Results 31 to 40 of about 1,469,683 (369)
Enhancing quantum cryptography with quantum dot single-photon sources [PDF]
Quantum cryptography harnesses quantum light, in particular single photons, to provide security guarantees that cannot be reached by classical means. For each cryptographic task, the security feature of interest is directly related to the photons’ non ...
Mathieu Bozzio +9 more
semanticscholar +1 more source
Quantum conference key agreement (QCKA) allows multiple users to distribute secret conference keys over long distances. Measurement-device-independent QCKA (MDI-QCKA) is an effective QCKA scheme, which closes all detection loopholes and greatly enhances ...
Xiao-Lei Jiang +16 more
doaj +1 more source
Post-Quantum Cryptography [PDF]
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive ...
Daniel J. Bernstein +2 more
openaire +3 more sources
Semi-quantum cryptography [PDF]
Semi-quantum communication, a model introduced in 2007 by M. Boyer, D. Kenigsberg, and T. Mor (PRL 99 140501), involves the use of fully-quantum users and semi-quantum, or "classical" users. These restricted users are only allowed to interact with the quantum channel in a limited manner. Originally introduced to study the key-distribution problem, semi-
Hasan Iqbal, Walter O. Krawec
openaire +2 more sources
Status report on the third round of the NIST post-quantum cryptography standardization process
In recent years, there has been steady progress in the creation of quantum computers. If large-scale quantum computers are implemented, they will threaten the security of many widely used public-key cryptosystems.
M.V. Yesina +2 more
semanticscholar +1 more source
On the computational hardness needed for quantum cryptography [PDF]
In the classical model of computation, it is well established that one-way functions (OWF) are minimal for computational cryptography: They are essential for almost any cryptographic application that cannot be realized with respect to computationally ...
Zvika Brakerski, R. Canetti, Luowen Qian
semanticscholar +1 more source
Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions
Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or transit. Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems, based on ...
Chithralekha Balamurugan +3 more
doaj +1 more source
A Survey of Post-Quantum Cryptography: Start of a New Race
Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information.
Duc-Thuan Dam +4 more
semanticscholar +1 more source
A Design of Secure Communication Architecture Applying Quantum Cryptography
Existing network cryptography systems are threatened by recent developments in quantum computing. For example, the Shor algorithm, which can be run on a quantum computer, is capable of overriding public key-based network cryptography systems in a short ...
Kyu-Seok Shim +2 more
doaj +1 more source
Advantage distillation technology increases the collection between raw keys in quantum key distribution systems. Combining a decoy state method with advantage distillation technology, the authors demonstrate improved maximal transmission distance and ...
Hong-Wei Li +3 more
doaj +1 more source

