To provide card holder authentication while they are conducting an electronic transaction using mobile devices, VISA and MasterCard independently proposed two electronic payment protocols: Visa 3D Secure and MasterCar...
详细信息
To provide card holder authentication while they are conducting an electronic transaction using mobile devices, VISA and MasterCard independently proposed two electronic payment protocols: Visa 3D Secure and MasterCar...
详细信息
ISBN:
(纸本)9781920682361
To provide card holder authentication while they are conducting an electronic transaction using mobile devices, VISA and MasterCard independently proposed two electronic payment protocols: Visa 3D Secure and MasterCard Secure Code. The protocols use pre-registered passwords to provide card holder authentication and Secure Socket Layer/ Transport Layer Security (SSL/TLS) for data confidentiality over wired networks and Wireless Transport Layer Security (WTLS) between a wireless device and a Wireless Application Protocol (WAP) gateway. The paper presents our analysis of security properties in the proposed protocols using formal method tools: Casper and FDR2. We also highlight issues concerning payment security in the proposed protocols.
In this paper we analyse the role of some of the building blocks of SHA-256. We show that the disturbance-correction strategy is applicable to the SHA-256 architecture and we prove that functions Σ σ are vital for t...
We observe that MDS codes have interesting properties that can be used to construct ideal threshold schemes. These schemes permit the combiner to detect cheating, identify cheaters and recover the correct secret. The ...
We introduce electron field coherent states that exhibit full coherence. We employ these states in developing a theory of phase-sensitive homodyne detection and measuring the current noise benchmarked against the stan...
详细信息
Bipartite operations underpin both classical communication and entanglement generation. Using a superposition of classical messages, we show that the capacity of a two-qubit operation for error-free entanglement-assis...
详细信息
Bipartite operations underpin both classical communication and entanglement generation. Using a superposition of classical messages, we show that the capacity of a two-qubit operation for error-free entanglement-assisted bidirectional classical communication cannot exceed twice the entanglement capability. In addition, we show that any bipartite two-qubit operation can increase the communication that may be performed using an ensemble by twice the entanglement capability.
Two-qubit operations may be characterized by their capacities for communication, both with and without free entanglement, and their capacity for creating entanglement. We establish a set of inequalities that give an o...
详细信息
Two-qubit operations may be characterized by their capacities for communication, both with and without free entanglement, and their capacity for creating entanglement. We establish a set of inequalities that give an ordering to the capacities of two-qubit unitary operations. Specifically, we show that the capacities for entanglement creation and bidirectional communication without entanglement assistance are at least as great as half the bidirectional communication capacity with entanglement assistance. In addition, we show that the bidirectional communication that can be performed using an ensemble may be increased via a two-qubit unitary operation by twice the operation’s capacity for entanglement.
We prove that it is possible to remotely prepare an ensemble of noncommuting mixed states using communication equal to the Holevo information for this ensemble. This remote preparation scheme may be used to convert be...
详细信息
We prove that it is possible to remotely prepare an ensemble of noncommuting mixed states using communication equal to the Holevo information for this ensemble. This remote preparation scheme may be used to convert between different ensembles of mixed states in an asymptotically lossless way, analogous to concentration and dilution for entanglement.
The power of sharing computation in a cryptosystem is crucial in several real-life applications of cryptography. Cryptographic primitives and tasks to which threshold cryptosystems have been applied include variants o...
We investigate the generation of multipartite entangled state in a system of N quantum dots embedded in a microcavity and examine the emergence of genuine multipartite entanglement by three different characterizations...
详细信息
We investigate the generation of multipartite entangled state in a system of N quantum dots embedded in a microcavity and examine the emergence of genuine multipartite entanglement by three different characterizations of entanglement. At certain times of dynamical evolution one can generate multipartite entangled coherent exciton states or multiqubit W states by initially preparing the cavity field in a superposition of coherent states or the Fock state with one photon, respectively. Finally, we study environmental effects on multipartite entanglement generation and find that the decay rate for the entanglement is proportional to the number of excitons.
暂无评论