472 Hits in 11.0 sec

Contributions to Information Theoretic Multiterminal Secret Key Agreement [article]

Alireza Poostindouz, University Of Calgary, Reyhaneh Safavi-Naeini
A multiterminal secret key agreement (SKA) protocol is used to establish a shared se- cret key among a group of terminals. We study SKA protocols with information-theoretic security.  ...  The key rate of an SKA protocol is given by the key length divided by the terminals' variables length, and the maximum possible key rate calculated for an SKA model is called the wiretap secret key (WSK  ...  Acknowledgements The studies and research results presented in this thesis were performed under the supervision of Dr. Rei Safavi-Naini. I cannot thank her enough for her support and guidance.  ... 
doi:10.11575/prism/39555 fatcat:roz2sbet4be7faltjrpsnngyyi

Key Agreement with Physical Unclonable Functions and Biometric Identifiers [article]

Onur Günlü
2021 IACR Cryptology ePrint Archive  
The optimal trade-offs between the secret-key, privacy-leakage, and storage rates for multiple measurements of hidden PUFs are characterized.  ...  A low-complexity transform-coding algorithm is developed to make the information-theoretic analysis tractable and motivate a noisy (hidden) PUF source model.  ...  In Chapter 4, information-theoretic rate regions are derived for a generalization of a classic two-terminal source model key agreement problem.  ... 
dblp:journals/iacr/Gunlu21 fatcat:uuode2mzpfb2hcszi2o3f2jytu

Dynamic join-exit amortization and scheduling for time-efficient group key agreement

Yinian Mao, Yan Sun, Min Wu, K.J. Ray Liu
2004 IEEE INFOCOM 2004  
We also show that the asymptotic average time cost per user join and leave event is Θ(log (log n)), where n is the group size.  ...  In this paper, we propose a time-efficient contributory key agreement framework for secure communications in dynamic groups.  ...  The communication and computation overhead associated with key update is related to the group size n.  ... 
doi:10.1109/infcom.2004.1354681 dblp:conf/infocom/MaoSWL04 fatcat:l25hu2fh4vg2vmjr4h2weqhfki

Experimental demonstration of Gaussian protocols for one-sided device-independent quantum key distribution

Nathan Walk, Sara Hosseini, Jiao Geng, Oliver Thearle, Jing Yan Haw, Seiji Armstrong, Syed M. Assad, Jiri Janousek, Timothy C. Ralph, Thomas Symul, Howard M. Wiseman, Ping Koy Lam
2016 Optica  
We also establish a direct link between the relevant EPR steering inequality and the secret key rate, further strengthening the relationship between these asymmetric notions of nonlocality and device independence  ...  We experimentally implement both entanglement-based and coherent-state protocols, and measure the correlations necessary for 1sDI key distribution up to an applied loss equivalent to 7.5 km and 3.5 km  ...  Acknowledgments The authors would like to thank D.A. Evans, M.J. Hall, C. Branciard, E.G. Cavalcanti, H.M. Chrzanowski, F. Furrer and M. Tomamichel for helpful discussions.  ... 
doi:10.1364/optica.3.000634 fatcat:lxqrk6hvgbbk3djlvjhc5ppake

Asymptotic security of continuous-variable quantum key distribution with a discrete modulation [article]

Shouvik Ghorai, Philippe Grangier, Eleni Diamanti, Anthony Leverrier
2019 arXiv   pre-print
We establish a lower bound on the asymptotic secret key rate of continuous-variable quantum key distribution with a discrete modulation of coherent states.  ...  We illustrate our general approach with the quadrature phase-shift keying (QPSK) modulation scheme and show that distances over 100 km are achievable for realistic values of noise.  ...  We acknowledge funding from European Union's Horizon 2020 research and innovation programme under the Marie Sk lodowska-Curie grant agreements No 675662 and No 820466 (CiViQ), and French National Research  ... 
arXiv:1902.01317v3 fatcat:3bkw54x2qzaw5dailse76mltta

Asymptotic Security of Continuous-Variable Quantum Key Distribution with a Discrete Modulation

Shouvik Ghorai, Philippe Grangier, Eleni Diamanti, Anthony Leverrier
2019 Physical Review X  
We establish a lower bound on the asymptotic secret key rate of continuous-variable quantum key distribution with a discrete modulation of coherent states.  ...  This result opens the way to establishing the full security of continuous-variable protocols with a discrete modulation, and thereby to the large-scale deployment of these protocols for quantum key distribution  ...  rate (i.e., the ratio between the final key size and the number of states exchanged on the quantum channel) is higher than for qubit-based protocols [9] .  ... 
doi:10.1103/physrevx.9.021059 fatcat:qvg4xicw7nbltkt2vjpiuizit4

Performance Improvement of Plug-and-Play Dual-Phase-Modulated Quantum Key Distribution by Using a Noiseless Amplifier

Dongyun Bai, Peng Huang, Hongxin Ma, Tao Wang, Guihua Zeng
2017 Entropy  
In Section 4, the secret-key rates are computed with the NLA and without the NLA in the plug-and-play DPMCS, and we make the analysis of the performance improvement.  ...  In Section 2, we first review the prepare-and-measure (P&M)-based and EB version of the plug-and-play DPMCS CVQKD protocol and the derivation of the expressions of its secret-key rate.  ...  can calculate the asymptotic lower bound of the secret-key rates in Equation (4) against collective attacks.  ... 
doi:10.3390/e19100546 fatcat:veua7iww3bbrjddhjxi7y76jwi

