Results 31 to 40 of about 12,317,693 (236)
Anonymous conference key agreement in linear quantum networks [PDF]
Sharing multi-partite quantum entanglement between parties allows for diverse secure communication tasks to be performed. Among them, conference key agreement (CKA) - an extension of key distribution to multiple parties - has received much attention ...
Jarn de Jong +4 more
doaj +1 more source
Key Agreement via Protocols [PDF]
Inspired by the ideas of no cloning and measurable degrading that quantum key agreement protocols rely on, we devise novel key agreement protocols for the classical world. Our protocols are based on identical devices that are mass produced and distributed among parties participating in the protocol.
Roscoe, A, Wang, L
openaire +2 more sources
The healthcare sector is a very crucial and important sector of any society, and with the evolution of the various deployed technologies, like the Internet of Things (IoT), machine learning and blockchain it has numerous advantages.
Siddhant Thapliyal +5 more
doaj +1 more source
Upper bounds on secret key agreement over lossy thermal bosonic channels [PDF]
Upper bounds on the secret-key-agreement capacity of a quantum channel serve as a way to assess the performance of practical quantum-key-distribution protocols conducted over that channel.
Kaur, Eneet, Wilde, Mark M.
core +3 more sources
Drones (or unmanned aerial vehicles) can play many assistant roles in the complex communication network, and can be used as an air relay node to support ground communications. It is expected to solve the sustainable communication problem of 5G/ beyond 5G
Jing Zhang +4 more
semanticscholar +1 more source
Comment on “Quantum key agreement protocol” [PDF]
The first two-party Quantum Key Agreement (QKA) protocol, based on quantum teleportation, was proposed by Zhou et al. (Electron. Lett. 40(18) (2004) 1149). In this protocol, to obtain the key bit string, one of the parties uses a device to obtain the inner product of two quantum states, one being unknown, and the other one performs Bell measurement ...
Nayana Das, Ritajit Majumdar
openaire +2 more sources
An Efficient, Hybrid Authentication Using ECG and Lightweight Cryptographic Scheme for WBAN
The Wireless Body Area Network (WBAN) plays a pivotal role in providing ubiquitous computing and has applications in different fields, especially in health monitoring. The advancement in wearable devices has revolutionized the concept of medical services
Zia Ur Rehman +5 more
doaj +1 more source
Secret-Key Agreement with Public Discussion subject to an Amplitude Constraint [PDF]
This paper considers the problem of secret-key agreement with public discussion subject to a peak power constraint $A$ on the channel input. The optimal input distribution is proved to be discrete with finite support.
Alomair, Basel +3 more
core +2 more sources
Vehicular ad hoc networks (VANETs) are vulnerable to many kinds of security attacks, so it is necessary to design an authenticated key agreement (AKA) scheme for securing communication channels in VANETs.
Lu Wei +4 more
semanticscholar +1 more source
Conference key agreement with single-photon interference
The intense research activity on Twin-Field (TF) quantum key distribution (QKD) is motivated by the fact that two users can establish a secret key by relying on single-photon interference in an untrusted node.
Federico Grasselli +2 more
doaj +1 more source

