The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution schemes. Our aim is to propose practical methods for error detection and authentication in quantum key distribution schemes. We introduce several concepts about neighborhood collision free properties of Boolean functions, which are closely related to hash functions, and propose methods based on...
We investigate the discrete logarithm problem over jacobian varieties of hyperelliptic curves suitable for public-key cryptosystems, and clarify practical advantages of hyperelliptic cryptosystems compared to the elliptic cryptosystems and to RSA. We focus on the curves defined over the ground field of characteristic 2, and we present hyperelliptic cryptosystems from the jacobian associated with curves...
The steganography that we suggested uses the data that ties strongly to the characteristics of the original image as watermark information without changing the original image. Although similarity with zero-watermarking is pointed out, the major difference is that our method does not need pre-processing for a feature extraction at decoding. Since the decoding can do at high speed, besides using as...
We propose a new steganographic method which is similar to zero-watermarking. In general, digital steganography and digital watermarking, which both embed secret information in host data, have different intended uses. Digital steganography carries embedded secret information through public networks, and the host data serves only as camouflage. Digital watermarking is used to protect host data by embedding...
In a recent paper titled “Comment on: ‘How much security does the Y-00 protocol provide us?’ ” [H.P. Yuen, P. Kumar, E. Corndorf, Phys. Lett. A 346 (2005) 1–6], the authors critically examine our idea [T. Nishioka, T. Hasegawa, H. Ishizuka, K. Imafuku, H. Imai, Phys. Lett. A 327 (2004) 28–32] that the Y-00 protocol is essentially as secure as classical stream ciphers. We clarify our idea in more detail...
New quantum cryptography, often called Y-00 protocol, has much higher performance than the conventional quantum cryptographies. It seems that the conventional quantum cryptographic attacks are inefficient at Y-00 protocol as its security is based on the different grounds from that of the conventional ones. We have, then, tried to cryptoanalyze Y-00 protocol in the view of cryptographic communication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.