Academic literature on the topic 'Quantum cryptographic protocols'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Quantum cryptographic protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Quantum cryptographic protocols"

1

Goyal, Rohit. "Quantum Cryptography: Secure Communication Beyond Classical Limits." Journal of Quantum Science and Technology 1, no. 1 (2024): 1–5. http://dx.doi.org/10.36676/jqst.v1.i1.01.

Full text
Abstract:
Quantum cryptography promises secure communication protocols that surpass the limitations of classical cryptography. By leveraging the principles of quantum mechanics, particularly the phenomenon of quantum entanglement and the uncertainty principle, quantum cryptography protocols offer provable security guarantees against eavesdropping attacks. In this paper, we provide an overview of quantum cryptography, discussing its theoretical foundations, key protocols such as quantum key distribution (QKD), and experimental implementations. We highlight the advantages of quantum cryptography over clas
APA, Harvard, Vancouver, ISO, and other styles
2

Chandre, Pankaj R., Bhagyashree D. Shendkar, Sayalee Deshmukh, Sameer Kakade, and Suvarna Potdukhe. "Machine Learning-Enhanced Advancements in Quantum Cryptography: A Comprehensive Review and Future Prospects." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11s (2023): 642–55. http://dx.doi.org/10.17762/ijritcc.v11i11s.8300.

Full text
Abstract:
Quantum cryptography has emerged as a promising paradigm for secure communication, leveraging the fundamental principles of quantum mechanics to guarantee information confidentiality and integrity. In recent years, the field of quantum cryptography has witnessed remarkable advancements, and the integration of machine learning techniques has further accelerated its progress. This research paper presents a comprehensive review of the latest developments in quantum cryptography, with a specific focus on the utilization of machine learning algorithms to enhance its capabilities. The paper begins b
APA, Harvard, Vancouver, ISO, and other styles
3

Zhou, Zishuai, Qisheng Guang, Chaohui Gao, Dong Jiang, and Lijun Chen. "Measurement-Device-Independent Two-Party Cryptography with Error Estimation." Sensors 20, no. 21 (2020): 6351. http://dx.doi.org/10.3390/s20216351.

Full text
Abstract:
We present an innovative method for quantum two-party cryptography. Our protocol introduces joint measurement and error estimation to improve the security of two-party cryptographic protocols. Our protocol removes the assumption of the attacker’s limited power and catches the attacking actions through highly estimated bit error rate. Our protocol is formally proved to be secure against both eavesdroppers and dishonest communication parties. We also utilize our designed protocol to construct two specific two-party cryptographic applications: Quantum bit commitment and quantum password identific
APA, Harvard, Vancouver, ISO, and other styles
4

Bukashkin, S. А., and М. А. Cherepniov. "Quantum Computer and Post-Quantum Cryptography." Programmnaya Ingeneria 12, no. 4 (2021): 171–78. http://dx.doi.org/10.17587/prin.12.171-178.

Full text
Abstract:
An overview of the current state of the problem of building a quantum computer and its hypothetical use for breaking cryptographic protocols is presented. The necessary parameters are considered. An overview of existing quantum algorithms and post-quantum cryptographic protocols that are strong with respect to them is presented. The problem of constructing a quantum computer is considered in comparison with the development of the theory and practice of conventional mechanical and electronic computers. The results of contests on the topic of post-quantum cryptography are presented.
APA, Harvard, Vancouver, ISO, and other styles
5

Kushwah, Kirti, Akanksha, Aniket Varshney, Arpit Jain, and Astitva Singh. "Simulating the BB84 Protocol." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 5916–20. http://dx.doi.org/10.22214/ijraset.2023.52840.

