Cargando…
How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack?
We consider a man-in-the-middle attack on two-way quantum key distribution ping-pong and LM05 protocols in which an eavesdropper copies all messages in the message mode, while being undetectable in the mode. Under the attack there is therefore no disturbance in the message mode and the mutual inform...
Autor principal: | Pavičić, Mladen |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7911273/ https://www.ncbi.nlm.nih.gov/pubmed/33573044 http://dx.doi.org/10.3390/e23020163 |
Ejemplares similares
-
PING PONG ACCELERATOR
por: Vanden Broeck, Renilde
Publicado: (2019) -
Ping pong in the pore
por: LeBrasseur, Nicole
Publicado: (2004) -
Security of modified Ping-Pong protocol in noisy and lossy channel
por: Han, Yun-Guang, et al.
Publicado: (2014) -
Some flies do not play ping-pong
por: Fridrich, Arie, et al.
Publicado: (2023) -
Ping-Pong—Tumor and Host in Pancreatic Cancer Progression
por: Mu, Wei, et al.
Publicado: (2019)