11 research outputs found

    ΠŸΠΎΡΠ»Ρ–Π΄ΠΎΠ²Π½Π° Π°Ρ‚Π°ΠΊΠ° пасивного пСрСхоплСння Π΄Π²ΠΎΡ… зловмисників Π½Π° ΠΏΡ–Π½Π³-ΠΏΠΎΠ½Π³ ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ» Π· Π“Π₯Π¦-Ρ‚Ρ€ΠΈΠΏΠ»Π΅Ρ‚Π°ΠΌΠΈ ΠΊΡƒΠ±Ρ–Ρ‚Ρ–Π²

    Get PDF
    In this paper has been analyzed the eavesdropping attackof two eavesdroppers on the ping-pong protocol withthree-qubit entangled Greenberger – Horne – Zeilingerstates. The expression for probability of attack detectionby legitimate users at attack of two eavesdroppers dependingon probabilities of detection them attacks separatelyare obtained. It is shown that an increase in thenumber of attackers in the quantum channel leads to anincrease in the probability of detecting these attacks bylegitimate users. The expressions for the maximum eavesdroppers'amount of information during a consistentattack of two eavesdroppers on the ping-pong protocolwith GHZ-triplets are obtained. It is indicated that themaximum eavesdroppers' amount of information determinedby the same expression as in the case of oneeavesdropper's attack, only the expression for the probabilityof attack detection is changed. It is shown that theping-pong protocol with GHZ-triplets is vulnerable toeavesdropping attack of two eavesdroppers not morethan to one eavesdropper's attack. It is shown that resultsof paper could be extend to the ping-pong protocols withn-qubit GHZ-states at any n.Π’ ΡΡ‚Π°Ρ‚ΡŒΠ΅ ΠΏΡ€ΠΎΠ°Π½Π°Π»ΠΈΠ·ΠΈΡ€ΠΎΠ²Π°Π½Π° ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°Ρ‚Π΅Π»ΡŒΠ½Π°Ρ атакапассивного ΠΏΠ΅Ρ€Π΅Ρ…Π²Π°Ρ‚Π° Π΄Π²ΡƒΡ… Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΠΎΠ² Π½Π° ΠΏΠΈΠ½Π³-ΠΏΠΎΠ½Π³ ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ» с Ρ‚Ρ€Π΅Ρ…ΠΊΡƒΠ±ΠΈΡ‚Π½Ρ‹ΠΌΠΈ ΠΏΠ΅Ρ€Π΅ΠΏΡƒΡ‚Π°Π½Π½Ρ‹ΠΌΠΈ сос-тояниями Π“Ρ€ΠΈΠ½Π±Π΅Ρ€Π³Π΅Ρ€Π° – Π₯ΠΎΡ€Π½Π° – Π¦Π°ΠΉΠ»ΠΈΠ½Π³Π΅Ρ€Π°. ΠŸΠΎΠ»Ρƒ-Ρ‡Π΅Π½ΠΎ Π²Ρ‹Ρ€Π°ΠΆΠ΅Π½ΠΈΠ΅ для вСроятности обнаруТСния Π°Ρ‚Π°ΠΊΠΈΠ»Π΅Π³ΠΈΡ‚ΠΈΠΌΠ½Ρ‹ΠΌΠΈ ΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚Π΅Π»ΡΠΌΠΈ ΠΏΡ€ΠΈ Π°Ρ‚Π°ΠΊΠ΅ Π΄Π²ΡƒΡ… Π·Π»ΠΎΡƒΠΌΡ‹-шлСнников Π² зависимости ΠΎΡ‚ вСроятностСй ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠ΅-ния ΠΈΡ… Π°Ρ‚Π°ΠΊ ΠΎΡ‚Π΄Π΅Π»ΡŒΠ½ΠΎ. Показано, Ρ‡Ρ‚ΠΎ ΡƒΠ²Π΅Π»ΠΈΡ‡Π΅Π½ΠΈΠ΅ ΠΊΠΎΠ»ΠΈ-чСства Π°Ρ‚Π°ΠΊΡƒΡŽΡ‰ΠΈΡ… Π² ΠΊΠ²Π°Π½Ρ‚ΠΎΠ²ΠΎΠΌ ΠΊΠ°Π½Π°Π»Π΅ ΠΏΡ€ΠΈΠ²ΠΎΠ΄ΠΈΡ‚ ΠΊ ΡƒΠ²Π΅-Π»ΠΈΡ‡Π΅Π½ΠΈΡŽ вСроятности обнаруТСния ΠΈΡ… Π°Ρ‚Π°ΠΊΠΈ Π»Π΅Π³ΠΈΡ‚ΠΈΠΌ-Π½Ρ‹ΠΌΠΈ ΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚Π΅Π»ΡΠΌΠΈ. ΠŸΠΎΠ»ΡƒΡ‡Π΅Π½Ρ‹ выраТСния для ΠΌΠ°ΠΊ-симального количСства ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ Π΄Π²ΡƒΡ… Π·Π»ΠΎΡƒΠΌΡ‹Ρˆ-Π»Π΅Π½Π½ΠΈΠΊΠΎΠ² ΠΏΡ€ΠΈ ΠΈΡ… ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°Ρ‚Π΅Π»ΡŒΠ½ΠΎΠΉ Π°Ρ‚Π°ΠΊΠ΅ пассивногопСрСхвата Π½Π° ΠΏΠΈΠ½Π³-ΠΏΠΎΠ½Π³ ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ» с Π“Π₯Π¦-Ρ‚Ρ€ΠΈΠΏΠ»Π΅Ρ‚Π°ΠΌΠΈ.Показано, Ρ‡Ρ‚ΠΎ максимальноС количСство ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈΠ·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΠΎΠ² опрСдСляСтся Ρ‚Π΅ΠΌ ΠΆΠ΅ Π²Ρ‹Ρ€Π°ΠΆΠ΅Π½ΠΈΠ΅ΠΌ,Ρ‡Ρ‚ΠΎ ΠΈ Π² случаС Π°Ρ‚Π°ΠΊΠΈ ΠΎΠ΄Π½ΠΎΠ³ΠΎ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΠ°, измСня-Стся Ρ‚ΠΎΠ»ΡŒΠΊΠΎ Π²Ρ‹Ρ€Π°ΠΆΠ΅Π½ΠΈΠ΅ для вСроятности обнаруТСнияатаки. Показано, Ρ‡Ρ‚ΠΎ ΠΏΠΈΠ½Π³-ΠΏΠΎΠ½Π³ ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ» с Π“Π₯Π¦-Ρ‚Ρ€ΠΈΠΏΠ»Π΅Ρ‚Π°ΠΌΠΈ уязвим ΠΊ Π°Ρ‚Π°ΠΊΠ΅ пассивного ΠΏΠ΅Ρ€Π΅Ρ…Π²Π°Ρ‚Π° Π΄Π²ΡƒΡ…Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΠΎΠ² Π½Π΅ большС, Ρ‡Π΅ΠΌ ΠΊ Π°Ρ‚Π°ΠΊΠ΅ ΠΎΠ΄Π½ΠΎΠ³ΠΎ.Показано, Ρ‡Ρ‚ΠΎ Ρ€Π΅Π·ΡƒΠ»ΡŒΡ‚Π°Ρ‚Ρ‹ Ρ€Π°Π±ΠΎΡ‚Ρ‹ ΠΌΠΎΠ³ΡƒΡ‚ Π±Ρ‹Ρ‚ΡŒ распрос-Ρ‚Ρ€Π°Π½Π΅Π½Ρ‹ Π½Π° ΠΏΠΈΠ½Π³-ΠΏΠΎΠ½Π³ ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Ρ‹ с n-ΠΊΡƒΠ±ΠΈΡ‚Π½Ρ‹ΠΌΠΈ Π“Π₯Π¦-состояниями ΠΏΡ€ΠΈ ΠΏΡ€ΠΎΠΈΠ·Π²ΠΎΠ»ΡŒΠ½Ρ‹Ρ… n.