Full text
Abstract:
Abstract: Quantum Key Distribution (QKD) is a cryptographic technique that allows two parties to establish a secure communication channel by using the laws of quantum mechanics. The BB84 protocol is one of the earliest and most widely used QKD protocols that uses the properties of quantum entanglement and superposition to securely exchange cryptographic keys[3] . In this paper, we provide a detailed overview of the BB84 protocol and its implementation. We also discuss the security aspects of the protocol and its vulnerabilities. Finally, we conclude with a discussion of the future prospects an
APA, Harvard, Vancouver, ISO, and other styles
6

Okhrimenko, Tetiana, Serhii Dorozhynskyi, and Bohdan Horbakha. "ANALYSIS OF QUANTUM SECURE DIRECT COMMUNICATION PROTOCOLS." Computer systems and information technologies, no. 1 (March 30, 2023): 62–67. http://dx.doi.org/10.31891/csit-2023-1-8.

Full text
Abstract:
The development of modern computer technologies endangers the confidentiality of information, which is usually ensured by traditional cryptographic means. This circumstance forces us to look for new methods of protection. In view of modern trends, quantum cryptography methods can become such alternatives, which allow solving a number of important cryptographic problems, for which the impossibility of solving using only classical (that is, non-quantum) communication has been proven. Quantum cryptography is a branch of quantum informatics that studies methods of protecting information by using q
APA, Harvard, Vancouver, ISO, and other styles
7

Müller, Johannes, and Jan Oupický. "Post-quantum XML and SAML Single Sign-On." Proceedings on Privacy Enhancing Technologies 2024, no. 4 (2024): 525–43. http://dx.doi.org/10.56553/popets-2024-0128.

Full text
Abstract:
Extensible Markup Language (XML) is one of the most popular serialization languages. Since many security protocols are built using XML, it also provides cryptographic functionality. A central framework in this area is the Security Assertion Markup Language (SAML). This standard is one of the most widely used options for implementing Single Sign-On (SSO), which allows users to authenticate to different service providers using the credentials from a single identity provider. Like all other security protocols currently in use, the security and privacy of XML-based frameworks such as SAML is threa
APA, Harvard, Vancouver, ISO, and other styles
8

Song, Yaqi, and Li Yang. "Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer." Applied Sciences 8, no. 10 (2018): 1990. http://dx.doi.org/10.3390/app8101990.

Full text
Abstract:
Oblivious transfer (OT) and bit commitment (BC) are two-party cryptographic protocols which play crucial roles in the construction of various cryptographic protocols. We propose three practical quantum cryptographic protocols in this paper. We first construct a practical quantum random oblivious transfer (R-OT) protocol based on the fact that non-orthogonal states cannot be reliably distinguished. Then, we construct a fault-tolerant one-out-of-two oblivious transfer ( O T 1 2 ) protocol based on the quantum R-OT protocol. Afterwards, we propose a quantum bit commitment (QBC) protocol which exe
APA, Harvard, Vancouver, ISO, and other styles
9

Hallgren, Sean, Adam Smith, and Fang Song. "Classical cryptographic protocols in a quantum world." International Journal of Quantum Information 13, no. 04 (2015): 1550028. http://dx.doi.org/10.1142/s0219749915500288.

Full text
Abstract:
Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers. If we accept that quantum information processing is the most realistic model of physically feasible computation, then we must ask: What classical protocols remain secure against quantum attackers? Our main contribution is showing the existence of classical two-party protocols for the secure evaluation of any polynomial-time function under reasona
APA, Harvard, Vancouver, ISO, and other styles
10

Teja, Penumantra Satya Sai, Mounika Lakshmi P, and Vinay Kumar K. "A Secure Communication through Quantum Key Distribution Protocols." International Research Journal of Electronics and Computer Engineering 4, no. 3 (2018): 14. http://dx.doi.org/10.24178/irjece.2018.4.3.14.

Full text
Abstract:
Quantum cryptography is a new method of communication offering the security of the inviolability by using Law of Nature.Quantum Cryptography uses different secure communication by applying the phenomena of quantum physics. Unlike traditional classical cryptography, which uses mathematical techniques to restrict eavesdroppers, quantum cryptography is focused on the properties of physics of light for information. Quantum cryptography depends only on the validity of quantum theory, i.e., it is guarantied directly by the laws of physics. This is a different from any classical cryptographic techniq
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Quantum cryptographic protocols"

1

Ghorai, Shouvik. "Continuous-variable quantum cryptographic protocols." Electronic Thesis or Diss., Sorbonne université, 2021. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2021SORUS007.pdf.

