Loading...
Search for: key-distribution
0.005 seconds
Total 22 records

    Memory and Entanglement Assisted Secure Quantum Key Distribution

    , M.Sc. Thesis Sharif University of Technology Fazelian, Masoume (Author) ; Salehi, Jawad (Supervisor)
    Abstract
    Two major category of protocols suggested for quantum key distribution (QKD) are prepare and measure protocols and entanglement based protocols. One of the most challenging problem of these two categories is that they are not immune against attacks to measurement devices. For addressing this problem, measurement device independent protocol (MDI-QKD) was proposed in 2012; in which measurement device can be in hands of untrusted party. The idea of MDI-QKD is based on time-reversed EPR protocol. Still low secure key exchange rate has provoked many efforts, one of these efforts was to improve the key rate by means of quantum memories. In this thesis different proposed structures for memory... 

    Empirical coordination in a triangular multiterminal network

    , Article IEEE International Symposium on Information Theory - Proceedings ; 2013 , Pages 2149-2153 ; ISSN: 21578095 ; ISBN: 9781479904464 Bereyhi, A ; Bahrami, M ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    2013
    Abstract
    In this paper, we investigate the problem of the empirical coordination in a triangular multiterminal network. A triangular multiterminal network consists of three terminals where two terminals observe two external i.i.d correlated sequences. The third terminal wishes to generate a sequence with desired empirical joint distribution. For this problem, we derive inner and outer bounds on the empirical coordination capacity region. It is shown that the capacity region of the degraded source network and the inner and outer bounds on the capacity region of the cascade multiterminal network can be directly obtained from our inner and outer bounds. For a cipher system, we establish key distribution... 

    The Effects of Non-Gaussian Operations in Increasing the Secure Length of Quantum Communications based on Continuous Variables

    , M.Sc. Thesis Sharif University of Technology Nazemi, Yasaman (Author) ; Bahrampour, Alireza (Supervisor)
    Abstract
    Quantum key distribution (QKD), as one of the applications in quantum information processing, allows two distant legitimate parties to establish a set of secure keys even in the presence of an untrusted environment controlled by an eavesdropper. In general, QKD mainly includes two families, namely, discrete variable quantum key distribution (DV-QKD) and continuous variable quantum key distribution (CV-QKD). In CV-QKD system, the sender Alice, encodes information on the quadratures of the optical field with Gaussian modulation, and the receiver Bob, decodes the secret information with homodyne or heterodyne detection so that this system promises a higher secret key rate than its DV-QKD... 

    Security Improvement of Key Management Protocols in Hierarchical Wireless Sensor Network

    , M.Sc. Thesis Sharif University of Technology Mokhtari Ardakani, Ehsan (Author) ; Salmasizadeh, Mahmood (Supervisor) ; Mohajeri, Javad (Supervisor)
    Abstract

    Wireless sensor networks (WSNs) use many tiny sensors to monitor phenomena such as temperature, humidity, brightness and traffic, and then transmit this information to a base station using wireless channels. WSNs find applications in military, ecological, urban and health related areas. Hierarchical wireless sensor networks are kind of sensor networks that use communication entities with different capabilities in terms of energy, processing power, bandwidth, communication range and etc. In this thesis, an introduction to WSNs and their applications, characteristics and designing factors is expressed. It continues on studying the infrastructures and the role of cryptography in enhancing... 

    Analysis of Key Distribution Schemes in Wireless Sensor Networks

    , M.Sc. Thesis Sharif University of Technology Shafieinejad, Masoumeh (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    Wireless Sensor Networks (WSNs) are comprised of small sensor nodes with very limitedstorage, power and computational capabilities. The nodes in wireless sensor networks should be able to communicate with each other in order to accumulate information and to relay it to a base station in a secure manner. Since this communication often takes place in a hostile environment, encryption and/or authentication should be used. This requires the establishment of secure keys between the sensor nodes in the WSN. The constraints of such a lightweight distributed computing environment lend itself to the use of symmetric cryptography to provide security services. The lack of central infrastructure after... 

    Conditional Access System Design for DVB-T Receiver

    , M.Sc. Thesis Sharif University of Technology Ramazi, Ramin (Author) ; Hesabi, Shaahin (Supervisor) ; Sharifkhani, Mohammad (Supervisor)
    Abstract
    In the Pay-TV industry, it is necessary to limit access of unauthorized users. Conditional Access System (CAS) is the solution. In the Pay-TV, the ability of instant join and leave operation is desirable for users. On the other hand, this characteristic is in contradiction with growth of user number.
    Previous proposed conditional access systems address the requirement of pay-TV from several aspects. Key distribution management is on of them which plays a key role in the security and efficiency of a conditional access system. Re-examining the process of key distribution management make it possible to find a way to provide a greater flexibility for the users.
    The purpose of this... 

    Investigation of Weak Measurement in Quantum Key Distribution

    , M.Sc. Thesis Sharif University of Technology Mohammadi, Shadi (Author) ; Alireza Bahrampour (Supervisor)
    Abstract
    Quantum key distribution is one of the practical quantum information technologies in labo- ratories with existing equipments.In quantum key distribution protocols, the main challenge is the secrecy of key distribution. One of the new methods of quantum channel error esti- mation is the use of weak measurement. In this thesis, after introducing the main quantum key distribution protocols, we introduce weak measurement and sequential weak measure- ment concepts: the weak measurement methods are exployed to obtain the phase difference between two polarizations with high accuratly. It is also used for in line monitoring and error estimation parameters in some quantum key distribution protocols.... 

    Key splitting for random key distribution schemes

    , Article Proceedings - International Conference on Network Protocols, ICNP ; 2012 ; 10921648 (ISSN) ; 9781467324472 (ISBN) Ehdaie, M ; Alexiou, N ; Ahmadian, M ; Aref, M. R ; Papadimitratos, P ; Sharif University of Technology
    2012
    Abstract
    A large number of Wireless Sensor Network (WSN) security schemes have been proposed in the literature, relying primarily on symmetric key cryptography. To enable those, Random Key pre-Distribution (RKD) systems have been widely accepted. However, WSN nodes are vulnerable to physical compromise. Capturing one or more nodes operating with RKD would give the adversary keys to compromise communication of other benign nodes. Thus the challenge is to enhance resilience of WSN to node capture, while maintaining the flexibility and low-cost features of RKD. We address this problem, without any special-purpose hardware, proposing a new and simple idea: key splitting. Our scheme does not increase... 

    Key splitting: Making random key distribution schemes resistant against node capture

    , Article Security and Communication Networks ; Volume 8, Issue 3 , 2015 , Pages 431-445 ; 19390114 (ISSN) Ehdaie, M ; Alexiou, N ; Ahmadian Attari, M ; Aref, M. R ; Papadimitratos, P ; Sharif University of Technology
    John Wiley and Sons Inc  2015
    Abstract
    A large number of random key pre-distribution (RKD) schemes have been proposed in the literature to secure wireless sensor network applications, relying on symmetric key cryptography. However, sensor nodes are exposed to physical compromise by adversaries, who target the symmetric keys stored at each node. With the stolen keys in their possession, the adversaries are then able to compromise communication links between benign nodes. Here, the big challenge arises: how to increase resilience of RKD schemes for wireless sensor networks to node capture, while maintaining the flexibility and low-cost features of RKD? We propose the idea of key splitting to address this problem, without the need... 

    Quantum Key Distribution in Quantum Networks

    , Ph.D. Dissertation Sharif University of Technology Bahrani, Sima (Author) ; Salehi, Jawad (Supervisor)
    Abstract
    With the rapid development of communication technology, the importance of information security is growing daily. Data Encryption, as one of the most important tools of secure communication, has attracted a lot of attention. Most conventional cryptography methods are based on computational complexity assumptions. Hence, they are threatened by computational power enhancements. One of the most important approaches of cryptography that does not have this drawback is quantum cryptography. The unconditional security of this method has been proved by laws of quantum mechanics. One application of quantum cryptography is quantum key distribution that enables secret key exchange between two users. The... 

    Quantum Communications with Structured Light

    , M.Sc. Thesis Sharif University of Technology Maddahi, Mohaddesh (Author) ; Bahrampour, Alireza (Supervisor) ; Farman, Farnaz (Co-Supervisor)
    Abstract
    Orbital angular momentum (OAM)and the radial quantum number (p) in infinite-dimensional Hilbert space are two degrees of freedom of light which are associated with the spatial distribution of the electromagnetic field. They are attracting a growing interest for their potential in communication applications ranging from classical communication to fundamental tests of quantum mechanics,quantum communication and quantum cryptography. However, a third party trying to eavesdrop information from communication channel and treat channel security , quantum cryptography or quantum key distribution (QKD) is the secure communication method which is based on the quantum mechanical principles can... 

