Academic literature on the topic 'Key Distribution'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Key Distribution.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Key Distribution"
Djellab, Rima, and Mohamed Benmohammed. "Enhancing 802.11i key distribution using quantum key distribution." International Journal of Applied Research on Information Technology and Computing 2, no. 3 (2011): 14. http://dx.doi.org/10.5958/j.0975-8070.2.3.016.
Full textXue, Yang, Wei Chen, Shuang Wang, Zhenqiang Yin, Lei Shi, and Zhengfu Han. "Airborne quantum key distribution: a review [Invited]." Chinese Optics Letters 19, no. 12 (2021): 122702. http://dx.doi.org/10.3788/col202119.122702.
Full textHoriuchi, Noriaki. "Convenient key distribution." Nature Photonics 7, no. 2 (January 31, 2013): 84. http://dx.doi.org/10.1038/nphoton.2013.17.
Full textMehic, Miralem, Marcin Niemiec, Stefan Rass, Jiajun Ma, Momtchil Peev, Alejandro Aguado, Vicente Martin, et al. "Quantum Key Distribution." ACM Computing Surveys 53, no. 5 (October 15, 2020): 1–41. http://dx.doi.org/10.1145/3402192.
Full textFeng Tang, Feng Tang, and Bing Zhu Bing Zhu. "Scintillation discriminator improves free-space quantum key distribution." Chinese Optics Letters 11, no. 9 (2013): 090101–90104. http://dx.doi.org/10.3788/col201311.090101.
Full textLv, Xixiang, Yi Mu, and Hui Li. "Key distribution for heterogeneous public-key cryptosystems." Journal of Communications and Networks 15, no. 5 (October 2013): 464–68. http://dx.doi.org/10.1109/jcn.2013.000085.
Full textZhang, Q., H. Takesue, T. Honjo, K. Wen, T. Hirohata, M. Suyama, Y. Takiguchi, et al. "Megabits secure key rate quantum key distribution." New Journal of Physics 11, no. 4 (April 30, 2009): 045010. http://dx.doi.org/10.1088/1367-2630/11/4/045010.
Full textHwang, Tzonelih, Chia-Wei Tsai, and Song-Kong Chong. "Probabilistic quantum key distribution." Quantum Information and Computation 11, no. 7&8 (July 2011): 615–37. http://dx.doi.org/10.26421/qic11.7-8-6.
Full textCowper, Noah, Harry Shaw, and David Thayer. "Chaotic Quantum Key Distribution." Cryptography 4, no. 3 (August 31, 2020): 24. http://dx.doi.org/10.3390/cryptography4030024.
Full textInoue, K. "Quantum key distribution technologies." IEEE Journal of Selected Topics in Quantum Electronics 12, no. 4 (July 2006): 888–96. http://dx.doi.org/10.1109/jstqe.2006.876606.
Full textDissertations / Theses on the topic "Key Distribution"
Sonalker, Anuja Anilkumar. "Asymmetric Key Distribution." NCSU, 2002. http://www.lib.ncsu.edu/theses/available/etd-20020403-040240.
Full textABSTRACT BY Anuja A Sonalker on Asymmetric Key Distribution. (Under the direction of Dr. Gregory T. Byrd) Currently, in Threshold Public Key Systems key shares are generated uniformly and distributed in the same manner to every participant. We propose a new scheme, Asymmetric Key Distribution (AKD), in which one share server is provided with a larger, unequal chunk of the original secret key. Asymmetric Key Distribution is a unique scheme for generating and distributing unequal shares via a Trusted Dealer to all the registered peers in the system such that without the combination of the single compulsory share from the Special Server no transaction can be completed. This application is aimed for circumstances where a single party needs to co-exist within a group of semi-trusted peers, or in a coalition where every entity should have a choice to participate and one of the entities needs to be privileged with more powers. This thesis presents the algorithm and security model for Asymmetric Key Distribution, along with all the assumptions and dependencies within the boundaries of which this algorithm is guaranteed to be secure. Its robustness lies in its simplicity and in its distributed nature. We address all security concerns related to the model including compromised share servers and cryptanalytic attacks. A variation, called the Dual Threshold Scheme, is created to reduce the vulnerability in the algorithm, namely, the compromise of the Special Server and its secret share. In this scheme, a combination of another threshold number of Distributed Special Servers must combine to collectively generate a share equivalent to the Special Server?s share. This flexibility allows us to adjust our threshold scheme for the environment. We describe a Java-based implementation of the AKD algorithm, using Remote Method Invocation (RMI) for communication among share servers. A typical scenario of a Trusted Dealer, a Special Server and a number of Share Servers was created, where timed asymmetric key generation and distribution was carried out after which the servers initiated and carried out certificate signing transactions in the appropriated manner. As an interesting exercise, the share servers were corrupted so that they would try to exclude the Special Server in the transactions and try to form its share themselves, to observe the consequence. All their efforts were futile. Another interesting aspect was the key generation timing. Key generation is known to be a very time-extensive process but the key share reuse concept used in this implementation reduced the time for key generation by 66-90% of the classical key generation time.