Full text
Abstract:
Cette thèse porte sur l'étude et l'analyse de deux protocoles de cryptographie quantiques: la distribution de clés quantiques (Quantum Key Distribution, QKD) et la monnaie quantique infalsifiable en variables continues (Continuous Variables, CV). Le principal avantage des protocoles CV est que leur mise en œuvre ne nécessite que des composants télécoms standards. La QKD permet à deux parties distantes d'établir une clé sécurisée même en présence d'une espionne. Une propriété remarquable de la QKD est que sa sécurité peut être établie dans le cadre de la théorie de l'information. Prouver la séc
APA, Harvard, Vancouver, ISO, and other styles
2

Lamoureux, Louis-Philippe. "Theoretical and experimental aspects of quantum cryptographic protocols." Doctoral thesis, Universite Libre de Bruxelles, 2006. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/210776.

Full text
Abstract:
La mécanique quantique est sans aucun doute la théorie la mieux vérifiée qui n’a jamais existée. En se retournant vers le passé, nous constatons qu’un siècle de théorie quantique a non seulement changé la perception que nous avons de l’univers dans lequel nous vivons mais aussi est responsable de plusieurs concepts technologiques qui ont le potentiel de révolutionner notre monde.<p> <p>La présente dissertation a pour but de mettre en avance ces potentiels, tant dans le domaine théorique qu’expérimental. Plus précisément, dans un premier temps, nous étudierons des protocoles de communication qu
APA, Harvard, Vancouver, ISO, and other styles
3

Mamann, Hadriel. "Cold-atomic ensemble implemented as an efficient optical quantum memory layer in a cryptographic protocol." Electronic Thesis or Diss., Sorbonne université, 2024. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2024SORUS120.pdf.

Full text
Abstract:
Une étape importante pour le développement des réseaux quantiques est de combiner les protocoles de cryptographie avec les mémoires quantiques afin d'établir des communications sécurisées où les informations peuvent être stockées et récupérées sur demande. Un cas d'utilisation possible de ces réseaux est d'effectuer des transactions authentifiées synchronisées par l'utilisation de mémoires. Cependant, les pertes et le bruit ajoutés par les dispositifs de stockage peuvent être exploités par des agents malveillants pour dissimuler leurs tentatives de fraude. Les contraintes pour opérer dans un r
APA, Harvard, Vancouver, ISO, and other styles
4

Chailloux, André. "Quantum coin flipping and bit commitment : optimal bounds, pratical constructions and computational security." Thesis, Paris 11, 2011. http://www.theses.fr/2011PA112121/document.

Full text
Abstract:
L'avènement de l'informatique quantique permet de réétudier les primitives cryptographiques avec une sécurité inconditionnelle, c'est à dire sécurisé même contre des adversaires tout puissants. En 1984, Bennett et Brassard ont construit un protocole quantique de distribution de clé. Dans ce protocole, deux joueurs Alice et Bob coopèrent pour partager une clé secrète inconnue d'une tierce personne Eve. Ce protocole a une sécurité inconditionnelle et n'a pasd'équivalent classique.Dans ma thèse, j'ai étudié les primitives cryptographiques à deux joueurs où ces joueurs ne se font pas confiance. J'
APA, Harvard, Vancouver, ISO, and other styles
5

BIN, ALI NORSHAMSURI. "Implementation of Quantum Cryptography Protocol." Doctoral thesis, Università degli Studi di Camerino, 2014. http://hdl.handle.net/11581/401770.

