Results 31 to 40 of about 2,059,050 (339)

A Novel Quantum Sequential Signature Protocol With Y-SNOP States

open access: yesIEEE Access, 2021
With the development of quantum technology, an arising researching point is to solve some new cipher problems with quantum technology to ensure their security.
Xu Zhao, Ke-Jia Zhang, Bao-Min Zhou
doaj   +1 more source

A Quantum Blind Multi-Signature Method for the Industrial Blockchain

open access: yesEntropy, 2021
Traditional anti-quantum methods and multi-signature technologies to secure the blockchain against quantum attacks will quickly reduce the efficiency and scalability of the industrial blockchain, where the computational resources will experience a ...
Zhengying Cai   +4 more
doaj   +1 more source

Quantum asymptotic phases reveal signatures of quantum synchronization

open access: yesNew Journal of Physics, 2023
Abstract Synchronization of quantum nonlinear oscillators has attracted much attention recently. To characterize the quantum oscillatory dynamics, we recently proposed a fully quantum-mechanical definition of the asymptotic phase, which is a key quantity in the synchronization analysis of classical nonlinear oscillators (Kato and Nakao ...
Yuzuru Kato, Hiroya Nakao
openaire   +3 more sources

A Verifiable $(t, n)$ Threshold Quantum State Sharing Against Denial Attack

open access: yesIEEE Access, 2019
To detect frauds by a dealer or some participants, researchers have proposed verifiable threshold quantum state sharing (VTQSTS) schemes. However, the existing VTQSTS schemes either have lowcomputation efficiency or weak security.
Xiuli Song   +3 more
doaj   +1 more source

An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme

open access: yesApplied Sciences, 2021
The rapid emergence of quantum computing threatens current Supervisory Control and Data Acquisition (SCADA) security standards, mainly, American Gas Association (AGA)-12.
Sagarika Ghosh   +3 more
doaj   +1 more source

SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function

open access: yes, 2020
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N.   +5 more
core   +1 more source

Misleading signatures of quantum chaos [PDF]

open access: yesPhysical Review E, 2002
The main signature of chaos in a quantum system is provided by spectral statistical analysis of the nearest neighbor spacing distribution and the spectral rigidity given by $ _3(L)$. It is shown that some standard unfolding procedures, like local unfolding and Gaussian broadening, lead to a spurious increase of the spectral rigidity that spoils the $
Gómez Gómez, José María   +3 more
openaire   +5 more sources

Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes

open access: yesEntropy, 2023
The security of digital signatures depends significantly on the signature key. Therefore, to reduce the impact of leaked keys upon existing signatures and subsequent ones, a digital signature scheme with strong forward security could be an effective ...
Fengyin Li   +4 more
doaj   +1 more source

Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [PDF]

open access: yesJisuanji kexue, 2022
Aiming at the problem that the classical blockchain consensus mechanism is under the threat of quantum computing attacks,a quantum-secured Byzantine fault tolerant consensus mechanism is proposed.Firstly,to solve the security threat of public key digital
REN Chang, ZHAO Hong, JIANG Hua
doaj   +1 more source

Classical signature of quantum annealing [PDF]

open access: yes, 2013
A pair of recent articles concluded that the D-Wave One machine actually operates in the quantum regime, rather than performing some classical evolution. Here we give a classical model that leads to the same behaviors used in those works to infer quantum
Smith, Graeme, Smolin, John A.
core   +2 more sources

Home - About - Disclaimer - Privacy