- Cryptography --- Quantum theory --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)
Listing 1 - 10 of 28 | << page >> |
Sort by
|