Full text
Abstract:
The main goals of cryptography are the encryption of messages to render them unintelligible to third parties and the authentication of messages to certify that they have not been modified. These goals can be accomplished if the sender ("Alice") and recipient ("Bob") both possess a secret random binary digit (bit) known as "key". It is essential that Alice and Bob acquire the key material with a high level of confidence that any third party ("Eve") does not have even partial information about the random bit sequence. If Alice and Bob communicate solely through classical messages (as opposed to
APA, Harvard, Vancouver, ISO, and other styles
6

Colisson, Léo. "Study of Protocols Between Classical Clients and a Quantum Server." Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS105.

Full text
Abstract:
Les ordinateurs quantiques promettent de surprenantes puissances de calcul en exploitant les étonnantes propriétés de particules infiniment petites. Je m'applique à prouver la sécurité de protocoles permettant à un client purement classique d'utiliser les ressources calculatoires d'un serveur quantique, de manière à ce que le calcul effectué ne soit jamais révélé au serveur. À cette fin, je développe un outil modulaire permettant de générer sur un serveur distant un état quantique que seul le client est en capacité de décrire, et je montre comment on peut générer plus efficacement des états qu
APA, Harvard, Vancouver, ISO, and other styles
7

Neves, Simon. "Photonic Resources for the Implementation of Quantum Network Protocols." Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS364.

Full text
Abstract:
La sécurité des réseaux modernes de communication peut être renforcée grâce aux lois de la mécanique quantique. Dans cette thèse, nous développons une source de paires de photons que nous utilisons pour implémenter de nouvelles primitives cryptographiques. Les paires sont utilisées comme des photons uniques annoncés ou des paires intriquées. Nous proposons une méthode afin d'adapter cette source à la génération d'états intriqués multipartites. Nous démontrons la première implémentation d’un tirage à pile-ou-face faible quantique. Il permet à deux joueurs distants de décider d'un gagnant aléato
APA, Harvard, Vancouver, ISO, and other styles
8

Music, Luka. "Multi-Party Quantum Cryptography : from Folklore to Real-World." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS412.

Full text
Abstract:
La cryptographie quantique a bénéficié des nombreuses avancées de la cryptographie et théorie des réseaux classiques. Cependant, elle n’en est qu’à ses balbutiement en ce qui concerne son application en condition réelles et approfondir la théorie sous-jacente est un prérequis crucial à l’exploitation de l’intégralité de ses possibilités. Pour cela, il faut tout d’abord formaliser rigoureusement les propriétés de sécurité quantiques des techniques importées de la cryptographie classique, pour l’instant souvent utilisées sans justification. Ensuite, les progrès récents des technologies quantique
APA, Harvard, Vancouver, ISO, and other styles
9

Javelle, Jérôme. "Cryptographie Quantique : Protocoles et Graphes." Thesis, Grenoble, 2014. http://www.theses.fr/2014GRENM093/document.

Full text
Abstract:
Je souhaite réaliser un modèle théorique optimal pour les protocoles de partage de secret quantique basé sur l'utilisation des états graphes. Le paramètre représentatif d'un partage de secret à seuil est, entre autres la taille du plus grand ensemble de joueurs qui ne peut pas accéder au secret. Je souhaite donc trouver un famille de protocoles pour laquelle ce paramètre est le plus petit possible. J'étudie également les liens entre les protocoles de partage de secret quantique et des familles de courbes en géométrie algébrique<br>I want to realize an optimal theoretical model for quantum secr
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Zheshen. "Quantum key distribution protocols with high rates and low costs." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28240.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Quantum cryptographic protocols"

1

Bolfing, Andreas. Cryptographic Primitives in Blockchain Technology. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198862840.001.0001.

