Results 41 to 50 of about 5,707 (192)
Lottery and Auction on Quantum Blockchain
This paper proposes a protocol for lottery and a protocol for auction on quantum Blockchain. Our protocol of lottery satisfies randomness, unpredictability, unforgeability, verifiability, decentralization and unconditional security.
Xin Sun, Piotr Kulicki, Mirek Sopek
doaj +1 more source
New security notions and feasibility results for authentication of quantum data [PDF]
We give a new class of security definitions for authentication in the quantum setting. These definitions capture and strengthen existing definitions of security against quantum adversaries for both classical message authentication codes (MACs) and well ...
Garg, Sumegha +2 more
core +2 more sources
An Efficient Existentially Unforgeable Signature Scheme and its Applications [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Dwork, Cynthia, Naor, Moni
openaire +2 more sources
Secure Authentication via Quantum Physical Unclonable Functions: A Review
This in‐depth review article examines the origins, development, and evolution of Quantum Physical Unclonable Functions (QPUFs), with a particular focus on their use in secure authentication. The topic is motivated and introduced in detail, addressing both theoretical foundations and practical implementations, and is supported by a systematic article ...
Pol Julià Farré +8 more
wiley +1 more source
Privacy-Preserving Electronic Ticket Scheme with Attribute-based Credentials [PDF]
Electronic tickets (e-tickets) are electronic versions of paper tickets, which enable users to access intended services and improve services' efficiency. However, privacy may be a concern of e-ticket users.
Chen, Liqun +4 more
core +2 more sources
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley +1 more source
On the "Security analysis and improvements of arbitrated quantum signature schemes"
Recently, Zou et al. [Phys. Rev. A 82, 042325 (2010)] pointed out that two arbitrated quantum signature (AQS) schemes are not secure, because an arbitrator cannot arbitrate the dispute between two users when a receiver repudiates the integrity of a ...
H. Barnum +5 more
core +1 more source
Our study demonstrates rapid nasal breathing‐evoked EEG signals enable high‐accuracy (98.3%) biometric authentication via a hybrid ResNet‐Swin Transformer model. This noninvasive approach eliminates external stimuli, offering secure patient identification for critical respiratory care settings, such as ventilator access and continuous monitoring ...
Cai Chen +8 more
wiley +1 more source
The existing proxy signature schemes with the proxy revocation function are proven to be malleable and do not possess strong unforgeability. Motivated by these concerns, a new proxy signature scheme with fast revocation is proposed, and it can be proved ...
Liaojun Pang +3 more
doaj +1 more source
Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Several signcryption schemes are proposed throughout the years, each of them having
Beheshti, A. A., Toorani, M.
core +2 more sources

