Results 71 to 80 of about 1,929,820 (318)
Multiparty Quantum Cryptographic Protocol
12 pages, 1 .eps figure, 3 ...
Ramzan, M., Khan, M. K.
openaire +2 more sources
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li +7 more
wiley +1 more source
Cheat Sensitive Quantum Bit Commitment
We define cheat sensitive cryptographic protocols between mistrustful parties as protocols which guarantee that, if either cheats, the other has some nonzero probability of detecting the cheating.
Adrian Kent +8 more
core +1 more source
Weakening the Isolation Assumption of Tamper-proof Hardware Tokens [PDF]
Recent results have shown the usefulness of tamper-proof hardware tokens as a setup assumption for building UC-secure two-party computation protocols, thus providing broad security guarantees and allowing the use of such protocols as buildings blocks in ...
Dowsley, Rafael +2 more
core +2 more sources
Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer
Oblivious transfer (OT) and bit commitment (BC) are two-party cryptographic protocols which play crucial roles in the construction of various cryptographic protocols. We propose three practical quantum cryptographic protocols in this paper.
Yaqi Song, Li Yang
doaj +1 more source
Cryptographic mechanisms for secure interaction of control and measuring devices
The paper describes the key features of the cryptographic protocol providing secure interaction between control and measuring devices. The hierarchical structure underlying this protocol and the relationship between the transport and session levels of ...
Alexey Yu. Nesterenko +1 more
doaj +1 more source
Anonymity in networked communication is vital for many privacy-preserving tasks. Secure key distribution alone is insufficient for high-security communications.
Zixin Huang +14 more
doaj +1 more source
Protocols for symmetric secret key establishment: Modern approach
Introduction/purpose: The problem of efficient distribution of cryptographic keys in communication systems has existed since its first days and is especially emphasized by the emergence of mass communication systems.
Meiran Galis +3 more
doaj +1 more source
By exploiting the strong nonlinear optical response and controllable molecular ordering of ferroelectric nematic liquid crystals (FNLCs), these materials can serve as tunable sources of polarization‐entangled photons. Adjusting the sample geometry or applying an external electric field enables continuous control of the entanglement degree, advancing ...
Sara Klopčič +3 more
wiley +1 more source
Cryptographic protocols in practice [PDF]
Cílem této práce bylo v první části popsat požadavky na kryptografické protokoly. Dále měla být provedena klasifikace těchto protokolů a uvedeny konkrétní příklady.
Truneček, Petr
core