Full text
Abstract:
Many online applications, especially in the financial industries, are running on blockchain technologies in a decentralized manner, without the use of an authoritative entity or a trusted third party. Such systems are only secured by cryptographic protocols and a consensus mechanism. As blockchain-based solutions will continue to revolutionize online applications in a growing digital market in the future, one needs to identify the principal opportunities and potential risks. Hence, it is unavoidable to learn the mathematical and cryptographic procedures behind blockchain technology in order to
APA, Harvard, Vancouver, ISO, and other styles
2

Cryptography Algorithms: A Guide to Algorithms in Blockchain, Quantum Cryptography, Zero-Knowledge Protocols, and Homomorphic Encryption. de Gruyter GmbH, Walter, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Quantum cryptographic protocols"

1

Shang, Tao, and Jianwei Liu. "Security Analysis of Quantum Cryptographic Protocols." In Secure Quantum Network Coding Theory. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3386-0_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hallgren, Sean, Adam Smith, and Fang Song. "Classical Cryptographic Protocols in a Quantum World." In Advances in Cryptology – CRYPTO 2011. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22792-9_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Damgård, Ivan. "Quantum Communication Attacks on Classical Cryptographic Protocols." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20728-0_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ananth, Prabhanjan, and Rolando L. La Placa. "Secure Quantum Extraction Protocols." In Theory of Cryptography. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64381-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Niemiec, Marcin, Łukasz Romański, and Marcin Święty. "Quantum Cryptography Protocol Simulator." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21512-4_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Schauer, S. "Attack Strategies on QKD Protocols." In Applied Quantum Cryptography. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04831-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Abd-El-Atty, Bassem, Salvador E. Venegas-Andraca, and Ahmed A. Abd El-Latif. "Quantum Information Protocols for Cryptography." In Studies in Big Data. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-63639-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Takashima, Katsuyuki. "Post-Quantum Constant-Round Group Key Exchange from Static Assumptions." In International Symposium on Mathematics, Quantum Theory, and Cryptography. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5191-8_18.

Full text
Abstract:
Abstract We revisit a generic compiler from a two-party key exchange (KE) protocol to a group KE (GKE) one by Just and Vaudenay. We then give two families of GKE protocols from static assumptions, which are obtained from the general compiler. The first family of the GKE protocols is a constant-round GKE by using secure key derivation functions (KDFs). As special cases, we have such GKE from static Ring-LWE (R-LWE), where “static” means that the parameter size in the R-LWE does not depend on the number of group members, n, and also from the standard SI-DDH and CSI-DDH assumptions. The second family consists of two-round GKE protocols from isogenies, which are proven secure from new isogeny assumptions, the first (resp. second) of which is based on the SIDH (resp. CSIDH) two-party KE. The underlying new static assumptions are based on indistinguishability between a product value of supersingular invariants and a random value.
APA, Harvard, Vancouver, ISO, and other styles
9

Lai, Russell W. F., Giulio Malavolta, and Nicholas Spooner. "Quantum Rewinding for Many-Round Protocols." In Theory of Cryptography. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-22318-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gaborit, Philippe, Julien Schrek, and Gilles Zémor. "Full Cryptanalysis of the Chen Identification Protocol." In Post-Quantum Cryptography. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25405-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Quantum cryptographic protocols"

1

Pacheco, Rodrigo, Douglas Braga, Iago Passos, Thiago Araújo, Vinícius Lagrota, and Murilo Coutinho. "libharpia: a New Cryptographic Library for Brazilian Elections." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/sbseg.2022.224098.

Full text
Abstract:
The Research and Development Center for Communication Security (CEPESC) has a long partnership history with the Brazilian Superior Electoral Court to improve the security of the Brazilian election system. Among all the contributions from CEPESC, probably the most important is a cryptographic library used in some critical moments during the election. In an effort to improve transparency and auditability of the solution, we present the new cryptographic library developed at CEPESC, named libharpia. Its main design goal is to allow transparency and readability while substantially increasing secur
APA, Harvard, Vancouver, ISO, and other styles
2

Cho, Hannah, Daniel Quinter, Mohammad Sheikhattari, Franz J. Klein, and Charles W. Clark. "Random Number Generation with Quantum Computers." In Frontiers in Optics. Optica Publishing Group, 2022. http://dx.doi.org/10.1364/fio.2022.jw5a.72.

