Results 31 to 40 of about 226,911 (338)

A Verifiable $(t, n)$ Threshold Quantum State Sharing Against Denial Attack

open access: yesIEEE Access, 2019
To detect frauds by a dealer or some participants, researchers have proposed verifiable threshold quantum state sharing (VTQSTS) schemes. However, the existing VTQSTS schemes either have lowcomputation efficiency or weak security.
Xiuli Song   +3 more
doaj   +1 more source

An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme

open access: yesApplied Sciences, 2021
The rapid emergence of quantum computing threatens current Supervisory Control and Data Acquisition (SCADA) security standards, mainly, American Gas Association (AGA)-12.
Sagarika Ghosh   +3 more
doaj   +1 more source

Misleading signatures of quantum chaos [PDF]

open access: yesPhysical Review E, 2002
The main signature of chaos in a quantum system is provided by spectral statistical analysis of the nearest neighbor spacing distribution and the spectral rigidity given by $ _3(L)$. It is shown that some standard unfolding procedures, like local unfolding and Gaussian broadening, lead to a spurious increase of the spectral rigidity that spoils the $
Gómez Gómez, José María   +3 more
openaire   +5 more sources

Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes

open access: yesEntropy, 2023
The security of digital signatures depends significantly on the signature key. Therefore, to reduce the impact of leaked keys upon existing signatures and subsequent ones, a digital signature scheme with strong forward security could be an effective ...
Fengyin Li   +4 more
doaj   +1 more source

Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [PDF]

open access: yesJisuanji kexue, 2022
Aiming at the problem that the classical blockchain consensus mechanism is under the threat of quantum computing attacks,a quantum-secured Byzantine fault tolerant consensus mechanism is proposed.Firstly,to solve the security threat of public key digital
REN Chang, ZHAO Hong, JIANG Hua
doaj   +1 more source

Comment on “Arbitrated quantum-signature scheme” [PDF]

open access: yesPhysical Review A, 2008
We investigate the quantum signature scheme proposed by Zeng and Keitel [Phys. Rev. A 65, 042312 (2002)]. It uses Greenberger-Horne-Zeilinger (GHZ) states and the availability of a trusted arbitrator. However, in our opinion the protocol is not clearly operationally defined and several steps are ambiguous.
Curty, M., Luetkenhaus, N.
openaire   +3 more sources

SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function

open access: yes, 2020
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N.   +5 more
core   +1 more source

Classical signature of quantum annealing [PDF]

open access: yes, 2013
A pair of recent articles concluded that the D-Wave One machine actually operates in the quantum regime, rather than performing some classical evolution. Here we give a classical model that leads to the same behaviors used in those works to infer quantum
Smith, Graeme, Smolin, John A.
core   +2 more sources

Quantum Signatures of Breather-Breather Interactions [PDF]

open access: yesPhysical Review Letters, 2004
The spectrum of the Quantum Discrete Nonlinear Schr dinger equation on a periodic 1D lattice shows some interesting detailed band structure which may be interpreted as the quantum signature of a two-breather interaction in the classical case. We show that this fine structure can be interpreted using degenerate perturbation theory.
J. DORIGNAC   +3 more
openaire   +4 more sources

Quantum digital signatures with quantum-key-distribution components [PDF]

open access: yesPhysical Review A, 2015
13 pages. In v2 we included the first proof of security of a QDS protocol against coherent forging attacks.
Wallden, Petros   +3 more
openaire   +5 more sources

Home - About - Disclaimer - Privacy