Optimization of coherent attacks in generalizations of the BB84 quantum bit commitment protocol.
Robert W. SpekkensTerry RudolphPublished in: Quantum Inf. Comput. (2002)
Keyphrases
- cryptographic protocols
- security protocols
- optimization problems
- optimization algorithm
- global optimization
- secure routing
- denial of service attacks
- block cipher
- lightweight
- cryptographic algorithms
- countermeasures
- privacy preserving
- quantum computation
- watermarking scheme
- communication protocol
- tcp ip
- logic circuits
- probability ranking principle
- digital images