Π£ статті ΠΏΡ€ΠΎΠ°Π½Π°Π»Ρ–Π·ΠΎΠ²Π°Π½ΠΎ послідовну Π°Ρ‚Π°ΠΊΡƒ пасивного пСрСхоплСння Π΄Π²ΠΎΡ… зловмисників Π½Π° ΠΏΡ–Π½Π³-ΠΏΠΎΠ½Π³ ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ» Π· Ρ‚Ρ€ΠΈΠΊΡƒΠ±Ρ–Ρ‚Π½ΠΈΠΌΠΈ ΠΏΠ΅Ρ€Π΅ΠΏΠ»ΡƒΡ‚Π°Π½ΠΈΠΌΠΈ станами Π“Ρ€Ρ–Π½Π±Π΅Ρ€Π³Π΅Ρ€Π° – Π₯ΠΎΡ€Π½Π° – Π¦Π°ΠΉΠ»Ρ–Π½Π³Π΅Ρ€Π°. ΠžΠ΄Π΅Ρ€ΠΆΠ°Π½ΠΎ Π²ΠΈΡ€Π°Π· для ймовірності виявлСння Π°Ρ‚Π°ΠΊΠΈΠ»Π΅Π³Ρ–Ρ‚ΠΈΠΌΠ½ΠΈΠΌΠΈ користувачами ΠΏΡ€ΠΈ Π°Ρ‚Π°Ρ†Ρ– Π΄Π²ΠΎΡ… зловмисників Ρƒ залСТності Π²Ρ–Π΄ імовірностСй виявлСння Ρ—Ρ… Π°Ρ‚Π°ΠΊ ΠΎΠΊΡ€Π΅ΠΌΠΎ. Показано, Ρ‰ΠΎ Π·Π±Ρ–Π»ΡŒΡˆΠ΅Π½Π½Ρ ΠΊΡ–Π»ΡŒΠΊΠΎΡΡ‚Ρ– Π°Ρ‚Π°ΠΊΡƒΡŽΡ‡ΠΈΡ… Π² ΠΊΠ²Π°Π½Ρ‚ΠΎΠ²ΠΎΠΌΡƒ ΠΊΠ°Π½Π°Π»Ρ– ΠΏΡ€ΠΈΠ·Π²ΠΎΠ΄ΠΈΡ‚ΡŒ Π΄ΠΎ Π·Π±Ρ–Π»ΡŒΡˆΠ΅Π½Π½Ρ ймовірності виявлСння Ρ—Ρ…Π°Ρ‚Π°ΠΊΠΈ Π»Π΅Π³Ρ–Ρ‚ΠΈΠΌΠ½ΠΈΠΌΠΈ користувачами. ΠžΠ΄Π΅Ρ€ΠΆΠ°Π½ΠΎ Π²ΠΈΡ€Π°Π·ΠΈ для ΠΌΠ°ΠΊΡΠΈΠΌΠ°Π»ΡŒΠ½ΠΎΡ— ΠΊΡ–Π»ΡŒΠΊΠΎΡΡ‚Ρ– Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–Ρ— Π΄Π²ΠΎΡ… зловмисників ΠΏΡ€ΠΈ Ρ—Ρ… послідовній Π°Ρ‚Π°Ρ†Ρ– пасивного пСрСхоплСння Π½Π° ΠΏΡ–Π½Π³-ΠΏΠΎΠ½Π³ ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ» Π· Π“Π₯Π¦-Ρ‚Ρ€ΠΈΠΏΠ»Π΅Ρ‚Π°ΠΌΠΈ. Показано, Ρ‰ΠΎ максимальна ΠΊΡ–Π»ΡŒ-ΠΊΡ–ΡΡ‚ΡŒ Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–Ρ— зловмисників Π²ΠΈΠ·Π½Π°Ρ‡Π°Ρ”Ρ‚ΡŒΡΡ Ρ‚ΠΈΠΌ ΠΆΠ΅ Π²ΠΈΡ€Π°Π·ΠΎΠΌ, Ρ‰ΠΎ ΠΉ Ρƒ Π²ΠΈΠΏΠ°Π΄ΠΊΡƒ Π°Ρ‚Π°ΠΊΠΈ ΠΎΠ΄Π½ΠΎΠ³ΠΎ зловмисника, Π·ΠΌΡ–Π½ΡŽΡ”Ρ‚ΡŒΡΡΡ‚Ρ–Π»ΡŒΠΊΠΈ Π²ΠΈΡ€Π°Π· для ΠΉΠΌΠΎΠ²Ρ–Ρ€Π½Ρ–ΡΡ‚ΡŒ виявлСння Π°Ρ‚Π°ΠΊΠΈ. Показано, Ρ‰ΠΎ ΠΏΡ–Π½Π³-ΠΏΠΎΠ½Π³ ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ» Π· Π“Π₯Π¦-Ρ‚Ρ€ΠΈΠΏΠ»Π΅Ρ‚Π°ΠΌΠΈ Π²Ρ€Π°Π·Π»ΠΈΠ²ΠΈΠΉ Π΄ΠΎΠ°Ρ‚Π°ΠΊΠΈ пасивного пСрСхоплСння Π΄Π²ΠΎΡ… зловмисників Π½Π΅ Π±Ρ–Π»ΡŒΡˆΠ΅, Π½Ρ–ΠΆ Π΄ΠΎ Π°Ρ‚Π°ΠΊΠΈ ΠΎΠ΄Π½ΠΎΠ³ΠΎ. Показано, Ρ‰ΠΎ Ρ€Π΅Π·ΡƒΠ»ΡŒΡ‚Π°Ρ‚ΠΈ Ρ€ΠΎΠ±ΠΎΡ‚ΠΈ ΠΌΠΎΠΆΡƒΡ‚ΡŒ Π±ΡƒΡ‚ΠΈ ΠΏΠΎΡˆΠΈΡ€Π΅Π½Ρ– Π½Π° ΠΏΡ–Π½Π³-ΠΏΠΎΠ½Π³ ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»ΠΈ Π· n-ΠΊΡƒΠ±Ρ–Ρ‚Π½ΠΈΠΌΠΈ Π“Π₯Π¦-станами ΠΏΡ€ΠΈ Π΄ΠΎΠ²Ρ–Π»ΡŒΠ½ΠΈΡ… n