Tvedt, Ole Christian. "Quantum key distribution prototype." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for elektronikk og telekommunikasjon, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-15845.
Full textNovak, Julia. "Generalised key distribution patterns." Thesis, Royal Holloway, University of London, 2012. http://repository.royalholloway.ac.uk/items/f582aac8-df73-28ea-fe2e-80f1c37f5e59/8/.
Full textWeier, Henning. "European Quantum Key Distribution Network." Diss., lmu, 2011. http://nbn-resolving.de/urn:nbn:de:bvb:19-133206.
Full textSimonsen, Eivind Sjøtun. "Security of quantum key distribution source." Thesis, Norwegian University of Science and Technology, Department of Electronics and Telecommunications, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10836.
Full textCryptography has begun its journey into the field of quantum information theory. Classical cryptography has shown weaknesses, which may be exploited in the future, either by development in mathematics, or by quantum computers. Quantum key distribution (QKD) is a promising path for cryptography to enable secure communication in the future. Although the theory of QKD promises absolute security, the reality is that current quantum crypto systems have flaws in them, as perfect devices have proven impossible to build. However, this can be taken into account in security proofs to ensure security, even with flaws. Security loopholes in QKD systems are being discovered as development progresses. Nevertheless, the system being built at NTNU is intended to address them all, creating a totally secure system. During this thesis, work was continued assembling the interferometer which is the basis for encoding qubits. It was fully connected on an optical table, and interference was obtained. Concerning theoretical work, calculations for a photon source specific parameter was carried out. It consisted of expanding previous framework and applying the results in both an established security proof, and a recent generalization of this proof. Two source effects were in focus, the lasers random phase and its fluctuating pulse intensity. Where analytical derivation was no longer possible, Matlab was used for numerical calculations. Under the conditions of the framework and proofs this thesis lies on, randomized phase turned out to have a negligible improvement over the case of non-random phase. Fluctuating amplitude showed a larger effect, reducing system performance. The input parameters were extreme, thus in a realistic situation it should not affect system performance significantly. However, these fluctuations must be taken into account when proving system security.
Kurnio, Hartono. "Contributions to group key distribution schemes." Access electronically, 2005. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060509.103409/index.html.
Full textNauerth, Sebastian. "Air to ground quantum key distribution." Diss., Ludwig-Maximilians-Universität München, 2013. http://nbn-resolving.de/urn:nbn:de:bvb:19-162223.
Full textGordon, Karen Jane. "GigaHertz clocked quantum key distribution system." Thesis, Heriot-Watt University, 2003. http://hdl.handle.net/10399/309.
Full textTang, Xinke. "Optically switched quantum key distribution network." Thesis, University of Cambridge, 2019. https://www.repository.cam.ac.uk/handle/1810/289444.
Full textGorman, Philip Michael. "Practical free-space quantum key distribution." Thesis, Heriot-Watt University, 2010. http://hdl.handle.net/10399/2390.
Full textBooks on the topic "Key Distribution"
Wolf, Ramona. Quantum Key Distribution. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73991-1.
Full textMehic, Miralem, Stefan Rass, Peppino Fazio, and Miroslav Voznak. Quantum Key Distribution Networks. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06608-5.
Full textDjordjevic, Ivan B. Physical-Layer Security and Quantum Key Distribution. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-27565-5.
