Menu
×
Main Library
9 a.m. - 6 p.m.
Phone: (843) 805-6930
West Ashley Library
9 a.m. - 4 p.m.
Phone: (843) 766-6635
Folly Beach Library
Closed for renovations
Phone: (843) 588-2001
John L. Dart Library
9 a.m. - 6 p.m.
Phone: (843) 722-7550
St. Paul's/Hollywood Library
9 a.m. - 5 p.m.
Phone: (843) 889-3300
Mt. Pleasant Library
9 a.m. – 6 p.m.
Phone: (843) 849-6161
Dorchester Road Library
9 a.m. - 6 p.m.
Phone: (843) 552-6466
Edgar Allan Poe/Sullivan's Island Library
9 a.m. - 6 p.m.
Phone: (843) 883-3914
John's Island Library
9 a.m. - 6 p.m.
Phone: (843) 559-1945
McClellanville Library
Closed for renovations
Phone: (843) 887-3699
Edisto Library
9 a.m. - 3 p.m.
Phone: (843) 869-2355
Wando Mount Pleasant Library
9 a.m. - 6 p.m.
Phone: (843) 805-6888
Otranto Road Library
9 a.m. - 6 p.m.
Phone: (843) 572-4094
Hurd/St. Andrews Library
9 a.m. - 6 p.m.
Phone: (843) 766-2546
Baxter-Patrick James Island
9 a.m. - 6 p.m.
Phone: (843) 795-6679
Bees Ferry West Ashley Library
9 a.m. - 6 p.m.
Phone: (843) 805-6892
Village Library
9 a.m. - 6 p.m.
Phone: (843) 884-9741
Keith Summey North Charleston Library
9 a.m. – 6 p.m.
Phone: (843) 744-2489
Mobile Library
9 a.m. - 5 p.m.
Phone: (843) 805-6909
Today's Hours
Main Library
9 a.m. - 6 p.m.
Phone: (843) 805-6930
West Ashley Library
9 a.m. - 4 p.m.
Phone: (843) 766-6635
Folly Beach Library
Closed for renovations
Phone: (843) 588-2001
John L. Dart Library
9 a.m. - 6 p.m.
Phone: (843) 722-7550
St. Paul's/Hollywood Library
9 a.m. - 5 p.m.
Phone: (843) 889-3300
Mt. Pleasant Library
9 a.m. – 6 p.m.
Phone: (843) 849-6161
Dorchester Road Library
9 a.m. - 6 p.m.
Phone: (843) 552-6466
Edgar Allan Poe/Sullivan's Island Library
9 a.m. - 6 p.m.
Phone: (843) 883-3914
John's Island Library
9 a.m. - 6 p.m.
Phone: (843) 559-1945
McClellanville Library
Closed for renovations
Phone: (843) 887-3699
Edisto Library
9 a.m. - 3 p.m.
Phone: (843) 869-2355
Wando Mount Pleasant Library
9 a.m. - 6 p.m.
Phone: (843) 805-6888
Otranto Road Library
9 a.m. - 6 p.m.
Phone: (843) 572-4094
Hurd/St. Andrews Library
9 a.m. - 6 p.m.
Phone: (843) 766-2546
Baxter-Patrick James Island
9 a.m. - 6 p.m.
Phone: (843) 795-6679
Bees Ferry West Ashley Library
9 a.m. - 6 p.m.
Phone: (843) 805-6892
Village Library
9 a.m. - 6 p.m.
Phone: (843) 884-9741
Keith Summey North Charleston Library
9 a.m. – 6 p.m.
Phone: (843) 744-2489
Mobile Library
9 a.m. - 5 p.m.
Phone: (843) 805-6909
Patron Login
menu
Item request has been placed!
×
Item request cannot be made.
×
Processing Request
Shared Quantum Key Distribution Based on Asymmetric Double Quantum Teleportation.
Item request has been placed!
×
Item request cannot be made.
×
Processing Request
- Author(s): Cardoso-Isidoro, Carlos; Delgado, Francisco
- Source:
Symmetry (20738994); Apr2022, Vol. 14 Issue 4, pN.PAG-N.PAG, 31p- Subject Terms:
- Source:
- Additional Information
- Abstract: Quantum cryptography is a well-stated field within quantum applications where quantum information is used to set secure communications, authentication, and secret keys. Now used in quantum devices with those purposes, particularly Quantum Key Distribution (QKD), which proposes a secret key between two parties free of effective eavesdropping, at least at a higher level than classical cryptography. The best-known quantum protocol to securely share a secret key is the BB84 one. Other protocols have been proposed as adaptations of it. Most of them are based on the quantum indeterminacy for non-orthogonal quantum states. Their security is commonly based on the large length of the key. In the current work, a BB84-like procedure for QKD based on double quantum teleportation allows the sharing of the key statement using several parties. Thus, the quantum bits of information are assembled among three parties via entanglement, instead of travelling through a unique quantum channel as in the traditional protocol. Asymmetry in the double teleportation plus post-measurement retains the secrecy in the process. Despite requiring more complex control and resources, the procedure dramatically reduces the probability of success for an eavesdropper under individual attacks, because of the ignorance of the processing times in the procedure. Quantum Bit Error Rate remains in the acceptable threshold and it becomes configurable. The article depicts the double quantum teleportation procedure, the associated control to introduce the QKD scheme, the analysis of individual attacks performed by an eavesdropper, and a brief comparison with other protocols. [ABSTRACT FROM AUTHOR]
- Abstract: Copyright of Symmetry (20738994) is the property of MDPI and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Abstract:
Contact CCPL
Copyright 2022 Charleston County Public Library Powered By EBSCO Stacks 3.3.0 [350.3] | Staff Login
No Comments.