Adaptability Against Eavesdropping Attack in WSN: Co-Operative Beamforming and Relays Approach

Author(s):  
Somu P. Parande ◽  
Jayashree D. Mallapur
Keyword(s):  
2016 ◽  
Vol 30 (02) ◽  
pp. 1550267 ◽  
Author(s):  
Yi Xiang ◽  
Zhi Wen Mo

In this paper, we proposed a three-party quantum secret sharing (QSS) scheme using four-dimensional three-particle entangled states. In this QSS scheme, each agent can obtain a shadow of the secret key by performing single-particle measurements. Compared with the existing QSS protocol, this scheme has high efficiency and can resist the eavesdropping attack and entangle-measuring attack, which using three-particle entangled states are based on four-dimensional Hilbert space.


Author(s):  
Jiadi Yu ◽  
Li Lu ◽  
Yingying Chen ◽  
Yanmin Zhu ◽  
Linghe Kong

2008 ◽  
Vol 06 (06) ◽  
pp. 1195-1202 ◽  
Author(s):  
HUA LU ◽  
QING-YU CAI

It seems that quantum key distribution (QKD) may be completely insecure when the message sender Alice always encodes her key bits in a fixed basis. In this paper, we present a QKD protocol with classical Alice, i.e. Alice always encodes her key bit in the {|0〉,|1〉} basis (we call it classical {0,1} basis) and the eavesdropper Eve knows this fact. We prove that our protocol is completely robust against any eavesdropping attack and present the amount of tolerable noise against Eve's individual attack. Next, we present a QKD protocol to demonstrate that secure key bits can be distributed even if neither Alice nor Bob has quantum capacities, and extend this idea to a QKD network protocol with numerous parties who have only classical capacities. Finally, we discuss that quantum is necessary in QKD for security reasons, but both Alice and Bob may be classical.


Sign in / Sign up

Export Citation Format

Share Document