Privacy Protection of VANET Based on Traceable Ring Signature on Ideal Lattice
With the development of the Vehicular Ad-Hoc Network (VANET), protecting user privacy while ensuring security has become an immense challenge. A ring signature has the characteristics of no manager and unconditional anonymity, which can substantially ...
Longbo Han +3 more
doaj +1 more source
Information-Theoretically Secure String Commitments Based on Packet Reordering Channels
Realizing fundamental cryptographic primitives with unconditional security is a central topic in information-theoretic cryptography. These primitives can be realized based on physical assumptions, such as the existence of noisy channels, an upper bound ...
Vinicius de Morais Alves +3 more
doaj +1 more source
Unconditional security of entanglement-based continuous-variable quantum secret sharing [PDF]
The need for secrecy and security is essential in communication. Secret sharing is a conventional protocol to distribute a secret message to a group of parties, who cannot access it individually but need to cooperate in order to decode it.
Ioannis Kogias +3 more
semanticscholar +1 more source
EXTENSION OF SSL/TLS FOR QUANTUM CRYPTOGRAPHY [PDF]
SSL/TLS is the protocol that is used for the vast majority of secure transactions over the Internet. However, this protocol needs to be extended in order to create a promising platform for the integration of quantum cryptography (QC) into the Internet ...
Sufyan T. Faraj
doaj +1 more source
Current Injection Attack against the KLJN Secure Key Exchange
The Kirchhoff-law-Johnson-noise (KLJN) scheme is a statistical/physical secure key exchange system based on the laws of classical statistical physics to provide unconditional security. We used the LTSPICE industrial cable and circuit simulator to emulate
Chen Hsien-Pu +2 more
doaj +1 more source
Tag Generation Using Chaotic Sequences for Physical-Layer Authentication
We consider in this work a physical layer authentication method in which a message authentication code, referred to as a tag, is transmitted along with the data message to provide a robust authentication method.
Joao V. C. Evangelista +3 more
doaj +1 more source
Practical challenges in quantum key distribution [PDF]
Quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key ...
Diamanti, Eleni +3 more
core +3 more sources
Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry. [PDF]
High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down-conversion and show ...
Zheshen Zhang +4 more
semanticscholar +1 more source
Unconditional Security of Cryptosystem: A Review and Outlook
Yong Wang
semanticscholar +2 more sources
Energy-efficient and secure mobile node reauthentication scheme for mobile wireless sensor networks
Mobile wireless sensor networks (MWSNs) are a relatively new type of WSN where the sensor nodes are mobile. Compared to static WSNs, MWSNs provide many advantages, but their mobility introduces the problem of frequent reauthentication.
BoSung Kim, JooSeok Song
doaj +1 more source

