Quantum cryptography and V A Kotel'nikov's one-time key and sampling theorems

@article{Molotkov2006QuantumCA,
  title={Quantum cryptography and V A Kotel'nikov's one-time key and sampling theorems},
  author={Sergei N. Molotkov},
  journal={Physics-Uspekhi},
  year={2006},
  volume={49},
  pages={750 - 761}
}
cryptography were substantially reinforced with young graduates from the leading higher educational institutions of our country. A special branch was set up at the Mechanics and Mathematics Department of Moscow State University for training future experts in mathematics and cryptography. A higher educational institution was simultaneously organized for training cryptographers and specialists in mathematical, physicotechnical, communications, and related areas; its successor is now the Institute… 
13 Citations

On the Application of PSpice for Localised Cloud Security

The work reported in this thesis commenced with a review of methods for creating random binary sequences for encoding data locally by the client before storing in the Cloud, and led to a circuit-based one-time pad key chaos encoder for encrypting data.

Security of the decoy state method for quantum key distribution

The decoy state method is devoted to, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols whose security is proved under the assumption of single-photon states.

Modular Quantum Key Distribution Setup for Research and Development Applications

A modular QKD setup driven by National Instruments cards with open source LabView code, open source Python code for post-processing procedures, and open source protocol for external applications shows a high degree of robustness beyond laboratory conditions.

Differential phase shift-quantum key distribution

Quantum-key distribution has been studied as an ultimate method for secure communications, and now it is emerging as a technology that can be deployed in real fiber networks. Here, we present our QKD

A symmetric cryptosystem involving a mixed-base notation

A new nonlinear transformation for modern symmetric block-encryption systems is obtained that involves rerepresentation of information in a mixed-base notation in which a set of bases is a private key.

Quantum Inspired Security on a Mobile Phone

The experimental results show this project can achieve superior transmission performance, and the correlation between the transmission rate of the system and several parameters, such as the QR code size, has been analyzed.

Differential phase shift quantum key distribution

The highest key rate and the longest distance have been achieved with the DPS-QKD protocol, and some modified schemes are presented, including that utilizing quantum entanglement, that using decoy pulses, and that using macroscopic coherent light.

Wireless underwater optical communication with quantum key distribution

The results of experimental modeling of a wireless optical communication channel in an aquatic environment are presented, which were carried out on the basis of a laboratory installation for

Symmetric Blind Information Reconciliation and Hash-function-based Verification for Quantum Key Distribution

A method, which is based on symmetric blind information reconciliation for the low-density parity-check (LDPC) codes, and a subsequent verification protocol with the use of ϵ-universal hash functions, which allows verifying the identity between the keys with a certain probability.

Differential-phase-shift quantum key distribution

A novel type of quantum key distribution (QKD) protocol called differential-phase-shift (DPS) QKD is described. It utilizes a weak coherent pulse train instead of individual photons as in

References

SHOWING 1-10 OF 59 REFERENCES

Quantum cryptography on multiuser optical fibre networks

A practical scheme for multi-user quantum cryptography is introduced, and its operation on an optical fibre network is demonstrated, which enables a single controller on the network to establish, and regularly update, a distinct secret key with each network user.

Practical Quantum Cryptography: A Comprehensive Analysis (Part One)

An extended family of generalizations of the Bennett-Brassard (BB84) QC protocol is introduced that equally provide unconditional secrecy but allow for the possibility of optimizing throughput rates against specific cryptanalytic attacks.

A method for obtaining digital signatures and public-key cryptosystems

An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key, soriers or other secure means are not needed to transmit keys.

Quantum key distribution over a 48 km optical fibre network

The most recent results of the optical fibre experiment in which quantum key distribution over a 48 km optical fibre network at Los Alamos is performed using photon interference states with the B92 and BB84 quantum key Distribution protocols are reported.

Quantum cryptography without Bell's theorem.

A related but simpler EPR scheme is described and it is proved it secure against more general attacks, including substitution of a fake EPR source and the original 1984 key distribution scheme of Bennett and Brassard, which uses single particles instead of EPR pairs.

Experimental investigation of the performance limits for first telecommunications-window quantum cryptography systems

  • P. Townsend
  • Physics
    IEEE Photonics Technology Letters
  • 1998
Experimental results from a polarization-encoded system utilizing a state-of-the-art silicon SPAD are reported, demonstrating the potential for secure quantum key distribution at Mb/spl middot/s/sup 1/ rates over fiber LANs also carrying conventional high-speed data channels at a wavelength of 1.3 /spl mu/m.

Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks

It is shown that strong-pulse implementations, where a strong pulse is included as a reference, allow for key distribution robust against photon-number-splitting attacks, and the distance at which the key distribution becomes insecure due to the PNS attack is significantly increased compared to the existing schemes.

Communication theory of secrecy systems

  • C. Shannon
  • Computer Science, Mathematics
    Bell Syst. Tech. J.
  • 1949
A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.

Security aspects of practical quantum cryptography

This work provides a thorough investigation of security issues for practical quantum key distribution, taking into account channel losses, and a realistic detection process.

Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications

  • G. S. Vernam
  • Computer Science
    Transactions of the American Institute of Electrical Engineers
  • 1926
A printing telegraph cipher system devetoped during the World War for the use of the Signal Corps, U. S. Army is described, so designed that the messages are in secret form from the time they leave the sender until they are deciphered automatically at the office of the addressee.
...