This HTML5 document contains 48 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n14http://localhost/temp/predkladatel/
n12http://linked.opendata.cz/resource/domain/vavai/projekt/
n11http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n19http://linked.opendata.cz/resource/domain/vavai/subjekt/
n18http://linked.opendata.cz/ontology/domain/vavai/
shttp://schema.org/
n4http://linked.opendata.cz/ontology/domain/vavai/riv/
skoshttp://www.w3.org/2004/02/skos/core#
rdfshttp://www.w3.org/2000/01/rdf-schema#
n20http://bibframe.org/vocab/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n7http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216224%3A14330%2F12%3A00057910%21RIV13-GA0-14330___/
n15http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n21http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n9http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n6http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n8http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n5http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n13http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216224%3A14330%2F12%3A00057910%21RIV13-GA0-14330___
rdf:type
n18:Vysledek skos:Concept
rdfs:seeAlso
http://link.aps.org/doi/10.1103/PhysRevA.86.062308
dcterms:description
In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating parties (Alice and Bob). Eve is also expected to have full access to an authenticated classical channel between Alice and Bob. Unconditional security against any attack by Eve can be proved even in the realistic setting of device and channel imperfection. In this paper we show that the security of quantum key distribution protocols is ruined if one allows Eve to possess a very limited access to the random sources used by Alice. Such knowledge should always be expected in realistic experimental conditions via different side channels. In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating parties (Alice and Bob). Eve is also expected to have full access to an authenticated classical channel between Alice and Bob. Unconditional security against any attack by Eve can be proved even in the realistic setting of device and channel imperfection. In this paper we show that the security of quantum key distribution protocols is ruined if one allows Eve to possess a very limited access to the random sources used by Alice. Such knowledge should always be expected in realistic experimental conditions via different side channels.
dcterms:title
Weak randomness seriously limits the security of quantum key distribution Weak randomness seriously limits the security of quantum key distribution
skos:prefLabel
Weak randomness seriously limits the security of quantum key distribution Weak randomness seriously limits the security of quantum key distribution
skos:notation
RIV/00216224:14330/12:00057910!RIV13-GA0-14330___
n18:predkladatel
n19:orjk%3A14330
n4:aktivita
n6:P
n4:aktivity
P(GAP202/12/1142), P(GBP202/12/G061), P(GD102/09/H042)
n4:cisloPeriodika
6
n4:dodaniDat
n13:2013
n4:domaciTvurceVysledku
Wilmott, Colin n11:3626423 n11:9279148 n11:8912890
n4:druhVysledku
n8:J
n4:duvernostUdaju
n21:S
n4:entitaPredkladatele
n7:predkladatel
n4:idSjednocenehoVysledku
180768
n4:idVysledku
RIV/00216224:14330/12:00057910
n4:jazykVysledku
n9:eng
n4:klicovaSlova
weak randomness; quantum key distribution
n4:klicoveSlovo
n15:weak%20randomness n15:quantum%20key%20distribution
n4:kodStatuVydavatele
US - Spojené státy americké
n4:kontrolniKodProRIV
[D2809111062D]
n4:nazevZdroje
Physical Review A
n4:obor
n5:IN
n4:pocetDomacichTvurcuVysledku
4
n4:pocetTvurcuVysledku
4
n4:projekt
n12:GD102%2F09%2FH042 n12:GAP202%2F12%2F1142 n12:GBP202%2F12%2FG061
n4:rokUplatneniVysledku
n13:2012
n4:svazekPeriodika
86
n4:tvurceVysledku
Wilmott, Colin Pivoluska, Matej Bouda, Jan Plesch, Martin
n4:wos
000315047500002
s:issn
1050-2947
s:numberOfPages
5
n20:doi
10.1103/PhysRevA.86.062308
n14:organizacniJednotka
14330