    Designing Survivable and Quantum Key Distribution Secured Elastic Optical Networks

    , M.Sc. Thesis Sharif University of Technology Ehsani Moghaddam, Elham (Author) ; Salehi, Jawad (Supervisor) ; Beyranvand, Hamzeh (Supervisor)
    Abstract
    Elastic optical networks, due to their key features including flexible spectrum allocation, ability to convey high bitrates, and distance adaptive modulation assignment are considered as a promising solution for providing higher capacity, more efficiency, and scalability in core optical networks.Furthermore, Multi-Core Fibers (MCFs) and Space Division Multiplexing (SDM) technique can be utilized to overcome the capacity limitation of the conventional Single Mode Fibers (SMFs). However, the inter-core crosstalk issue in MCFs should be addressed in the design of these networks.With the use of these technologies and, as a result, increasing the transmission rate in optical networks, the issue... 

    Crosstalk reduction in hybrid quantum-classical networks

    , Article Scientia Iranica ; Volume 23, Issue 6 , 2016 , Pages 2898-2907 ; 10263098 (ISSN) Bahrani, S ; Razavi, M ; Salehi, J. A ; Sharif University of Technology
    Sharif University of Technology  2016
    Abstract
    In this paper, we propose and investigate several crosstalk reduction techniques for hybrid quantum-classical dense-wavelength-division-multiplexing systems. The transmission of intense classical signals alongside weak quantum ones on the same fiber introduces some crosstalk noise, mainly due to Raman scattering and non-ideal channel isolation, that may severely affect the performance of quantum key distribution systems. We examine the conventional methods of suppressing this crosstalk noise, and enhance them by proposing an appropriate channel allocation method that reduces the background crosstalk effectively. Another approach proposed in this paper is the usage of orthogonal frequency... 

    2D Hash Chain robust Random Key Distribution scheme

    , Article Information Processing Letters ; Volume 116, Issue 5 , 2016 , Pages 367-372 ; 00200190 (ISSN) Ehdaie, M ; Alexiou, N ; Ahmadian, M ; Aref, M. R ; Papadimitratos, P ; Sharif University of Technology
    Elsevier  2016
    Abstract
    Many Random Key Distribution (RKD) schemes have been proposed in the literature to enable security applications in Wireless Sensor Networks (WSNs). A main security aspect of RKD schemes is their resistance against node capture attacks, since compromising the sensors and capturing their keys is a common risk in such networks. We propose a new method, based on a 2-Dimensional Hash Chain (2DHC), that can be applied on any RKD scheme to improve their resilience. Our method maintains the flexibility and low cost features of RKD schemes and it doesn't require any special-purpose hardware or extra memory to store keys in the sensors. We demonstrate that our approach significantly increases the... 

    Ping-pong protocol based on the orbital angular momentum of light

    , Article Journal of the Optical Society of America B: Optical Physics ; Volume 35, Issue 10 , 2018 , Pages 2348-2355 ; 07403224 (ISSN) Farman, F ; Tofighi, S ; Bahrampour, A ; Sharif University of Technology
    Abstract
    Orbital angular momentum (OAM) is one of the photon's degrees of freedom in infinite-dimensional Hilbert space. In this paper, we use this photon property to propose a modified version of the deterministic two-way quantum key distribution protocol, known as ping-pong protocol, based on the OAM of light. The advantage of the protocol is that it does not require Bell measurement for decoding the information being transmitted, which makes the protocol more flexible and feasible for practical applications. We propose an implementation setup and show how the channel capacity of the protocol can be easily increased. The security of the protocol is analyzed and the probability of detecting Eve in a... 

