Results 1 to 10 of about 12,317,693 (236)

Unique Information and Secret Key Agreement [PDF]

open access: yesEntropy, 2018
The partial information decomposition (PID) is a promising framework for decomposing a joint random variable into the amount of influence each source variable X i has on a target variable Y, relative to the other sources.
Ryan G. James   +2 more
doaj   +7 more sources

Conference key agreement in a quantum network [PDF]

open access: yesnpj Quantum Information, 2023
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state. In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne ...
Alexander Pickston   +8 more
doaj   +2 more sources

Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things [PDF]

open access: yesSensors, 2022
To solve the problem regarding the lack of a lightweight and secure authentication and key agreement protocol in the Constrained Application Protocol of the Internet of Things environment, we explore the security flaws and applicability problems in the ...
Xiang Gong, Tao Feng
doaj   +2 more sources

Experimental Efficient Source-Independent Quantum Conference Key Agreement [PDF]

open access: yesResearch
Multipartite entanglement enables secure group key distribution among multiple users while providing immunity against hacking attacks targeting source devices, thereby realizing source-independent quantum conference key agreement (SI-QCKA).
Wen-Ji Hua   +4 more
doaj   +2 more sources

Experimental quantum conference key agreement. [PDF]

open access: yesSci Adv, 2021
When Alice and Bob invite their friends, quantum key distribution with multiparty entanglement enables secure conference call.
Proietti M   +5 more
europepmc   +6 more sources

A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks. [PDF]

open access: yesSensors (Basel), 2022
The futuristic fifth-generation cellular network (5G) not only supports high-speed internet, but must also connect a multitude of devices simultaneously without compromising network security.
Chow MC, Ma M.
europepmc   +2 more sources

Secure multiparty quantum key agreement against collusive attacks [PDF]

open access: yesScientific Reports, 2021
Quantum key agreement enables remote participants to fairly establish a secure shared key based on their private inputs. In the circular-type multiparty quantum key agreement mode, two or more malicious participants can collude together to steal private ...
Hussein Abulkasim   +2 more
doaj   +2 more sources

Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak [PDF]

open access: yesSensors, 2020
Efficient authentication and key agreement protocols between two entities are required in many application areas. In particular, for client–server type of architectures, the client is mostly represented by a constrained device and thus highly efficient ...
An Braeken
doaj   +2 more sources

A SECURE KEY AGREEMENT PROTOCOL [PDF]

open access: yesJournal of Information and Organizational Sciences, 2001
In this paper we propose a secure protocol for an authenticated key agreement based on the Diffie-Hellman key agreement, which works in an elliptic curve group We prove that our protocol meets the security attributes under the assumption that the ...
Constantin Popescu
core   +3 more sources

Experimental demonstration of multiparty quantum secret sharing and conference key agreement [PDF]

open access: yesnpj Quantum Information, 2023
Quantum secret sharing (QSS) and conference key agreement (CKA) provide efficient encryption approaches for realizing multi-party secure communication, which are essential components of quantum networks.
Shuaishuai Liu   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy