Results 31 to 40 of about 2,069,680 (303)

Privacy Protection of VANET Based on Traceable Ring Signature on Ideal Lattice

open access: yesIEEE Access, 2020
With the development of the Vehicular Ad-Hoc Network (VANET), protecting user privacy while ensuring security has become an immense challenge. A ring signature has the characteristics of no manager and unconditional anonymity, which can substantially ...
Longbo Han   +3 more
doaj   +1 more source

Information-Theoretically Secure String Commitments Based on Packet Reordering Channels

open access: yesIEEE Access, 2021
Realizing fundamental cryptographic primitives with unconditional security is a central topic in information-theoretic cryptography. These primitives can be realized based on physical assumptions, such as the existence of noisy channels, an upper bound ...
Vinicius de Morais Alves   +3 more
doaj   +1 more source

Unconditional security of entanglement-based continuous-variable quantum secret sharing [PDF]

open access: yes, 2016
The need for secrecy and security is essential in communication. Secret sharing is a conventional protocol to distribute a secret message to a group of parties, who cannot access it individually but need to cooperate in order to decode it.
Ioannis Kogias   +3 more
semanticscholar   +1 more source

EXTENSION OF SSL/TLS FOR QUANTUM CRYPTOGRAPHY [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2008
SSL/TLS is the protocol that is used for the vast majority of secure transactions over the Internet. However, this protocol needs to be extended in order to create a promising platform for the integration of quantum cryptography (QC) into the Internet ...
Sufyan T. Faraj
doaj   +1 more source

Current Injection Attack against the KLJN Secure Key Exchange

open access: yesMetrology and Measurement Systems, 2016
The Kirchhoff-law-Johnson-noise (KLJN) scheme is a statistical/physical secure key exchange system based on the laws of classical statistical physics to provide unconditional security. We used the LTSPICE industrial cable and circuit simulator to emulate
Chen Hsien-Pu   +2 more
doaj   +1 more source

Tag Generation Using Chaotic Sequences for Physical-Layer Authentication

open access: yesIEEE Access, 2023
We consider in this work a physical layer authentication method in which a message authentication code, referred to as a tag, is transmitted along with the data message to provide a robust authentication method.
Joao V. C. Evangelista   +3 more
doaj   +1 more source

Practical challenges in quantum key distribution [PDF]

open access: yes, 2016
Quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key ...
Diamanti, Eleni   +3 more
core   +3 more sources

Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry. [PDF]

open access: yesPhysical Review Letters, 2013
High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down-conversion and show ...
Zheshen Zhang   +4 more
semanticscholar   +1 more source

Energy-efficient and secure mobile node reauthentication scheme for mobile wireless sensor networks

open access: yesEURASIP Journal on Wireless Communications and Networking, 2019
Mobile wireless sensor networks (MWSNs) are a relatively new type of WSN where the sensor nodes are mobile. Compared to static WSNs, MWSNs provide many advantages, but their mobility introduces the problem of frequent reauthentication.
BoSung Kim, JooSeok Song
doaj   +1 more source

Home - About - Disclaimer - Privacy