Sciweavers

146 search results - page 5 / 30
» Private Quantum Channels
Sort
View
CORR
2010
Springer
99views Education» more  CORR 2010»
13 years 8 months ago
INDECT Advanced Security Requirements
This paper reviews the requirements for the security mechanisms that are currently being developed in the framework of the European research project INDECT. An overview of features...
Manuel Urueña, Petr Machnik, Maria Martinez...
CRYPTO
2005
Springer
107views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
A Quantum Cipher with Near Optimal Key-Recycling
Abstract. Assuming an insecure quantum channel and an authenticated classical channel, we propose an unconditionally secure scheme for encrypting classical messages under a shared ...
Ivan Damgård, Thomas Brochmann Pedersen 0002...
TIT
2008
84views more  TIT 2008»
13 years 7 months ago
Channel-Adapted Quantum Error Correction for the Amplitude Damping Channel
Error correction procedures are considered which are designed specifically for the amplitude damping channel. Amplitude damping errors are analyzed in the stabilizer formalism. Thi...
Andrew S. Fletcher, Peter W. Shor, Moe Z. Win
ICC
2009
IEEE
142views Communications» more  ICC 2009»
14 years 2 months ago
A Generalized Two-Way Relay Channel with Private Information for the Relay
—In the conventional two-way relay channel, two sources exchange information with help from a relay. We introduce a generalized two-way relay channel where each source additional...
Chin Keong Ho, Kiran T. Gowda, Sumei Sun
PKC
2001
Springer
86views Cryptology» more  PKC 2001»
14 years 11 days ago
One Round Threshold Discrete-Log Key Generation without Private Channels
Pedersen designed the first scheme for generating Discrete-Log keys without
Pierre-Alain Fouque, Jacques Stern