Results 41 to 50 of about 2,059,050 (339)
Comment on “Arbitrated quantum-signature scheme” [PDF]
We investigate the quantum signature scheme proposed by Zeng and Keitel [Phys. Rev. A 65, 042312 (2002)]. It uses Greenberger-Horne-Zeilinger (GHZ) states and the availability of a trusted arbitrator. However, in our opinion the protocol is not clearly operationally defined and several steps are ambiguous.
Curty, M., Luetkenhaus, N.
openaire +3 more sources
Quantum signature of exciton condensation [PDF]
Exciton condensation, a Bose-Einstein-like condensation of excitons, was recently reported in an electronic double layer (EDL) of graphene. We show that a universal quantum signature for exciton condensation can be used to both identity and quantify ...
S. Safaei, D. Mazziotti
semanticscholar +1 more source
Quantum digital signatures with quantum-key-distribution components [PDF]
13 pages. In v2 we included the first proof of security of a QDS protocol against coherent forging attacks.
Wallden, Petros +3 more
openaire +5 more sources
Measurement-Device Independency Analysis of Continuous-Variable Quantum Digital Signature
With the practical implementation of continuous-variable quantum cryptographic protocols, security problems resulting from measurement-device loopholes are being given increasing attention. At present, research on measurement-device independency analysis
Tao Shang, Ke Li, Jianwei Liu
doaj +1 more source
Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model [PDF]
Strongly unforgeable signature schemes provide a more stringent security guarantee than the standard existential unforgeability. It requires that not only forging a signature on a new message is hard, it is infeasible as well to produce a new signature ...
Eaton, Edward, Song, Fang
core +3 more sources
Quantum signature scheme with single photons
Quantum digital signature combines quantum theory with classical digital signature. The main goal of this field is to take advantage of quantum effects to provide unconditionally secure signature.
A. Ekert +12 more
core +1 more source
Quantum attacks on Bitcoin, and how to protect against them [PDF]
The key cryptographic protocols used to secure the internet and financial transactions of today are all susceptible to attack by the development of a sufficiently large quantum computer.
Aggarwal, Divesh +4 more
core +3 more sources
A Hash-Based Quantum-Resistant Chameleon Signature Scheme
As a standard digital signature may be verified by anybody, it is unsuitable for personal or economically sensitive applications. The chameleon signature system was presented by Krawczyk and Rabin as a solution to this problem. It is based on a hash then
P. Thanalakshmi +5 more
doaj +1 more source
Quantizing the line element field
A metric with signature (-+++) can be constructed from a metric with signature (++++) and a double-sided vector field called the line element field.
Mark D. Roberts +5 more
core +1 more source
DiLizium: A Two-Party Lattice-Based Signature Scheme
In this paper, we propose DiLizium: a new lattice-based two-party signature scheme. Our scheme is constructed from a variant of the Crystals-Dilithium post-quantum signature scheme.
Jelizaveta Vakarjuk +2 more
doaj +1 more source

