758 research outputs found

    A Novel Protocol-Authentication Algorithm Ruling Out a Man-in-the-Middle Attack in Quantum Cryptography

    Full text link
    In this work we review the security vulnerability of Quantum Cryptography with respect to "man-in-the-middle attacks" and the standard authentication methods applied to counteract these attacks. We further propose a modified authentication algorithm which features higher efficiency with respect to consumption of mutual secret bits.Comment: 4 pages, submitted to the International Journal of Quantum Information, Proceedings of the meeting "Foundations of Quantum Information", Camerino, April 200

    Arbetarfrågan i Finland

    Get PDF

    Pohja : puheita ja kirjoituksia

    Get PDF

    Experimental Quantum Coin Tossing

    Full text link
    In this letter we present the first implementation of a quantum coin tossing protocol. This protocol belongs to a class of ``two-party'' cryptographic problems, where the communication partners distrust each other. As with a number of such two-party protocols, the best implementation of the quantum coin tossing requires qutrits. In this way, we have also performed the first complete quantum communication protocol with qutrits. In our experiment the two partners succeeded to remotely toss a row of coins using photons entangled in the orbital angular momentum. We also show the experimental bounds of a possible cheater and the ways of detecting him

    Suomen työväenliike : historiallinen katsaus

    Get PDF

    Työväenkysymys Suomessa

    Get PDF
    corecore