Results 111 to 120 of about 2,069,680 (303)

A brief review on the impossibility of quantum bit commitment [PDF]

open access: yes, 1997
The desire to obtain an unconditionally secure bit commitment protocol in quantum cryptography was expressed for the first time thirteen years ago.
Claude Crépeau   +4 more
core   +5 more sources

Free-Space Quantum Key Distribution

open access: yes, 2016
Based on the firm laws of physics rather than unproven foundations of mathematical complexity, quantum cryptography provides a radically different solution for encryption and promises unconditional security.
Carrasco-Casado, Alberto   +2 more
core   +1 more source

Unconditional security in quantum bit commitment

open access: yes, 2001
The commitment of bits between two mutually distrustful parties is a powerful cryptographic primitive with which many cryptographic objectives can be achieved. It is widely believed that unconditionally secure quantum bit commitment is impossible due to quantum entanglement cheating, which is codified in a general impossibility theorem.
openaire   +2 more sources

Effectiveness and Safety of Baricitinib for Juvenile Idiopathic Arthritis–Associated Uveitis or Chronic Anterior Antinuclear Antibody–Positive Uveitis

open access: yesArthritis Care &Research, EarlyView.
Objective To evaluate the efficacy and safety of baricitinib in pediatric patients with active juvenile idiopathic arthritis–associated uveitis (JIA‐U) or chronic anterior antinuclear antibody–positive uveitis, who had an inadequate response to methotrexate (MTX) or biologic disease‐modifying antirheumatic drugs (bDMARDs).
Athimalaipet V. Ramanan   +7 more
wiley   +1 more source

Practically Feasible Robust Quantum Money with Classical Verification

open access: yesCryptography, 2019
We introduce a private quantum money scheme with the note verification procedure based on sampling matching, a problem in a one-way communication complexity model. Our scheme involves a bank who produces and distributes quantum notes, noteholders who are
Niraj Kumar
doaj   +1 more source

Quantum multiparty key distribution protocol without use of entanglement

open access: yes, 2007
We propose a quantum key distribution (QKD) protocol that enables three parties agree at once on a shared common random bit string in presence of an eavesdropper without use of entanglement.
C. H. Bennett   +3 more
core   +1 more source

Oblivious Transfer Based on the McEliece Assumptions with Unconditional Security for the Sender

open access: yesAnais do X Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2010), 2010
In this paper we propose the first code-based oblivious transfer protocol with perfect (unconditional) security for one of the parties. To obtain this result we show that the McEliece cryptosystem is rerandomizable, a property that might be of ...
B. David   +2 more
semanticscholar   +1 more source

Unconditional Security In Quantum Key Distribution

open access: yes, 2012
It has been widely claimed and believed that many protocols in quantum key distribution, especially the single-photon BB84 protocol, have been proved unconditionally secure at least in principle, for both asymptotic and finite protocols with realistic bit lengths.
openaire   +2 more sources

Financial Distress and Its Determinants in Rheumatoid Arthritis

open access: yesArthritis Care &Research, EarlyView.
Objective To quantify the degree of financial distress and identify its determinants in adults with rheumatoid arthritis (RA) given the frequent prolonged use of expensive disease‐modifying therapies. Methods We identified adults enrolled in the FORWARD databank with either RA or noninflammatory musculoskeletal disease (NIMSKD) completing the ...
Amber Brown Keebler   +5 more
wiley   +1 more source

Study of secret sharing schemes based on quantum theory

open access: yesTongxin xuebao, 2009
Quantum secret sharing(QSS) which is based on the laws of quantum mechanics,instead of mathematical assumptions can share the information unconditionally securely, according to the form of sharing information, quantum secret sharing can be divided into ...
ZHU Zhen-chao 1, ZHANG Yu-qing2
doaj  

Home - About - Disclaimer - Privacy