Results 31 to 40 of about 24,566 (328)

Network Coding-Based Post-Quantum Cryptography [PDF]

open access: yesIEEE Journal on Selected Areas in Information Theory, 2021
We propose a novel hybrid universal network-coding cryptosystem (HUNCC) to obtain secure post-quantum cryptography at high communication rates. The secure network-coding scheme we offer is hybrid in the sense that it combines information-theory security with public-key cryptography.
Alejandro Cohen   +3 more
openaire   +3 more sources

Gaussian Post-selection for Continuous Variable Quantum Cryptography [PDF]

open access: yes, 2012
We extend the security proof for continuous variable quantum key distribution protocols using post selection to account for arbitrary eavesdropping attacks by employing the concept of an equivalent protocol where the post-selection is implemented as a ...
F. Grosshans   +5 more
core   +2 more sources

Deploying hybrid quantum-secured infrastructure for applications: When quantum and post-quantum can work together

open access: yesFrontiers in Quantum Science and Technology, 2023
Most currently used cryptographic tools for protecting data are based on certain computational assumptions, which makes them vulnerable with respect to technological and algorithmic developments, such as quantum computing.
Aleksey K. Fedorov, Aleksey K. Fedorov
doaj   +1 more source

Post-selection technique for quantum channels with applications to quantum cryptography [PDF]

open access: yes, 2008
We propose a general method for studying properties of quantum channels acting on an n-partite system, whose action is invariant under permutations of the subsystems.
Christandl, Matthias   +2 more
core   +2 more sources

HybridPKE: A forward-secure non-interactive quantum-safe hybrid key exchange scheme

open access: yesEngineering Science and Technology, an International Journal, 2022
The schemes submitted to NIST call for standardization of post-quantum cryptography have some common drawbacks in terms of decryption failure probability, scalability, and switching issues from pre-quantum to post- quantum cryptography. In this paper, we
Simran Choudhary, Anil Gupta
doaj   +1 more source

Random Oracles in a Quantum World [PDF]

open access: yes, 2011
The interest in post-quantum cryptography - classical systems that remain secure in the presence of a quantum adversary - has generated elegant proposals for new cryptosystems.
C.H. Bennett   +25 more
core   +3 more sources

Quantum key distribution based on selective post-processing in passive optical networks [PDF]

open access: yes, 2014
One of the main obstacles to the widespread adoption of quantum cryptography has been the difficulty of integration into standard optical networks, largely due to the tremendous difference in power of classical signals compared with the single quantum ...
Ciurana Aguilar, Alex   +2 more
core   +3 more sources

Isogeny-based post-quantum key exchange protocols [PDF]

open access: yes, 2020
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves.
Sorinas Capdevila, Ernest
core  

Cloud Computing in the Quantum Era [PDF]

open access: yes, 2019
Cloud computing has become the prominent technology of this era. Its elasticity, dynamicity, availability, heterogeneity, and pay as you go pricing model has attracted several companies to migrate their businesses' services into the cloud.
Kaiiali, Mustafa   +2 more
core   +2 more sources

Why Quantum Bit Commitment And Ideal Quantum Coin Tossing Are Impossible [PDF]

open access: yes, 1997
There had been well known claims of unconditionally secure quantum protocols for bit commitment. However, we, and independently Mayers, showed that all proposed quantum bit commitment schemes are, in principle, insecure because the sender, Alice, can ...
Ardehali   +28 more
core   +2 more sources

Home - About - Disclaimer - Privacy