메뉴 건너뛰기




Volumn , Issue , 2014, Pages

A quantum Diffie-Hellman protocol using commuting transformations

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; INFORMATION SYSTEMS;

EID: 84988222812     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ANTS.2014.7057257     Document Type: Conference Paper
Times cited : (7)

References (18)
  • 2
    • 0018036292 scopus 로고
    • An overview of public key cryptography
    • November
    • M. Hellman, "An overview of public key cryptography," Communications Society Magazine, IEEE, Vol. 16, no. 6, pp. 24-32, November 1978.
    • (1978) Communications Society Magazine, IEEE , vol.16 , Issue.6 , pp. 24-32
    • Hellman, M.1
  • 3
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Feb.
    • R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, Vol. 21, no. 2, pp. 120-126, Feb. 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 5
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
    • Oct. [Online]. Available
    • P. W. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," SIAM J. Comput., Vol. 26, no. 5, pp. 1484-1509, Oct. 1997. [Online]. Available: http://dx.doi.org/10.1137/S0097539795293172
    • (1997) SIAM J. Comput. , vol.26 , Issue.5 , pp. 1484-1509
    • Shor, P.W.1
  • 6
    • 0343152990 scopus 로고
    • Quantum cryptography based on bells theorem
    • Aug [Online]. Available
    • A. K. Ekert, "Quantum cryptography based on bells theorem," Phys. Rev. Lett., Vol. 67, pp. 661-663, Aug 1991. [Online]. Available: http://link.aps.org/doi/10.1103/PhysRevLett.67.661
    • (1991) Phys. Rev. Lett. , vol.67 , pp. 661-663
    • Ekert, A.K.1
  • 7
    • 0041415963 scopus 로고    scopus 로고
    • Quantum key distribution with high loss: Toward global secure communication
    • Aug [Online]. Available
    • W.-Y. Hwang, "Quantum key distribution with high loss: Toward global secure communication," Phys. Rev. Lett., Vol. 91, p. 057901, Aug 2003. [Online]. Available: http://link.aps.org/doi/10.1103/PhysRevLett.91.057901
    • (2003) Phys. Rev. Lett. , vol.91
    • Hwang, W.-Y.1
  • 8
    • 1642383816 scopus 로고    scopus 로고
    • Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations
    • Feb [Online]. Available
    • V. Scarani, A. Acin, G. Ribordy, and N. Gisin, "Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations," Phys. Rev. Lett., Vol. 92, p. 057901, Feb 2004. [Online]. Available: http://link.aps.org/doi/10.1103/PhysRevLett.92.057901
    • (2004) Phys. Rev. Lett. , vol.92
    • Scarani, V.1    Acin, A.2    Ribordy, G.3    Gisin, N.4
  • 9
    • 84915803625 scopus 로고    scopus 로고
    • Quantum key distribution based on selective post-processing in passive optical networks
    • May
    • J. Martinez-Mateo, A. Ciurana, and V. Martin, "Quantum key distribution based on selective post-processing in passive optical networks," Photonics Technology Letters, IEEE, Vol. 26, no. 9, pp. 881-884, May 2014.
    • (2014) Photonics Technology Letters, IEEE , vol.26 , Issue.9 , pp. 881-884
    • Martinez-Mateo, J.1    Ciurana, A.2    Martin, V.3
  • 10
    • 84876213250 scopus 로고    scopus 로고
    • Secure optical networks based on quantum key distribution and weakly trusted repeaters
    • IEEE/OSA Journal of April
    • D. Elkouss, J. Martinez-Mateo, A. Ciurana, and V. Martin, "Secure optical networks based on quantum key distribution and weakly trusted repeaters," Optical Communications and Networking, IEEE/OSA Journal of, Vol. 5, no. 4, pp. 316-328, April 2013.
    • (2013) Optical Communications and Networking , vol.5 , Issue.4 , pp. 316-328
    • Elkouss, D.1    Martinez-Mateo, J.2    Ciurana, A.3    Martin, V.4
  • 11
    • 84891363941 scopus 로고    scopus 로고
    • Multi-photon tolerant secure quantum communication 2014; from theory to practice
    • 2013 IEEE International Conference on, June
    • Y. Chen, S. Kak, P. Verma, G. Macdonald, M. El Rifai, and N. Punekar, "Multi-photon tolerant secure quantum communication 2014; from theory to practice," in Communications (ICC), 2013 IEEE International Conference on, June 2013, pp. 2111-2116.
    • (2013) Communications (ICC) , pp. 2111-2116
    • Chen, Y.1    Kak, S.2    Verma, P.3    Macdonald, G.4    El Rifai, M.5    Punekar, N.6
  • 12
    • 33646470713 scopus 로고    scopus 로고
    • A three-stage quantum cryptography protocol
    • S. Kak, "A three-stage quantum cryptography protocol," Foundations of Physics Letters, Vol. 19, no. 3, pp. 293-296, 2006.
    • (2006) Foundations of Physics Letters , vol.19 , Issue.3 , pp. 293-296
    • Kak, S.1
  • 13
    • 74849116818 scopus 로고    scopus 로고
    • K08: A generalized bb84/b92 protocol in quantum cryptography
    • [Online]. Available
    • S. V. Kartalopoulos, "K08: a generalized bb84/b92 protocol in quantum cryptography," Security and Communication Networks, Vol. 2, no. 6, pp. 686-693, 2009. [Online]. Available: http://dx.doi.org/10.1002/sec.111
    • (2009) Security and Communication Networks , vol.2 , Issue.6 , pp. 686-693
    • Kartalopoulos, S.V.1
  • 14
    • 84858966799 scopus 로고    scopus 로고
    • A qkd protocol with a two-way quantum channel
    • 2011 IEEE 5th International Conference on, Dec
    • F. Zamani and P. Verma, "A qkd protocol with a two-way quantum channel," in Advanced Networks and Telecommunication Systems (ANTS), 2011 IEEE 5th International Conference on, Dec 2011, pp. 1-6.
    • (2011) Advanced Networks and Telecommunication Systems (ANTS) , pp. 1-6
    • Zamani, F.1    Verma, P.2
  • 15
    • 84886305560 scopus 로고    scopus 로고
    • A probabilistic quantum key transfer protocol
    • [Online]. Available
    • A. Parakh, "A probabilistic quantum key transfer protocol," Security and Communication Networks, Vol. 6, no. 11, pp. 1389-1395, 2013. [Online]. Available: http://dx.doi.org/10.1002/sec.736
    • (2013) Security and Communication Networks , vol.6 , Issue.11 , pp. 1389-1395
    • Parakh, A.1
  • 16
    • 1542593353 scopus 로고
    • Authentication and authenticated key exchanges
    • Jun. [Online]. Available
    • W. Diffie, P. C. Van Oorschot, and M. J. Wiener, "Authentication and authenticated key exchanges," Des. Codes Cryptography, Vol. 2, no. 2, pp. 107-125, Jun. 1992. [Online]. Available: http://dx.doi.org/10.1007/BF00124891
    • (1992) Des. Codes Cryptography , vol.2 , Issue.2 , pp. 107-125
    • Diffie, W.1    Van Oorschot, P.C.2    Wiener, M.J.3
  • 17
    • 0017018484 scopus 로고    scopus 로고
    • New directions in cryptography
    • Sep. [Online]. Available
    • W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theor., Vol. 22, no. 6, pp. 644-654, Sep. 2006. [Online]. Available: http://dx.doi.org/10.1109/TIT.1976.1055638
    • (2006) IEEE Trans. Inf. Theor. , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.