Results 31 to 40 of about 12,317,693 (236)

Anonymous conference key agreement in linear quantum networks [PDF]

open access: yesQuantum, 2023
Sharing multi-partite quantum entanglement between parties allows for diverse secure communication tasks to be performed. Among them, conference key agreement (CKA) - an extension of key distribution to multiple parties - has received much attention ...
Jarn de Jong   +4 more
doaj   +1 more source

Key Agreement via Protocols [PDF]

open access: yes, 2019
Inspired by the ideas of no cloning and measurable degrading that quantum key agreement protocols rely on, we devise novel key agreement protocols for the classical world. Our protocols are based on identical devices that are mass produced and distributed among parties participating in the protocol.
Roscoe, A, Wang, L
openaire   +2 more sources

Design of Robust Blockchain-Envisioned Authenticated Key Management Mechanism for Smart Healthcare Applications

open access: yesIEEE Access, 2023
The healthcare sector is a very crucial and important sector of any society, and with the evolution of the various deployed technologies, like the Internet of Things (IoT), machine learning and blockchain it has numerous advantages.
Siddhant Thapliyal   +5 more
doaj   +1 more source

Upper bounds on secret key agreement over lossy thermal bosonic channels [PDF]

open access: yes, 2017
Upper bounds on the secret-key-agreement capacity of a quantum channel serve as a way to assess the performance of practical quantum-key-distribution protocols conducted over that channel.
Kaur, Eneet, Wilde, Mark M.
core   +3 more sources

Intelligent Drone-assisted Anonymous Authentication and Key Agreement for 5G/B5G Vehicular Ad-Hoc Networks

open access: yesIEEE Transactions on Network Science and Engineering, 2021
Drones (or unmanned aerial vehicles) can play many assistant roles in the complex communication network, and can be used as an air relay node to support ground communications. It is expected to solve the sustainable communication problem of 5G/ beyond 5G
Jing Zhang   +4 more
semanticscholar   +1 more source

Comment on “Quantum key agreement protocol” [PDF]

open access: yesInternational Journal of Quantum Information, 2020
The first two-party Quantum Key Agreement (QKA) protocol, based on quantum teleportation, was proposed by Zhou et al. (Electron. Lett. 40(18) (2004) 1149). In this protocol, to obtain the key bit string, one of the parties uses a device to obtain the inner product of two quantum states, one being unknown, and the other one performs Bell measurement ...
Nayana Das, Ritajit Majumdar
openaire   +2 more sources

An Efficient, Hybrid Authentication Using ECG and Lightweight Cryptographic Scheme for WBAN

open access: yesIEEE Access, 2021
The Wireless Body Area Network (WBAN) plays a pivotal role in providing ubiquitous computing and has applications in different fields, especially in health monitoring. The advancement in wearable devices has revolutionized the concept of medical services
Zia Ur Rehman   +5 more
doaj   +1 more source

Secret-Key Agreement with Public Discussion subject to an Amplitude Constraint [PDF]

open access: yes, 2016
This paper considers the problem of secret-key agreement with public discussion subject to a peak power constraint $A$ on the channel input. The optimal input distribution is proved to be discrete with finite support.
Alomair, Basel   +3 more
core   +2 more sources

Proven Secure Tree-Based Authenticated Key Agreement for Securing V2V and V2I Communications in VANETs

open access: yesIEEE Transactions on Mobile Computing, 2021
Vehicular ad hoc networks (VANETs) are vulnerable to many kinds of security attacks, so it is necessary to design an authenticated key agreement (AKA) scheme for securing communication channels in VANETs.
Lu Wei   +4 more
semanticscholar   +1 more source

Conference key agreement with single-photon interference

open access: yesNew Journal of Physics, 2019
The intense research activity on Twin-Field (TF) quantum key distribution (QKD) is motivated by the fact that two users can establish a secret key by relying on single-photon interference in an untrusted node.
Federico Grasselli   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy