Results 21 to 30 of about 40,010 (281)
Enhanced (t, n) threshold d-level quantum secret sharing
The quantum secret sharing is an essential and fundamental technique for sharing a secret with the all participants in quantum cryptography. It can be used to design many complex protocols such as secure multiparty summation, multiplication, sorting ...
Kartick Sutradhar, Hari Om
doaj +1 more source
Full-field implementation of a perfect eavesdropper on a quantum cryptography system [PDF]
Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality it significantly relies on the physical implementation.
A Kerckhoffs +26 more
core +2 more sources
The Case for Quantum Key Distribution [PDF]
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures.
A.R. Dixon +20 more
core +8 more sources
Multiphoton and Side-Channel Attacks in Mistrustful Quantum Cryptography
Mistrustful cryptography includes important tasks like bit commitment, oblivious transfer, coin flipping, secure computations, position authentication, digital signatures and secure unforgeable tokens.
Mathieu Bozzio +4 more
doaj +1 more source
Programmable Metasurface-Empowered Secure MultiParty Communication with Threshold Cryptography
The expansion of high-speed wireless networks and increasing reliance on connectivity necessitate advanced security beyond traditional software encryption.
Jie Tian +5 more
doaj +1 more source
Introduction . One of the tasks arising in cryptography is to ensure the safe and honest conduct of e-voting. This procedure provides that voters submit their votes electronically - for example, through electronic terminals.
Larisa V. Cherkesova +3 more
doaj +1 more source
Multi-Party Threshold Cryptography
AbstractIn a threshold cryptosystem, the private key is typically distributed among parties that constitute the system using cryptographically secure secret sharing. Particular focus must be placed on generating the private key held jointly by the parties.
openaire +1 more source
Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography [PDF]
Several recent works have proposed and implemented cryptography as a means to preserve privacy and security of patients health data. Nevertheless, the weakest point of electronic health record (EHR) systems that relied on these cryptographic schemes is ...
Emuoyibofarhe, Justice +2 more
core +2 more sources
A (t, n) threshold protocol of semi-quantum secret sharing based on single particles
Semi-quantum secret sharing is an important research issue in quantum cryptography. In this paper, we propose a (t, n) threshold semi-quantum secret sharing protocol, which combines the practicality of semi-quantum secret sharing protocols and the ...
Ziyi Zhou +5 more
doaj +1 more source
Security of two-way quantum cryptography against asymmetric Gaussian attacks
Recently, we have shown the advantages of two-way quantum communications in continuous variable quantum cryptography. Thanks to this new approach, two honest users can achieve a non-trivial security enhancement as long as the Gaussian interactions of an ...
Braunstein, Samuel L. +3 more
core +1 more source