Self-Referenced Continuous-Variable Quantum Key Distribution Protocol

Daniel B. S. Soh, Constantin Brif, Patrick J. Coles, Norbert Lütkenhaus, Ryan M. Camacho, Junji Urayama, Mohan Sarovar
2015 Physical Review X  
Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key  ...  We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters.  ...  SECRET KEY RATE ANALYSIS While claims of secure key distribution should be based on empirically estimated correlations between Alice and Bob [15] , it is common to calculate an expected secret key rate  ... 
doi:10.1103/physrevx.5.041010 fatcat:osvan2m3yjhwbjb3bbxjndxuuy

Advances in Quantum Cryptography

Stefano Pirandola, Ulrik Andersen, Leonardo Banchi, Mario Berta, Darius Bunandar, Roger Colbeck, Dirk Englund, Tobias Gehring, Cosmo Lupo, Carlo Ottaviani, Jason Pereira, Mohsen Razavi (+6 others)
2020 Advances in Optics and Photonics  
General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications  ...  that users recognise and abide by the legal requirements associated with these rights.  Users may download and print one copy of any publication from the public portal for the purpose of private study  ...  The asymptotic secret key rate is obtained from the expression of the mutual information between Alice and Bob averaged over z, I AB = z p(z)I(X; Y ) ρ z minus the average Holevo information between Alice  ... 
doi:10.1364/aop.361502 fatcat:7xp7i42fjffpblk6g4fhlpgg6m

Practical continuous-variable quantum key distribution with composable security [article]

Nitin Jain, Hou-Man Chin, Hossein Mani, Cosmo Lupo, Dino Solar Nikolic, Arne Kordts, Stefano Pirandola, Thomas Brochmann Pedersen, Matthias Kolb, Bernhard Ömer, Christoph Pacher, Tobias Gehring (+1 others)
2021 arXiv   pre-print
Furthermore, the theoretical proof responsible for security analysis and key generation should cater to the number N of the distributed quantum states being finite in practice.  ...  Here we report the first Gaussian-modulated coherent state CVQKD system that is able to overcome these challenges and can generate composable keys secure against collective attacks with N ≲ 3.5×10^8 coherent  ...  The work presented in this paper has been supported by the European Union's Horizon 2020 research and innovation programmes CiViQ (grant agreement no. 820466), OPENQKD (grant agreement no. 857156), and  ... 
arXiv:2110.09262v1 fatcat:vmkyijunlvcjlhxsfcywcjucha

The security of practical quantum key distribution

Valerio Scarani, Helle Bechmann-Pasquinucci, Nicolas J. Cerf, Miloslav Dušek, Norbert Lütkenhaus, Momtchil Peev
2009 Reviews of Modern Physics  
It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel.  ...  Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization.  ...  Secret fraction and secret key rate In the asymptotic case N → ϱ of infinitely long keys, the meaningful quantity is the secret fraction 16 r = lim N→ϱ ᐉ/n. ͑5͒ The secret fraction is clearly the heart  ... 
doi:10.1103/revmodphys.81.1301 fatcat:mz3xggckb5ctpbwezdtem22vyi

A Comprehensive Study of Deep Learning for Side-Channel Analysis

Loïc Masure, Cécile Dumas, Emmanuel Prouff
2019 Transactions on Cryptographic Hardware and Embedded Systems  
Information introduced by Renauld et al. at EUROCRYPT 2011 as a lower bound of the Mutual Information between the leakage and the target secret.  ...  machine learning, and common SCA metrics like the Guessing entropy or the key-discrimination success rate.  ...  Acknowledgements This work has been partially supported by the European Union's H2020 Program under grant agreement number ICT-731591 (REASSURE).  ... 
doi:10.13154/tches.v2020.i1.348-375 dblp:journals/tches/MasureDP20 fatcat:ik3cvjvrxbc2hkro56tdyie73y

On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis [chapter]

Maksym A. Girnyk, Frédéric Gabry, Mikko Vehkaperä, Lars K. Rasmussen, Mikael Skoglund
2014 Lecture Notes in Computer Science  
Our numerical results demonstrate a good match between the large-system approximation and the actual simulated secrecy rates, as well as some interesting features of the precoder optimization.  ...  In this work, we consider MIMO wiretap channels in a fast fading environment, for which the overall performance is characterized by the ergodic MIMO secrecy rate.  ...  These results extend to the problem of secret-key agreement over wireless channels, as in [8] where key-distillation strategies over quasi-static fading channels were investigated, and [9] where the  ... 
doi:10.1007/978-3-319-04268-8_6 fatcat:jskqw2vdxvhfrjykwtuh6ole4u

Critical perspectives on provable security: Fifteen years of "another look" papers

Neal Koblitz, Alfred Menezes
2019 Advances in Mathematics of Communications  
We give an overview of our critiques of "proofs" of security and a guide to our papers on the subject that have appeared over the past decade and a half.  ...  We also provide numerous additional examples and a few updates and errata. 2010 Mathematics Subject Classification: Primary: 94A60.  ...  for editorial corrections and comments.  ... 
doi:10.3934/amc.2019034 fatcat:gpftyd4hxjebfpzdqwdes345na

Quantum cryptography [chapter]

Miloslav Dušek, Norbert Lütkenhaus, Martin Hendrych
2006 Progress in optics  
Here the crucial point is a tight time correlation between photons in the pair.  ...  This means that the upper bound on the key rate vanishes and no secret key can be generated.  ... 
doi:10.1016/s0079-6638(06)49005-3 fatcat:pbj6ii5xqneohjvko76y3mznoa
« Previous Showing results 1 — 15 out of 472 results