Cryptography Reference
In-Depth Information
7. G. Gilbert and M. Hamrick, Practical quantum cryptography: A comprehensive
analysis (part one), arXive e-print quant-ph/0009027, 2000.
8. C. H. Bennett, Quantum cryptography using any two nonorthogonal states,
Phys. Rev. Lett ., 68, 3121, 1992.
9. C.E. Shannon, Communication theory of secrecy systems, Bell Syst. Tech. J ., 28,
656, 1949.
10. B. Slutsky, R. Rao, P.-C. Sun, L. Tancevski, and S. Fainman, Defense frontier
analysis of quantum cryptographic systems, App. Opt. , 37, 14, 2869-2878, 1998.
11. N. L utkenhaus, Security against individual attacks for realistic quantum key
distribution, Phys. Rev ., A 61, 052304, 2000.
12. C. H. Bennett, G. Brassard, C. Crepeau, and U. Maurer, Generalized privacy
amplification, IEEE Trans. Inf. Th ., 41, 1915, 1995.
13. G. Gilbert and M. Hamrick, Secrecy, computational loads and rates in practical
quantum cryptography, Algorithmica , 34, 314, 2002.
14. J. L. Carter and M. N. Wegman, Universal classes of hash functions, J. Comp.
Syst. Sciences , 18, 143, 1979.
15. op. cit. L utkenhaus, (ref. [3]). The effect on the viability of throughput rates
caused by changing the number of subtraction bits associated with replacing
the average bound with the pointwise bound is not analyzed in Ref. [3], and the
tradeoffs between the security parameters that define the pointwise bound are
not numerically studied. Also, the complete loss of cryptographic security that
is caused by naive application of the result given in Ref. [12] is not presented
in Ref. [3].
16. The difference between the two throughput values is about 50 bits per second,
because an additional 30 bits are subtracted per processing block, and in the
example presented there are about 1.6 blocks per second. See Ref. [7] for a
discussion of processing block size.
Search WWH ::




Custom Search