Results 31 to 40 of about 1,469,683 (369)

Enhancing quantum cryptography with quantum dot single-photon sources [PDF]

open access: yesnpj Quantum Information, 2022
Quantum cryptography harnesses quantum light, in particular single photons, to provide security guarantees that cannot be reached by classical means. For each cryptographic task, the security feature of interest is directly related to the photons’ non ...
Mathieu Bozzio   +9 more
semanticscholar   +1 more source

Security analysis of measurement-device-independent quantum conference key agreement with weak randomness

open access: yesFrontiers in Physics, 2023
Quantum conference key agreement (QCKA) allows multiple users to distribute secret conference keys over long distances. Measurement-device-independent QCKA (MDI-QCKA) is an effective QCKA scheme, which closes all detection loopholes and greatly enhances ...
Xiao-Lei Jiang   +16 more
doaj   +1 more source

Post-Quantum Cryptography [PDF]

open access: yesNature, 2011
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive ...
Daniel J. Bernstein   +2 more
openaire   +3 more sources

Semi-quantum cryptography [PDF]

open access: yesQuantum Information Processing, 2020
Semi-quantum communication, a model introduced in 2007 by M. Boyer, D. Kenigsberg, and T. Mor (PRL 99 140501), involves the use of fully-quantum users and semi-quantum, or "classical" users. These restricted users are only allowed to interact with the quantum channel in a limited manner. Originally introduced to study the key-distribution problem, semi-
Hasan Iqbal, Walter O. Krawec
openaire   +2 more sources

Status report on the third round of the NIST post-quantum cryptography standardization process

open access: yesRadiotekhnika, 2022
In recent years, there has been steady progress in the creation of quantum computers. If large-scale quantum computers are implemented, they will threaten the security of many widely used public-key cryptosystems.
M.V. Yesina   +2 more
semanticscholar   +1 more source

On the computational hardness needed for quantum cryptography [PDF]

open access: yesIACR Cryptology ePrint Archive, 2022
In the classical model of computation, it is well established that one-way functions (OWF) are minimal for computational cryptography: They are essential for almost any cryptographic application that cannot be realized with respect to computationally ...
Zvika Brakerski, R. Canetti, Luowen Qian
semanticscholar   +1 more source

Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions

open access: yesCryptography, 2021
Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or transit. Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems, based on ...
Chithralekha Balamurugan   +3 more
doaj   +1 more source

A Survey of Post-Quantum Cryptography: Start of a New Race

open access: yesCryptogr., 2023
Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information.
Duc-Thuan Dam   +4 more
semanticscholar   +1 more source

A Design of Secure Communication Architecture Applying Quantum Cryptography

open access: yesJournal of Information Science Theory and Practice, 2022
Existing network cryptography systems are threatened by recent developments in quantum computing. For example, the Shor algorithm, which can be run on a quantum computer, is capable of overriding public key-based network cryptography systems in a short ...
Kyu-Seok Shim   +2 more
doaj   +1 more source

Improving the performance of practical decoy-state quantum key distribution with advantage distillation technology

open access: yesCommunications Physics, 2022
Advantage distillation technology increases the collection between raw keys in quantum key distribution systems. Combining a decoy state method with advantage distillation technology, the authors demonstrate improved maximal transmission distance and ...
Hong-Wei Li   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy