Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
In quantum cryptography, the key is created during the process of key distribution, where as in classical key distribution a predetermined key is transmitted to the legitimate user. The most important contribution of quantum key distribution is the detection of eavesdropping. | Nghiên cứu khoa học công nghệ KEY AGREEMENT SCHEME BASED ON QUANTUM NEURAL NETWORKS Nguyen Nam Hai Abstract In quantum cryptography the key is created during the process of key distribution where as in classical key distribution a predetermined key is transmitted to the legitimate user. The most important contribution of quantum key distribution is the detection of eavesdropping. The purpose of this paper is to introduce an application of QNNs in construction of key distribution protocol in which two networks exchange their outputs in qubits and the key to be synchronized between two communicating parties. This system is based on multilayer qubit QNNs trained with back-propagation algorithm. Keywords Neural networks Quantum neural networks Cryptography. 1. INTRODUCTION In cryptography key is the most important parameter that determines the functional output of a cryptographic algorithm. For encryption algorithms a key specifies the transformation of plaintext into cipher text and vice versa for decryption algorithms. Keys also specify transformations in other cryptographic algorithms such as digital signature schemes and message authentication codes. The security of cryptosystems based on encryption keys. In the network information era one of the most interesting problems is keys transformation that ensures the privacy of them. It is important to structure group key agreement schemes which are designed to provide a set of players and communicating over a public network with a session key to be used to implement secure multicast sessions e.g. video conferencing collaborative computation file sharing via internet secure group chat group purchase of encrypted content and so on. A key-agreement protocol or key agreement scheme is a protocol whereby two or more parties can agree on a key in such a way that both influence the outcome. If properly done this precludes undesired third parties from forcing a key choice on the agreeing parties. Protocols that are useful in .