Sciweavers

241 search results - page 10 / 49
» Quantum Authenticated Key Distribution
Sort
View
JACM
2006
146views more  JACM 2006»
13 years 7 months ago
Limits on the ability of quantum states to convey classical messages
We revisit the problem of conveying classical messages by transmitting quantum states, and derive new, optimal bounds on the number of quantum bits required for this task. Much of...
Ashwin Nayak, Julia Salzman
ISCA
2006
IEEE
107views Hardware» more  ISCA 2006»
14 years 1 months ago
Distributed Arithmetic on a Quantum Multicomputer
We evaluate the performance of quantum arithmetic algorithms run on a distributed quantum computer (a quantum multicomputer). We vary the node capacity and I/O capabilities, and t...
Rodney Van Meter, Kae Nemoto, W. J. Munro, Kohei M...
CCS
1998
ACM
13 years 11 months ago
Authenticated Group Key Agreement and Friends
Many modern computing environments involve dynamic peer groups. Distributed simulation, multi-user games, conferencing and replicated servers are just a few examples. Given the op...
Giuseppe Ateniese, Michael Steiner, Gene Tsudik
ATVA
2008
Springer
115views Hardware» more  ATVA 2008»
13 years 9 months ago
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus o...
Guoqiang Li, Mizuhito Ogawa