    Quantum key distribution with no shared reference frame

    , Article Quantum Information Processing ; Volume 19, Issue 2 , 2020 Rezazadeh, F ; Mani, A ; Karimipour, V ; Sharif University of Technology
    Springer  2020
    Abstract
    Any quantum communication task requires a common reference frame (i.e., phase, coordinate system). In particular, quantum key distribution requires different bases for preparation and measurements of states which are obviously based on the existence of a common frame of reference. Here, we show how QKD can be achieved in the absence of any common frame of reference. We study the coordinate reference frame, where the two parties do not even share a single direction, but the method can be generalized to other general frames of reference, pertaining to other groups of transformations. © 2019, Springer Science+Business Media, LLC, part of Springer Nature  

    Discrete-modulation measurement-device-independent continuous-variable quantum key distribution with a quantum scissor: exact non-Gaussian calculation

    , Article Optics Express ; Volume 30, Issue 7 , 2022 , Pages 11400-11423 ; 10944087 (ISSN) Jafari, K ; Golshani, M ; Bahrampour, A ; Sharif University of Technology
    Optica Publishing Group (formerly OSA)  2022
    Abstract
    In this paper, we study non-Gaussian discrete-modulated measurement-deviceindependent continuous-variable quantum key distribution protocol equipped with a proposed quantum scissor at the receiver side. Our suggested scissor truncates all multiphoton number states with four or more photons and amplifies remaining photon number states in a probabilistic way. Using exact non-Gaussian calculation, we find that quantum scissor meliorates the fidelity and entanglement between two legitimate parties Alice and Bob, at long distances. Therefore, quantum scissor enhances the continuous-variable quantum key distribution protocol range. Examination of the system for different values of the excess noise... 

    A 1.93 pA/√Hz transimpedance amplifier for 2.5 Gb/s optical communications

    , Article Proceedings - IEEE International Symposium on Circuits and Systems ; 2011 , Pages 2889-2892 ; 02714310 (ISSN) ; 9781424494736 (ISBN) Shahdoost, S ; Medi, A ; Saniei, N ; Sharif University of Technology
    Abstract
    A state-of-the-art low-noise transimpedance amplifier (TIA) for 2.5 Gb/s family is presented using IBM 0.13-m CMOS technology. This TIA would be a part of a homodyne detector in a quantum key distribution (QKD) system. In this work a thorough design methodology based on a novel analytical noise optimization is presented. Also a unique method for eliminating the DC current of the input photodiodes (PDs) is proposed. The post-layout simulation results show bandwidth of 52 kHz to 1.9 GHz, average input referred noise of 1.93 pA/√Hz, and transimpedance gain of 80 db while dissipating 12 mW from a 1.5 V power supply, including the output buffer  

    Orthogonal frequency-division multiplexed quantum key distribution

    , Article Journal of Lightwave Technology ; Volume 33, Issue 23 , September , 2015 , Pages 4687-4698 ; 07338724 (ISSN) Bahrani, S ; Razavi, M ; Salehi, J. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    We propose orthogonal frequency-division multiplexing (OFDM), as a spectrally efficient multiplexing technique, for quantum key distribution at the core of trusted-node quantum networks. Two main schemes are proposed and analyzed in detail, considering system imperfections, specifically, time misalignment issues. It turns out that while multiple service providers can share the network infrastructure using the proposed multiplexing techniques, no gain in the total secret key generation rate is obtained if one uses conventional passive all-optical OFDM decoders. To achieve a linear increase in the key rate with the number of channels, an alternative active setup for OFDM decoding is proposed,... 

    Probabilistic key pre-distribution for heterogeneous mobile ad hoc networks using subjective logic

    , Article Proceedings - International Conference on Advanced Information Networking and Applications, AINA, 25 March 2015 through 27 March 2015 ; Volume 2015-April , March , 2015 , Pages 185-192 ; 1550445X (ISSN) ; 9781479979042 (ISBN) Ahmadi, M ; Gharib, M ; Ghassemi, F ; Movaghar, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Public key management scheme in mobile ad hoc networks (MANETs) is an inevitable solution to achieve different security services such as integrity, confidentiality, authentication and non reputation. Probabilistic asymmetric key pre-distribution (PAKP) is a self-organized and fully distributed approach. It resolves most of MANET's challenging concerns such as storage constraint, limited physical security and dynamic topology. In such a model, secure path between two nodes is composed of one or more random successive direct secure links where intermediate nodes can read, drop or modify packets. This way, intelligent selection of intermediate nodes on a secure path is vital to ensure security...