Full textIslam, Nurul T. High-Rate, High-Dimensional Quantum Key Distribution Systems. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98929-7.
Full textO'Connor, Raymond. Regional distribution of Irish tourism: Key marketing issues. Dublin: University College Dublin, Graduate School of Business, 1998.
Find full textKrumm, Kathie L. Transfers and the transition from socialism: Key tradeoffs. Washington DC: World Bank Europe and Central Asia Regional Office, Office of the Regional Vice President, 1994.
Find full textHarrow, Gerry. Ethanol production, distribution, and use: Discussions on key issues. Golden, Colo.]: National Renewable Energy Laboratory, 2008.
Find full textOehler, Friderike. Key factors determining the distribution of fungal hyphae in forest soils. Freiburg im Breisgau: Institut für Bodenkunde und Waldernährungslehre der Albert-Ludwigs-Universität Freiburg im Breisgau, 2006.
Find full textKornacker, Paul M. Checklist and key to the snakes of Venezuela =: Lista sistemática y clave para las serpientes de Venezuela. Rheinbach, Germany: Pako-Verlag, 1999.
Find full textInternational, BirdLife, ed. Important bird areas in Asia: Key sites for conservation. Cambridge: BirdLife International, 2004.
Find full textBook chapters on the topic "Key Distribution"
Stinson, Douglas R., and Maura B. Paterson. "Key Distribution." In Cryptography, 415–60. Fourth edition. | Boca Raton : CRC Press, Taylor & Francis: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9781315282497-11.
Full textWolf, Ramona. "Introduction." In Quantum Key Distribution, 1–12. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73991-1_1.
Full textWolf, Ramona. "Security Analysis." In Quantum Key Distribution, 117–57. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73991-1_5.
Full textWolf, Ramona. "Recent Developments in Practical QKD." In Quantum Key Distribution, 183–217. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73991-1_7.
Full textWolf, Ramona. "Device-Independent QKD." In Quantum Key Distribution, 159–82. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73991-1_6.
Full textWolf, Ramona. "Mathematical Tools." In Quantum Key Distribution, 13–52. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73991-1_2.
Full textWolf, Ramona. "Quantum Key Distribution Protocols." In Quantum Key Distribution, 91–116. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73991-1_4.
Full textWolf, Ramona. "Information and Entropies." In Quantum Key Distribution, 53–89. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73991-1_3.
Full textRenner, Renato. "Quantum Key Distribution." In Encyclopedia of Algorithms, 1703–7. New York, NY: Springer New York, 2016. http://dx.doi.org/10.1007/978-1-4939-2864-4_316.
Full textPerrig, Adrian, and J. D. Tygar. "ELK Key Distribution." In Secure Broadcast Communication, 111–48. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-1-4615-0229-6_6.
Full textConference papers on the topic "Key Distribution"
Gronberg, P., and P. Jonsson. "Key reconciliation in quantum key distribution." In IEE Seminar on Quantum Cryptography: Secure Communications. IEE, 2005. http://dx.doi.org/10.1049/ic:20050587.
Full textZhang, Qiang, Hiroki Takesue, Toshimori Honjo, Kai Wen, Toru Hirohata, Motohiro Suyama, Yoshihiro Takiguchi, et al. "Megabits Secure Key Rate Quantum Key Distribution." In International Quantum Electronics Conference. Washington, D.C.: OSA, 2009. http://dx.doi.org/10.1364/iqec.2009.itui1.
Full textEhdaie, Mohammad, Nikos Alexiou, Mahmoud Ahmadian, Mohammad Reza Aref, and Panos Papadimitratos. "Key splitting for random key distribution schemes." In 2012 20th IEEE International Conference on Network Protocols (ICNP). IEEE, 2012. http://dx.doi.org/10.1109/icnp.2012.6459951.
Full textur Rehman, Junaid, Youngmin Jeong, and Hyundong Shin. "Quantum key distribution with a control key." In 2017 International Symposium on Wireless Communication Systems (ISWCS). IEEE, 2017. http://dx.doi.org/10.1109/iswcs.2017.8108093.
Full textShapiro, Jeffrey H., Quntao Zhuang, Zheshen Zhang, Justin Dove, and Franco N. C. Wong. "Floodlight Quantum Key Distribution." In Applications of Lasers for Sensing and Free Space Communications. Washington, D.C.: OSA, 2016. http://dx.doi.org/10.1364/lsc.2016.ltu5b.1.
