Showing 21 - 40 results of 41 for search '"quantum cryptography"', query time: 0.06s Refine Results
  1. 21
  2. 22

    Improved lattice‐based mix‐nets for electronic voting by Valeh Farzaliyev, Jan Willemson, Jaan Kristjan Kaasik

    Published 2023-01-01
    Subjects: “…lattice‐based post‐quantum cryptography…”
    Get full text
    Article
  3. 23
  4. 24
  5. 25

    Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption by Min Hou, Yue Wu

    Published 2025-01-01
    Subjects: “…quantum cryptography…”
    Get full text
    Article
  6. 26
  7. 27
  8. 28
  9. 29

    INNOVATIVE MECHANISMS FOR IMPLEMENTING STATE ECONOMIC POLICY FOR POST-WAR RECONSTRUCTION OF UKRAINE: QUANTUM TRANSFORMATIONS AS A DRIVER OF DEVELOPMENT by Oleksiy Shkuratov, Liudmila Antonova, Roman Dzyuba

    Published 2024-12-01
    “…The second quantum revolution involves the introduction of quantum computers, quantum cryptography and quantum communication, capable of accelerating the development of new materials, optimizing logistics chains and increasing the level of data security. …”
    Get full text
    Article
  10. 30

    Dynamic hierarchical quantum information sharing protocol by Heng-yue JIA, Xia WU, Ke-jia ZHANG, Jian-ming ZHU, Yang LI

    Published 2016-12-01
    “…Quantum secret sharing (QSS) is one important branch of quantum cryptography.Based on the studies of multi-shared quantum bits,a new dynamic quantum bit sharing protocol was proposed.The participation of the shared members is hierarchical in this protocol.The quantum information leader,in the absence of the establishment of a new quantum channel,can remove some of the participants in the secret reconstruction system.After the layoffs,the leader can also update the quantum information using quantum operations,and the remaining effective partici-pants can recover the new quantum information without performing additional operations.In addition,the correct-ness,security and the hierarchy of the participants of the protocol were discussed.…”
    Get full text
    Article
  11. 31

    Simple Matrix encryption scheme with variable ciphertext length by Zhong WANG, Yiliang HAN

    Published 2018-04-01
    “…Multivariable public key cryptography is one of the reliable candidates for anti-quantum cryptography.The Simple Matrix scheme is constructed using the operations between three matrices.An improved version of the Simple Matrix scheme was proposed.It is constructed by using two flat matrices with random quadratic polynomials,so that the rank attacks is infeasible for the new scheme,and the algebraic attacks breaks the system is at least as hard as solving a set of random quadratic equations.The new scheme will improve the proportion of ciphertext and plaintext to 2 times or more,break the fixed proportion of ciphertext and plaintext,so that it has a flexible proportion to adapt to different needs.…”
    Get full text
    Article
  12. 32

    Perspectives on Entangled Nuclear Particle Pairs Generation and Manipulation in Quantum Communication and Cryptography Systems by Octavian Dănilă, Paul E. Sterian, Andreea Rodica Sterian

    Published 2012-01-01
    “…Entanglement between two quantum elements is a phenomenon which presents a broad application spectrum, being used largely in quantum cryptography schemes and in physical characterisation of the universe. …”
    Get full text
    Article
  13. 33

    Dynamic hierarchical quantum secret sharing protocol based on high-dimensional GHZ state by CHEN Keqin, ZOU Zheng, CAI Binbin, LIN Song

    Published 2024-10-01
    “…Quantum secret sharing is an important research branch of quantum cryptography. A novel dynamic hierarchical quantum secret sharing protocol based on high-dimensional GHZ (Greenberger-Horne-Zeilinger) state was proposed. …”
    Get full text
    Article
  14. 34

    Recent progress in the security evaluation of multivariate public‐key cryptography by Yasuhiko Ikematsu, Shuhei Nakamura, Tsuyoshi Takagi

    Published 2023-03-01
    “…Abstract Multivariate public‐key cryptography (MPKC) is considered a leading candidate for post‐quantum cryptography (PQC). It is based on the hardness of the multivariate quadratic polynomial (MQ) problem, which is a problem of finding a solution to a system of quadratic equations over a finite field. …”
    Get full text
    Article
  15. 35

    Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments by Mohammed A. Aleisa

    Published 2025-01-01
    “…To enable privacy-preserving authentication, access control, and secure communication, the framework integrates blockchain technology with Zero Trust Architecture (ZTA) and post-quantum cryptography. A hybrid Reinforcement-Lattice Blockchain KeyGen for quantum-resilient key generation, Deep Q-Network Multi-Factor Secure Key (DQN-MFSK) for dynamic selection of keys, and Zero-Knowledge Proof for privacy-preserving signatures are employed to achieve secure IoT settings. …”
    Get full text
    Article
  16. 36

    Pioneering the Security of EHRs Using an Immersive Blockchain Conceptual Framework by Rihab Benaich, Youssef Gahi, Saida El Mendili

    Published 2025-02-01
    “…Novelty/Improvement lies in integrating hybrid blockchain, quantum cryptography, AI, and the metaverse into a unified framework, effectively addressing current and future healthcare data management challenges. …”
    Get full text
    Article
  17. 37

    Post quantum proxy signature scheme based on the multivariate public key cryptographic signature by Jiahui Chen, Jie Ling, Jianting Ning, Emmanouil Panaousis, George Loukas, Kaitai Liang, Jiageng Chen

    Published 2020-04-01
    “…Due to less proxy signature schemes in the post-quantum cryptography aspect, in this article, we investigate the proxy signature in the post-quantum setting so that it can resist against the potential attacks from the quantum adversaries. …”
    Get full text
    Article
  18. 38

    Quantum algorithms for enhanced educational technologies by Basil Hanafi, Mohammad Ali, Devyaani Singh

    Published 2025-01-01
    “…Modern quantum algorithms like Grover’s Algorithm and Quantum Annealing support various functionalities like rapidity in processing as well as instantaneous flexibility towards customization of learning resources for the students and proper optimization of the learning trail. Also, quantum cryptography provides reliable security and prevention against future attacks on cyber security hence providing safe means of transferring educational data. …”
    Get full text
    Article
  19. 39

    Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation by Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal

    Published 2025-01-01
    “…Studies are also ongoing on post-quantum cryptography, although they require significant computational resources and are challenging to implement in Internet of Things (IoT) devices. …”
    Get full text
    Article
  20. 40

    A Pipelined Hardware Design of FNTT and INTT of CRYSTALS-Kyber PQC Algorithm by Muhammad Rashid, Omar S. Sonbul, Sajjad Shaukat Jamal, Amar Y. Jaffar, Azamat Kakhorov

    Published 2024-12-01
    “…Lattice-based post-quantum cryptography (PQC) algorithms demand number theoretic transform (NTT)-based polynomial multiplications. …”
    Get full text
    Article