    Quantum Direct Communication

    Get PDF

    Quantum Secure Telecommunication Systems

    Get PDF
    This book guides readers through the basics of rapidly emerging networks to more advanced concepts and future expectations of Telecommunications Networks. It identifies and examines the most pressing research issues in Telecommunications and it contains chapters written by leading researchers, academics and industry professionals. Telecommunications Networks - Current Status and Future Trends covers surveys of recent publications that investigate key areas of interest such as: IMS, eTOM, 3G/4G, optimization problems, modeling, simulation, quality of service, etc. This book, that is suitable for both PhD and master students, is organized into six sections: New Generation Networks, Quality of Services, Sensor Networks, Telecommunications, Traffic Engineering and Routing

    Telecommunications Networks

    Get PDF
    This book guides readers through the basics of rapidly emerging networks to more advanced concepts and future expectations of Telecommunications Networks. It identifies and examines the most pressing research issues in Telecommunications and it contains chapters written by leading researchers, academics and industry professionals. Telecommunications Networks - Current Status and Future Trends covers surveys of recent publications that investigate key areas of interest such as: IMS, eTOM, 3G/4G, optimization problems, modeling, simulation, quality of service, etc. This book, that is suitable for both PhD and master students, is organized into six sections: New Generation Networks, Quality of Services, Sensor Networks, Telecommunications, Traffic Engineering and Routing
    corecore