Results 1 to 10 of about 12,317,693 (236)
Unique Information and Secret Key Agreement [PDF]
The partial information decomposition (PID) is a promising framework for decomposing a joint random variable into the amount of influence each source variable X i has on a target variable Y, relative to the other sources.
Ryan G. James +2 more
doaj +7 more sources
Conference key agreement in a quantum network [PDF]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state. In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne ...
Alexander Pickston +8 more
doaj +2 more sources
Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things [PDF]
To solve the problem regarding the lack of a lightweight and secure authentication and key agreement protocol in the Constrained Application Protocol of the Internet of Things environment, we explore the security flaws and applicability problems in the ...
Xiang Gong, Tao Feng
doaj +2 more sources
Experimental Efficient Source-Independent Quantum Conference Key Agreement [PDF]
Multipartite entanglement enables secure group key distribution among multiple users while providing immunity against hacking attacks targeting source devices, thereby realizing source-independent quantum conference key agreement (SI-QCKA).
Wen-Ji Hua +4 more
doaj +2 more sources
Experimental quantum conference key agreement. [PDF]
When Alice and Bob invite their friends, quantum key distribution with multiparty entanglement enables secure conference call.
Proietti M +5 more
europepmc +6 more sources
A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks. [PDF]
The futuristic fifth-generation cellular network (5G) not only supports high-speed internet, but must also connect a multitude of devices simultaneously without compromising network security.
Chow MC, Ma M.
europepmc +2 more sources
Secure multiparty quantum key agreement against collusive attacks [PDF]
Quantum key agreement enables remote participants to fairly establish a secure shared key based on their private inputs. In the circular-type multiparty quantum key agreement mode, two or more malicious participants can collude together to steal private ...
Hussein Abulkasim +2 more
doaj +2 more sources
Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak [PDF]
Efficient authentication and key agreement protocols between two entities are required in many application areas. In particular, for client–server type of architectures, the client is mostly represented by a constrained device and thus highly efficient ...
An Braeken
doaj +2 more sources
A SECURE KEY AGREEMENT PROTOCOL [PDF]
In this paper we propose a secure protocol for an authenticated key agreement based on the Diffie-Hellman key agreement, which works in an elliptic curve group We prove that our protocol meets the security attributes under the assumption that the ...
Constantin Popescu
core +3 more sources
Experimental demonstration of multiparty quantum secret sharing and conference key agreement [PDF]
Quantum secret sharing (QSS) and conference key agreement (CKA) provide efficient encryption approaches for realizing multi-party secure communication, which are essential components of quantum networks.
Shuaishuai Liu +5 more
semanticscholar +1 more source

