Photon Number Coherence in Quantum Dot‐Cavity Systems can be Enhanced by Phonons
Photon number coherence (PNC) is important for quantum cryptography. Because of that, the PNC within a quantum dot‐cavity system is investigated theoretically. Phonons, which interact with the quantum dot, surprisingly do not necessarily decrease PNC. It is demonstrated that it is possible to optimize other figures of merit without significant penalty ...
Paul C. A. Hagen+4 more
wiley +1 more source
cryptographic Primitives: Insertions, Examples and Open Problems
Cryptographic primitives are considered. Each of cryptographic primitives can be the basis for building more complex cryptographic protocol. Examples of insertion of cryptographic primitives are given. The problems arising at the proof of security of the
Stanislav Olegovich Dordzhiev+1 more
doaj
Authentication and common key generation cryptographic protocol for vehicle tachographs
We present a public key generation protocol. The key is used for subscriber authentication in tachographs installed on vehicles in order to provide traffic safety. The protocol is based on the well-known Russian cryptographic algorithms.
Victor S. Gorbatov+2 more
doaj +1 more source
Fair Exchange in Strand Spaces [PDF]
Many cryptographic protocols are intended to coordinate state changes among principals. Exchange protocols coordinate delivery of new values to the participants, e.g. additions to the set of values they possess. An exchange protocol is fair if it ensures
Joshua D. Guttman
doaj +1 more source
Hybrid Encoder for Discrete and Continuous Variable QKD
This work demonstrates a hybrid QKD encoder that bridges the advantages of discrete and continuous variables. Utilizing a self‐compensating iPOGNAC design, the encoder is compatible with space‐based and terrestrial quantum networks. The approach simplifies system complexity, improves stability, and ensures cost‐effective integration, paving the way for
Mattia Sabatini+4 more
wiley +1 more source
A secure mutual authentication procedure, generate the key fiscal basis, and fiscal data protection
The paper describes cryptographic transformation for mutual authentication and creation of the fiscal sign key. This transformation based on using block encryption cipher named «Kuznetchik», described in the national standard of the Russian Federation ...
Igor Y. Zhukov, Oleg N. Murashov
doaj +1 more source
Open and Closed Loop Approaches for Energy Efficient Quantum Optimal Control
Concepts from quantum thermodynamics and optimal control are blended to derive a theoretical framework to quantify and minimize the energetic cost of a pulse for unitary synthesis. Two complementary techniques (based on GRAPE and Reinforce‐DRL) are implemented as open‐source software that co‐optimizes the fidelity and energetic cost within quantum ...
Sebastiaan Fauquenot+2 more
wiley +1 more source
LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory
The π-calculus is a basic theory of mobile communication based on the notion of interaction, which, is aimed at analyzing and modeling the behaviors of communication processes in communicating and mobile systems, and is widely applied to the security ...
Fusheng Wu+3 more
doaj +1 more source
Leveraging Blockchain and Smart Contracts to Combat Greenwashing in Sustainable Development
ABSTRACT Blockchain technology, when combined with smart contracts, enables buyers to distinguish between greenwashed and genuinely eco‐friendly products. The presence of counterfeit items can severely impact supply chains by diminishing brand value, eroding consumer confidence, and undermining market trust.
Ragnhild Silkoset, Arne Nygaard
wiley +1 more source
Tailored Growth of Transition Metal Dichalcogenides’ Monolayers by Chemical Vapor Deposition
Here, results on the tailored growth of various 2D semiconductors’ monolayers of transition metal dichalcogenides are presented using chemical vapor deposition techniques. Basic electronic, photonic and optoelectronic properties of the grown quantum materials are studied by high‐resolution microscopy and spectroscopy techniques and are analyzed for ...
Andrey Turchanin, Antony George
wiley +1 more source