메뉴 건너뛰기




Volumn 8, Issue 7, 2013, Pages

Information Theoretically Secure, Enhanced Johnson Noise Based Key Distribution over the Smart Grid with Switched Filters

Author keywords

[No Author keywords available]

Indexed keywords

ARTICLE; COMPUTER PROGRAM; COMPUTER SECURITY; ELECTRICITY; FILTER; INFORMATION PROCESSING; K NEAREST NEIGHBOR; MATHEMATICAL ANALYSIS; NOISE REDUCTION; PRIVACY; STANDARD; TELECOMMUNICATION;

EID: 84880842410     PISSN: None     EISSN: 19326203     Source Type: Journal    
DOI: 10.1371/journal.pone.0070206     Document Type: Article
Times cited : (50)

References (31)
  • 1
    • 84880794842 scopus 로고    scopus 로고
    • Obama to share cybersecurity priorities with congress
    • February 26. Accessed June 26, 2013
    • Engleman E, Robertson J (2013) Obama to share cybersecurity priorities with congress. Blomberg News, February 26. http://www.bloomberg.com/news/2013-02-27/obama-to-share-cybersecurity-priorities-with-congress.html. Accessed June 26, 2013.
    • (2013) Blomberg News
    • Engleman, E.1    Robertson, J.2
  • 3
    • 79960922435 scopus 로고    scopus 로고
    • Smart Fault Location for Smart Grids
    • Kezunovic M, (2011) Smart Fault Location for Smart Grids. IEEE Trans. Smart Grid 2: 11-22.
    • (2011) IEEE Trans Smart Grid , vol.2 , pp. 11-22
    • Kezunovic, M.1
  • 9
    • 77957566438 scopus 로고    scopus 로고
    • Hacking commercial quantum cryptography systems by tailored bright illumination
    • doi:10.1038/nphoton.2010.214
    • Lydersen L, Wiechers C, Wittmann C, Elser D, Skaar J, et al, (2010) Hacking commercial quantum cryptography systems by tailored bright illumination. Nature Photonics 4: 686-689 doi: 10.1038/nphoton.2010.214.
    • (2010) Nature Photonics , vol.4 , pp. 686-689
    • Lydersen, L.1    Wiechers, C.2    Wittmann, C.3    Elser, D.4    Skaar, J.5
  • 10
    • 80054863551 scopus 로고    scopus 로고
    • Experimentally faking the violation of Bell's inequalities
    • doi:10.1103/PhysRevLett.107.170404
    • Gerhardt I, Liu Q, Lamas-Linares A, Skaar J, Scarani V, et al. (2011) Experimentally faking the violation of Bell's inequalities. Physical Review Letters 107. doi: 10.1103/PhysRevLett.107.170404.
    • (2011) Physical Review Letters , vol.107
    • Gerhardt, I.1    Liu, Q.2    Lamas-Linares, A.3    Skaar, J.4    Scarani, V.5
  • 11
    • 44149085575 scopus 로고    scopus 로고
    • Fakes states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols
    • Makarov V, Skaar J, (2008) Fakes states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols. Quantum Information & Computation 8: 622-635.
    • (2008) Quantum Information & Computation , vol.8 , pp. 622-635
    • Makarov, V.1    Skaar, J.2
  • 13
    • 78650558879 scopus 로고    scopus 로고
    • Thermal blinding of gated detectors in quantum cryptography
    • doi:10.1364/oe.18.027938
    • Lydersen L, Wiechers C, Wittmann C, Elser D, Skaar J, et al. (2010) Thermal blinding of gated detectors in quantum cryptography. Optics Express 18: 27938-27954 doi: 10.1364/oe.18.027938.
    • (2010) Optics Express , vol.18 , pp. 27938-27954
    • Lydersen, L.1    Wiechers, C.2    Wittmann, C.3    Elser, D.4    Skaar, J.5
  • 14
    • 80052778927 scopus 로고    scopus 로고
    • Device calibration impacts security of quantum key distribution
    • doi:10.1103/PhysRevLett.107.11051
