Results 21 to 30 of about 40,010 (281)

Enhanced (t, n) threshold d-level quantum secret sharing

open access: yesScientific Reports, 2021
The quantum secret sharing is an essential and fundamental technique for sharing a secret with the all participants in quantum cryptography. It can be used to design many complex protocols such as secure multiparty summation, multiplication, sorting ...
Kartick Sutradhar, Hari Om
doaj   +1 more source

Full-field implementation of a perfect eavesdropper on a quantum cryptography system [PDF]

open access: yes, 2011
Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality it significantly relies on the physical implementation.
A Kerckhoffs   +26 more
core   +2 more sources

The Case for Quantum Key Distribution [PDF]

open access: yes, 2009
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures.
A.R. Dixon   +20 more
core   +8 more sources

Multiphoton and Side-Channel Attacks in Mistrustful Quantum Cryptography

open access: yesPRX Quantum, 2021
Mistrustful cryptography includes important tasks like bit commitment, oblivious transfer, coin flipping, secure computations, position authentication, digital signatures and secure unforgeable tokens.
Mathieu Bozzio   +4 more
doaj   +1 more source

Programmable Metasurface-Empowered Secure MultiParty Communication with Threshold Cryptography

open access: yesElectromagnetic Science
The expansion of high-speed wireless networks and increasing reliance on connectivity necessitate advanced security beyond traditional software encryption.
Jie Tian   +5 more
doaj   +1 more source

Complexity calculation of coding and information security system based on threshold secret sharing scheme used for electronic voting

open access: yesAdvanced Engineering Research, 2017
Introduction . One of the tasks arising in cryptography is to ensure the safe and honest conduct of e-voting. This procedure provides that voters submit their votes electronically - for example, through electronic terminals.
Larisa V. Cherkesova   +3 more
doaj   +1 more source

Multi-Party Threshold Cryptography

open access: yes, 2023
AbstractIn a threshold cryptosystem, the private key is typically distributed among parties that constitute the system using cryptographically secure secret sharing. Particular focus must be placed on generating the private key held jointly by the parties.
openaire   +1 more source

Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography [PDF]

open access: yes, 2017
Several recent works have proposed and implemented cryptography as a means to preserve privacy and security of patients health data. Nevertheless, the weakest point of electronic health record (EHR) systems that relied on these cryptographic schemes is ...
Emuoyibofarhe, Justice   +2 more
core   +2 more sources

A (t, n) threshold protocol of semi-quantum secret sharing based on single particles

open access: yesFrontiers in Physics, 2023
Semi-quantum secret sharing is an important research issue in quantum cryptography. In this paper, we propose a (t, n) threshold semi-quantum secret sharing protocol, which combines the practicality of semi-quantum secret sharing protocols and the ...
Ziyi Zhou   +5 more
doaj   +1 more source

Security of two-way quantum cryptography against asymmetric Gaussian attacks

open access: yes, 2008
Recently, we have shown the advantages of two-way quantum communications in continuous variable quantum cryptography. Thanks to this new approach, two honest users can achieve a non-trivial security enhancement as long as the Gaussian interactions of an ...
Braunstein, Samuel L.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy