Results 21 to 30 of about 2,069,680 (303)
Security of Quantum Key Distribution with One-Time-Pad-Protected Error Correction and Its Performance Benefits [PDF]
In quantum key distribution (QKD), public discussion over the authenticated classical channel inevitably leaks information about the raw key to a potential adversary, which must later be mitigated by privacy amplification.
Roman Novak
doaj +2 more sources
Anticipated effects of an unconditional cash transfer program: A qualitative community-engaged planning study [PDF]
Introduction: This community-engaged study explored the perspectives of residents in Oakland County, Michigan, who were experiencing poverty to understand how a proposed short-term unconditional cash transfer program may or may not influence their health
Rebeccah Sokol +5 more
doaj +2 more sources
Associating MIMO beamforming with security codes to achieve unconditional communication security
This study investigates the framework of associating multiple‐input–multiple‐output (MIMO) beamforming with secure code to achieve unconditional secure communications in the wireless passive eavesdropping environment. The schemes are based on a two‐step method under Wyner's wiretap channel model.
Jie Tang +6 more
semanticscholar +2 more sources
Unconditional Security of Sending or Not Sending Twin-Field Quantum Key Distribution with Finite Pulses [PDF]
The Sending-or-Not-Sending protocol of the twin-field quantum key distribution (TF-QKD) has its advantage of unconditional security proof under any coherent attack and fault tolerance to large misalignment error.
Cong Jiang +3 more
semanticscholar +1 more source
Quantum-aided secure deep neural network inference on real quantum computers
Deep neural networks (DNNs) are phenomenally successful machine learning methods broadly applied to many different disciplines. However, as complex two-party computations, DNN inference using classical cryptographic methods cannot achieve unconditional ...
Hanqiao Yu +4 more
doaj +1 more source
Anti-Quantum Lattice-Based Ring Signature Scheme and Applications in VANETs
Message authentication is crucial because it encourages participants to accept countermeasures and further transmit messages to legitimate users in a network while maintaining the legitimacy of the identity of network members. An unauthorized user cannot
Chunhong Jiao, Xinyin Xiang
doaj +1 more source
Lottery and Auction on Quantum Blockchain
This paper proposes a protocol for lottery and a protocol for auction on quantum Blockchain. Our protocol of lottery satisfies randomness, unpredictability, unforgeability, verifiability, decentralization and unconditional security.
Xin Sun, Piotr Kulicki, Mirek Sopek
doaj +1 more source
The effects of nutrition counselling (NC) and unconditional cash transfer (UCT) in improving growth in children under five and household food security are poorly understood in humanitarian settings.
Mohamed Kalid +3 more
semanticscholar +1 more source
Recently, new physics for unconditional security in a classical key distribution (USCKD) has been proposed and demonstrated in a frame of a double Mach–Zehnder interferometer (MZI) as a proof of principle, where the unconditional security is rooted in ...
Byoung S. Ham
doaj +1 more source
Quantum Key Distribution Networks: Challenges and Future Research Issues in Security
A quantum key distribution (QKD) network is proposed to allow QKD protocols to be the infrastructure of the Internet for distributing unconditional security keys instead of existing public-key cryptography based on computationally complex mathematical ...
Chia-Wei Tsai +4 more
doaj +1 more source

