Page
%P
![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessQuantum asymmetric key crypto scheme using Grover iteration
Here, we propose a quantum asymmetric key cryptography scheme using Grover’s quantum search algorithm. In the proposed scheme, Alice generates a pair of public and private keys, keeps the private keys safe, an...
-
Article
Quantum Signature Scheme for Participant Attack
We present a quantum signature scheme for a participant attack using only Pauli operators. The arbitrator verifies the signature and serves to prevent the denial of participants as well as the existing arbitra...