Results 31 to 40 of about 226,911 (338)
A Verifiable
To detect frauds by a dealer or some participants, researchers have proposed verifiable threshold quantum state sharing (VTQSTS) schemes. However, the existing VTQSTS schemes either have lowcomputation efficiency or weak security.
Xiuli Song +3 more
doaj +1 more source
An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme
The rapid emergence of quantum computing threatens current Supervisory Control and Data Acquisition (SCADA) security standards, mainly, American Gas Association (AGA)-12.
Sagarika Ghosh +3 more
doaj +1 more source
Misleading signatures of quantum chaos [PDF]
The main signature of chaos in a quantum system is provided by spectral statistical analysis of the nearest neighbor spacing distribution and the spectral rigidity given by $ _3(L)$. It is shown that some standard unfolding procedures, like local unfolding and Gaussian broadening, lead to a spurious increase of the spectral rigidity that spoils the $
Gómez Gómez, José María +3 more
openaire +5 more sources
Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes
The security of digital signatures depends significantly on the signature key. Therefore, to reduce the impact of leaked keys upon existing signatures and subsequent ones, a digital signature scheme with strong forward security could be an effective ...
Fengyin Li +4 more
doaj +1 more source
Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [PDF]
Aiming at the problem that the classical blockchain consensus mechanism is under the threat of quantum computing attacks,a quantum-secured Byzantine fault tolerant consensus mechanism is proposed.Firstly,to solve the security threat of public key digital
REN Chang, ZHAO Hong, JIANG Hua
doaj +1 more source
Comment on “Arbitrated quantum-signature scheme” [PDF]
We investigate the quantum signature scheme proposed by Zeng and Keitel [Phys. Rev. A 65, 042312 (2002)]. It uses Greenberger-Horne-Zeilinger (GHZ) states and the availability of a trusted arbitrator. However, in our opinion the protocol is not clearly operationally defined and several steps are ambiguous.
Curty, M., Luetkenhaus, N.
openaire +3 more sources
SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N. +5 more
core +1 more source
Classical signature of quantum annealing [PDF]
A pair of recent articles concluded that the D-Wave One machine actually operates in the quantum regime, rather than performing some classical evolution. Here we give a classical model that leads to the same behaviors used in those works to infer quantum
Smith, Graeme, Smolin, John A.
core +2 more sources
Quantum Signatures of Breather-Breather Interactions [PDF]
The spectrum of the Quantum Discrete Nonlinear Schr dinger equation on a periodic 1D lattice shows some interesting detailed band structure which may be interpreted as the quantum signature of a two-breather interaction in the classical case. We show that this fine structure can be interpreted using degenerate perturbation theory.
J. DORIGNAC +3 more
openaire +4 more sources
Quantum digital signatures with quantum-key-distribution components [PDF]
13 pages. In v2 we included the first proof of security of a QDS protocol against coherent forging attacks.
Wallden, Petros +3 more
openaire +5 more sources