    • Jain N, Wittmann C, Lydersen L, Wiechers C, Elser D, et al. (2011) Device calibration impacts security of quantum key distribution. Physical Review Letters 107. doi: 10.1103/PhysRevLett.107.11051.
    • (2011) Physical Review Letters , vol.107
    • Jain, N.1    Wittmann, C.2    Lydersen, L.3    Wiechers, C.4    Elser, D.5
  • 15
    • 79956134306 scopus 로고    scopus 로고
    • Tailored bright illumination attack on distributed-phase-reference protocols
    • doi:10.1080/09500340.2011.565889
    • Lydersen L, Skaar J, Makarov V, (2011) Tailored bright illumination attack on distributed-phase-reference protocols. Journal of Modern Optics 58: 680-685 doi: 10.1080/09500340.2011.565889.
    • (2011) Journal of Modern Optics , vol.58 , pp. 680-685
    • Lydersen, L.1    Skaar, J.2    Makarov, V.3
  • 16
    • 83655181472 scopus 로고    scopus 로고
    • Controlling a superconducting nanowire single-photon detector using tailored bright illumination
    • doi:10.1088/1367-2630/13/11/113042
    • Lydersen L, Akhlaghi MK, Majedi AH, Skaar J, Makarov V (2011) Controlling a superconducting nanowire single-photon detector using tailored bright illumination. New Journal of Physics 13. doi: 10.1088/1367-2630/13/11/113042.
    • (2011) New Journal of Physics , pp. 13
    • Lydersen, L.1    Akhlaghi, M.K.2    Majedi, A.H.3    Skaar, J.4    Makarov, V.5
  • 17
    • 79959344336 scopus 로고    scopus 로고
    • Comment on Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography
    • Applied Physics Letters 99 doi:10.1063/1.3658806 2011
    • Lydersen L, Makarov V, Skaar J (2011) Comment on "Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography" Appl. Phys. Lett. 98, 231104 (2011). Applied Physics Letters 99. doi: 10.1063/1.3658806.
    • (2011) Appl. Phys. Lett , vol.98 , pp. 231104
    • Lydersen, L.1    Makarov, V.2    Skaar, J.3
  • 18
    • 80755181033 scopus 로고    scopus 로고
    • Controlling an actively-quenched single photon detector with bright light
    • Sauge S, Lydersen L, Anisimov A, Skaar J, Makarov V, (2011) Controlling an actively-quenched single photon detector with bright light. Optics Express 19: 23590-23600.
    • (2011) Optics Express , vol.19 , pp. 23590-23600
    • Sauge, S.1    Lydersen, L.2    Anisimov, A.3    Skaar, J.4    Makarov, V.5
  • 19
    • 80052758414 scopus 로고    scopus 로고
    • Superlinear threshold detectors in quantum cryptography
    • doi:10.1103/PhysRevA.84.032320
    • Lydersen L, Jain N, Wittmann C, Maroy O, Skaar J, et al. (2011) Superlinear threshold detectors in quantum cryptography. Physical Review A 84. doi: 10.1103/PhysRevA.84.032320.
    • (2011) Physical Review A , pp. 84
    • Lydersen, L.1    Jain, N.2    Wittmann, C.3    Maroy, O.4    Skaar, J.5
  • 20
    • 78649893991 scopus 로고    scopus 로고
    • Avoiding the blinding attack in QKD reply
    • doi:10.1038/nphoton.2010.278
    • Lydersen L, Wiechers C, Wittmann C, Elser D, Skaar J, et al. (2010) Avoiding the blinding attack in QKD reply. Nature Photonics 4: 801-801 doi: 10.1038/nphoton.2010.278.
    • (2010) Nature Photonics , vol.4 , pp. 801
    • Lydersen, L.1    Wiechers, C.2    Wittmann, C.3    Elser, D.4    Skaar, J.5
  • 21
    • 67650035011 scopus 로고    scopus 로고
    • Controlling passively quenched single photon detectors by bright light
    • doi:10.1088/1367-2630/11/6/065003
    • Makarov V (2009) Controlling passively quenched single photon detectors by bright light. New Journal of Physics 11. doi: 10.1088/1367-2630/11/6/065003.
    • (2009) New Journal of Physics , pp. 11
    • Makarov, V.1
  • 22
    • 33644682177 scopus 로고    scopus 로고
    • Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law
    • doi:10.1016/j.physleta.2005.11.062
    • Kish LB, (2006) Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law. Physics Letters A 352: 178-182 doi: 10.1016/j.physleta.2005.11.062.
    • (2006) Physics Letters A , vol.352 , pp. 178-182
    • Kish, L.B.1
  • 23
    • 33344454992 scopus 로고    scopus 로고
    • Protection against the man-in the-middle-attack for the Kirchhoff-loop-Johnson(-like)-noise cipher and expansion by voltage-based security
    • doi:10.1142/s0219477506003148
    • Kish LB, (2006) Protection against the man-in the-middle-attack for the Kirchhoff-loop-Johnson(-like)-noise cipher and expansion by voltage-based security. Fluctuation and Noise Letters 6: L57-L63 doi: 10.1142/s0219477506003148.
    • (2006) Fluctuation and Noise Letters , vol.6
    • Kish, L.B.1
  • 25
    • 38649120100 scopus 로고    scopus 로고
    • Johnson(-like)-Noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line
    • doi:10.1016/j.physleta.2007.67.086
    • Mingesz R, Gingl Z, Kish LB, (2008) Johnson(-like)-Noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line. Physics Letters A 372: 978-984 doi: 10.1016/j.physleta.2007.67.086.
    • (2008) Physics Letters A , vol.372 , pp. 978-984
    • Mingesz, R.1    Gingl, Z.2    Kish, L.B.3
  • 26
    • 46349098647 scopus 로고    scopus 로고
    • Unconditionally secure computers, algorithms and hardware, such as memories, processors, keyboards, flash and hard drives
    • doi:10.1142/s0219477508004362
    • Kish LB, Saidi O, (2008) Unconditionally secure computers, algorithms and hardware, such as memories, processors, keyboards, flash and hard drives. Fluctuation and Noise Letters 8: L95-L98 doi: 10.1142/s0219477508004362.
    • (2008) Fluctuation and Noise Letters , vol.8
    • Kish, L.B.1    Saidi, O.2
  • 27
    • 84860630671 scopus 로고    scopus 로고
    • Information networks secured by the laws of physics
    • doi:10.1587/transcom.E95.B.1501
    • Kish LB, Peper F, (2012) Information networks secured by the laws of physics. Ieice Transactions on Communications. E95B: 1501-1507 doi: 10.1587/transcom.E95.B.1501.
    • (2012) Ieice Transactions on Communications , vol.E95B , pp. 1501-1507
    • Kish, L.B.1    Peper, F.2
  • 28
    • 33646492618 scopus 로고    scopus 로고
    • Totally secure classical networks with multipoint telecloning (teleportation) of classical bits through loops with Johnson-like noise
    • doi:10.1142/s0219477506003628
    • Kish LB, Mingez R, (2006) Totally secure classical networks with multipoint telecloning (teleportation) of classical bits through loops with Johnson-like noise. Fluctuation and noise letters 6: L447-L447 doi: 10.1142/s0219477506003628.
    • (2006) Fluctuation and Noise Letters , vol.6
    • Kish, L.B.1    Mingez, R.2
  • 31
    • 84878382625 scopus 로고    scopus 로고
    • Enhanced secure key exchange systems based on the Johnson-noise scheme
    • Kish LB, (2013) Enhanced secure key exchange systems based on the Johnson-noise scheme. Metrology & Measurement Systems XX: 191-204 Available: http://www.degruyter.com/view/j/mms.2013.20.issue-2/mms-2013-0017/mms-2013-0017.xml?format=INT.
    • (2013) Metrology & Measurement Systems , vol.XX , pp. 191-204
    • Kish, L.B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.