-
21
Construction contemplation of cloud platform for domestic password service based on quantum secret communication
Published 2018-07-01Subjects: Get full text
Article -
22
Improved lattice‐based mix‐nets for electronic voting
Published 2023-01-01Subjects: “…lattice‐based post‐quantum cryptography…”
Get full text
Article -
23
qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era
Published 2025-01-01Subjects: Get full text
Article -
24
A novel method for developing post-quantum cryptoschemes and a practical signature algorithm
Published 2025-01-01Subjects: Get full text
Article -
25
Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption
Published 2025-01-01Subjects: “…quantum cryptography…”
Get full text
Article -
26
Coexistence Demonstration and Wavelength Dependency Analysis of S-Band CV-QKD Signal with Fully Loaded C+L-Band DWDM Signals
Published 2025-01-01Subjects: “…quantum cryptography…”
Get full text
Article -
27
Post-quantum encryption technology based on BRLWE for internet of things
Published 2022-10-01Subjects: “…post-quantum cryptography…”
Get full text
Article -
28
Quantum Private Comparison Protocol with Cluster States
Published 2025-01-01Subjects: Get full text
Article -
29
INNOVATIVE MECHANISMS FOR IMPLEMENTING STATE ECONOMIC POLICY FOR POST-WAR RECONSTRUCTION OF UKRAINE: QUANTUM TRANSFORMATIONS AS A DRIVER OF DEVELOPMENT
Published 2024-12-01“…The second quantum revolution involves the introduction of quantum computers, quantum cryptography and quantum communication, capable of accelerating the development of new materials, optimizing logistics chains and increasing the level of data security. …”
Get full text
Article -
30
Dynamic hierarchical quantum information sharing protocol
Published 2016-12-01“…Quantum secret sharing (QSS) is one important branch of quantum cryptography.Based on the studies of multi-shared quantum bits,a new dynamic quantum bit sharing protocol was proposed.The participation of the shared members is hierarchical in this protocol.The quantum information leader,in the absence of the establishment of a new quantum channel,can remove some of the participants in the secret reconstruction system.After the layoffs,the leader can also update the quantum information using quantum operations,and the remaining effective partici-pants can recover the new quantum information without performing additional operations.In addition,the correct-ness,security and the hierarchy of the participants of the protocol were discussed.…”
Get full text
Article -
31
Simple Matrix encryption scheme with variable ciphertext length
Published 2018-04-01“…Multivariable public key cryptography is one of the reliable candidates for anti-quantum cryptography.The Simple Matrix scheme is constructed using the operations between three matrices.An improved version of the Simple Matrix scheme was proposed.It is constructed by using two flat matrices with random quadratic polynomials,so that the rank attacks is infeasible for the new scheme,and the algebraic attacks breaks the system is at least as hard as solving a set of random quadratic equations.The new scheme will improve the proportion of ciphertext and plaintext to 2 times or more,break the fixed proportion of ciphertext and plaintext,so that it has a flexible proportion to adapt to different needs.…”
Get full text
Article -
32
Perspectives on Entangled Nuclear Particle Pairs Generation and Manipulation in Quantum Communication and Cryptography Systems
Published 2012-01-01“…Entanglement between two quantum elements is a phenomenon which presents a broad application spectrum, being used largely in quantum cryptography schemes and in physical characterisation of the universe. …”
Get full text
Article -
33
Dynamic hierarchical quantum secret sharing protocol based on high-dimensional GHZ state
Published 2024-10-01“…Quantum secret sharing is an important research branch of quantum cryptography. A novel dynamic hierarchical quantum secret sharing protocol based on high-dimensional GHZ (Greenberger-Horne-Zeilinger) state was proposed. …”
Get full text
Article -
34
Recent progress in the security evaluation of multivariate public‐key cryptography
Published 2023-03-01“…Abstract Multivariate public‐key cryptography (MPKC) is considered a leading candidate for post‐quantum cryptography (PQC). It is based on the hardness of the multivariate quadratic polynomial (MQ) problem, which is a problem of finding a solution to a system of quadratic equations over a finite field. …”
Get full text
Article -
35
Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments
Published 2025-01-01“…To enable privacy-preserving authentication, access control, and secure communication, the framework integrates blockchain technology with Zero Trust Architecture (ZTA) and post-quantum cryptography. A hybrid Reinforcement-Lattice Blockchain KeyGen for quantum-resilient key generation, Deep Q-Network Multi-Factor Secure Key (DQN-MFSK) for dynamic selection of keys, and Zero-Knowledge Proof for privacy-preserving signatures are employed to achieve secure IoT settings. …”
Get full text
Article -
36
Pioneering the Security of EHRs Using an Immersive Blockchain Conceptual Framework
Published 2025-02-01“…Novelty/Improvement lies in integrating hybrid blockchain, quantum cryptography, AI, and the metaverse into a unified framework, effectively addressing current and future healthcare data management challenges. …”
Get full text
Article -
37
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature
Published 2020-04-01“…Due to less proxy signature schemes in the post-quantum cryptography aspect, in this article, we investigate the proxy signature in the post-quantum setting so that it can resist against the potential attacks from the quantum adversaries. …”
Get full text
Article -
38
Quantum algorithms for enhanced educational technologies
Published 2025-01-01“…Modern quantum algorithms like Grover’s Algorithm and Quantum Annealing support various functionalities like rapidity in processing as well as instantaneous flexibility towards customization of learning resources for the students and proper optimization of the learning trail. Also, quantum cryptography provides reliable security and prevention against future attacks on cyber security hence providing safe means of transferring educational data. …”
Get full text
Article -
39
Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
Published 2025-01-01“…Studies are also ongoing on post-quantum cryptography, although they require significant computational resources and are challenging to implement in Internet of Things (IoT) devices. …”
Get full text
Article -
40
A Pipelined Hardware Design of FNTT and INTT of CRYSTALS-Kyber PQC Algorithm
Published 2024-12-01“…Lattice-based post-quantum cryptography (PQC) algorithms demand number theoretic transform (NTT)-based polynomial multiplications. …”
Get full text
Article