Full textMélen, Gwenaelle, Peter Freiwang, Jannik Luhn, Tobias Vogl, Markus Rau, Clemens Sonnleitner, Wenjamin Rosenfeld, and Harald Weinfurter. "Handheld Quantum Key Distribution." In Quantum Information and Measurement. Washington, D.C.: OSA, 2017. http://dx.doi.org/10.1364/qim.2017.qt6a.57.
Full textZbinden, Hugo, Sylvain Fasel, Nicolas Gisin, Olivier Guinnard, Gregoire Ribordy, Andre Stefanov, and Damien Stucki. "Practical quantum key distribution." In Photonics Asia 2002, edited by Songhao Liu, Guangcan Guo, Hoi-Kwong Lo, and Nobuyuki Imoto. SPIE, 2002. http://dx.doi.org/10.1117/12.483038.
Full textZhuang, Quntao, Zheshen Zhang, Justin Dove, Franco N. C. Wong, and Jeffrey H. Shapiro. "Floodlight Quantum Key Distribution." In CLEO: QELS_Fundamental Science. Washington, D.C.: OSA, 2016. http://dx.doi.org/10.1364/cleo_qels.2016.fth3c.1.
Full textMélen, Gwenaelle, Peter Freiwang, Jannik Luhn, Tobias Vogl, Markus Rau, Wenjamin Rosenfeld, and Harald Weinfurter. "Handheld Quantum Key Distribution." In CLEO: QELS_Fundamental Science. Washington, D.C.: OSA, 2018. http://dx.doi.org/10.1364/cleo_qels.2018.ftu3g.1.
Full textKlicnik, Ondrej, Petr Munster, Tomas Horvath, Jan Hajny, and Lukas Malina. "Quantum Key Distribution Polygon." In 2021 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE, 2021. http://dx.doi.org/10.1109/icumt54235.2021.9631732.
Full textReports on the topic "Key Distribution"
Ballardie, A. Scalable Multicast Key Distribution. RFC Editor, May 1996. http://dx.doi.org/10.17487/rfc1949.
Full textBush, Stephen. TIME-SENSITIVE QUANTUM KEY DISTRIBUTION. Office of Scientific and Technical Information (OSTI), December 2021. http://dx.doi.org/10.2172/1870109.
Full textTurner, S. CMS Symmetric Key Management and Distribution. RFC Editor, June 2008. http://dx.doi.org/10.17487/rfc5275.
Full textReiter, Michael, Kenneth Birman, and Robert van Renesse. Fault-Tolerant Key Distribution (Preliminary Version). Fort Belvoir, VA: Defense Technical Information Center, January 1993. http://dx.doi.org/10.21236/ada261489.
Full textReiter, Michael, Kenneth Birman, and Robert Van Renesse. Fault-Tolerant Key Distribution (Preliminary Version). Fort Belvoir, VA: Defense Technical Information Center, January 1993. http://dx.doi.org/10.21236/ada262422.
Full textSyverson, Paul, and Catherine Meadows. Formal Requirements for Key Distribution Protocols. Fort Belvoir, VA: Defense Technical Information Center, January 1994. http://dx.doi.org/10.21236/ada463018.
Full textSobolewski, Roman. Quantum Key Distribution Using Polarized Single Photons. Fort Belvoir, VA: Defense Technical Information Center, April 2009. http://dx.doi.org/10.21236/ada502752.
Full textSyverson, Paul. On Key Distribution Protocols for Repeated Authentication. Fort Belvoir, VA: Defense Technical Information Center, January 1993. http://dx.doi.org/10.21236/ada465538.
Full textNORDHOLT, J., R. HUGHES, and ET AL. PRESENT AND FUTURE FREE-SPACE QUANTUM KEY DISTRIBUTION. Office of Scientific and Technical Information (OSTI), December 2001. http://dx.doi.org/10.2172/790237.
Full textSchwartz, Carey, and Shannon Viverette. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY). Fort Belvoir, VA: Defense Technical Information Center, July 2014. http://dx.doi.org/10.21236/ada607003.
Full text