Full text
Abstract:
Random numbers feature in most cryptographic protocols, including those securing internet traffic. Most random number generators deployed on internet appliances are subject to cryptanalytic attack. We explore generating random numbers on compact quantum computers.
APA, Harvard, Vancouver, ISO, and other styles
3

Fung, Chi-Hang Fred, and Hoi-Kwong Lo. "A Survey on Quantum Cryptographic Protocols and Their Security." In 2007 Canadian Conference on Electrical and Computer Engineering. IEEE, 2007. http://dx.doi.org/10.1109/ccece.2007.285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lopes, Minal, and Nisha Sarwade. "On the performance of quantum cryptographic protocols SARG04 and KMB09." In 2015 International Conference on Communication, Information & Computing Technology (ICCICT). IEEE, 2015. http://dx.doi.org/10.1109/iccict.2015.7045661.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Krawec, Walter O. "A genetic algorithm to analyze the security of quantum cryptographic protocols." In 2016 IEEE Congress on Evolutionary Computation (CEC). IEEE, 2016. http://dx.doi.org/10.1109/cec.2016.7744047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yasmin, S., and G. Murali. "A new framework tor analyzing surveillance of quantum cryptographic protocols using genetic algorithm." In 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS). IEEE, 2017. http://dx.doi.org/10.1109/icecds.2017.8390133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Adhikari, Tinku, Arindam Ghosh, Ajoy Kumar Khan, Swarnalina Laha, Purbita Mitra, and Raja Karmakar. "Quantum Resistance for Cryptographic Keys in Classical Cryptosystems: A Study on QKD Protocols." In 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2021. http://dx.doi.org/10.1109/icccnt51525.2021.9579624.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Monteiro, Fábio S., Denise Goya, and Routo Terada. "Aprimoramento de Protocolo de Identificação Baseado no Problema MQ." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2012. http://dx.doi.org/10.5753/sbseg.2012.20537.

Full text
Abstract:
The MQ problem, which consists in solving a system of multivariate quadratic polynomials over finite field, has attracted the attention of researchers for the development of public-key cryptosystems because (1) it’s NP-complete, (2) there is no known polynomial-time algorithm for it’s solution, even in the quantum computational model, and (3) enable cryptographic primitives of practical interest. In 2011, Sakumoto, Shirai and Hiwatari presented two new zero-knowledge identification protocols based exclusively on the MQ problem. The 3-pass identification protocol of Sakumoto et al. has knowledg
APA, Harvard, Vancouver, ISO, and other styles
9

Rass, Stefan, and Christian Kollmitzer. "Adaptive Error Correction with Dynamic Initial Block Size in Quantum Cryptographic Key Distribution Protocols." In 2009 Third International Conference on Quantum, Nano and Micro Technologies (ICQNM). IEEE, 2009. http://dx.doi.org/10.1109/icqnm.2009.27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Baranov, V. V., A. V. Malibashev, and I. N. Tsygulev. "Development of a Training System for Modeling and Demonstrating Cryptographic Protocols Quantum Key Distribution." In 2020 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon). IEEE, 2020. http://dx.doi.org/10.1109/fareastcon50210.2020.9271650.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Quantum cryptographic protocols"

1

Allende López, Marcos, Diego López, Sergio Cerón, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003313.

Full text
Abstract:
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH
APA, Harvard, Vancouver, ISO, and other styles
2

Soloviev, V. N., and Y. V. Romanenko. Economic analog of Heisenberg uncertainly principle and financial crisis. ESC "IASA" NTUU "Igor Sikorsky Kyiv Polytechnic Institute", 2017. http://dx.doi.org/10.31812/0564/2463.

Full text
Abstract:
The Heisenberg uncertainty principle is one of the cornerstones of quantum mechanics. The modern version of the uncertainty principle, deals not with the precision of a measurement and the disturbance it introduces, but with the intrinsic uncertainty any quantum state must possess, regardless of what measurement is performed. Recently, the study of uncertainty relations in general has been a topic of growing interest, specifically in the setting of quantum information and quantum cryptography, where it is fundamental to the security of certain protocols. The aim of this study is to analyze the
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!