Search
Search Results
-
Research on intelligent search-and-secure technology in accelerator hazardous areas based on machine vision
Prompt radiation emitted during accelerator operation poses a significant health risk, necessitating a thorough search and securing of hazardous...
-
Controlled Quantum Secure Direct Communication with Authentication Based on Quantum Search Algorithm
A controlled quantum secure direct communication protocol with authentication based on quantum search algorithm is put forward, consisting of three...
-
Quantum Secure Multi-Party Summation Based on Grover’s Search Algorithm
In this paper, a quantum secure multi-party summation protocol is proposed based on some properties of Grover’s search algorithm. In the protocol,...
-
QBIoV: a secure data sharing scheme for the Internet of vehicles based on quantum-enabled blockchain
Internet of vehicles (IoV) technology connects various types of vehicles through the Internet of Things to achieve mutual communication and data...
-
Symmetric private information retrieval supported by quantum-secure key-exchange network
Quantum key distribution provides a provably secure way for private key distribution, which enables the practical implementation of information...
-
Secure opportunistic based void-hold routing for underwater acoustic sensor networks
The primary objective of this research is to examine the difficulties encountered in underwater acoustic Sensor Networks (UASN) due to empty spaces...
-
Fiber-based quantum secure direct communication without active polarization compensation
Quantum secure direct communication (QSDC) that allows people to directly transmit confidential information through insecure channels is an important...
-
Development of secure and authentic access controlling techniques using the pushback request response (PRR) approach for blockchain healthcare applications
Access control systems have become integral to every organization’s defensive arsenal to protect sensitive information and ensure that businesses...
-
Depth–measurement trade-off for quantum search on block ciphers
Grover’s algorithm has been widely used for quantum key search to attack block ciphers with a quadratic speedup as compared to classical brute-force...
-
Practical decoy-state quantum secure direct communication
Quantum secure direct communication (QSDC) has been demonstrated in both fiber-based and free-space channels using attenuated lasers. Decoy-state...
-
Quantum attacks against BBB secure PRFs or MACs built from public random permutations
Since the seminal work of Chen et al. to construct pseudorandom functions (PRFs) from the public random permutations, a series of designs of...
-
Quantum Key Agreement Protocol Based on Quantum Search Algorithm
Quantum key agreement (QKA) and quantum search algorithm (QSA) are two important branches in quantum topic. The former asks all participants to...
-
Multi-party semi-quantum secure direct communication using Greenberger–Horne–Zeilinger states
Two three-party semi-quantum communication protocols (SQSDC protocol and SQD protocol) based on Greenberger–Horne–Zeilinger (GHZ) states are designed...
-
A Secure Bank Transaction Using Blockchain Computing and Forest Oddity
The Indian banking system has progressed from nationalization to liberalization. The banks are the backbone of any country wherever financial support... -
Tree-based quantum anonymous ranking protocol
We propose an improved quantum anonymous multiparty multidata ranking (QAMMR) protocol based on the binary search tree. In a QAMMR protocol, multiple...
-
A novel image encryption scheme combing optical chaos scrambling, DNA diffusion strategy and MOPSO algorithm
A secure encryption scheme, combining multi-objective particle swarm optimization (MOPSO), optical chaos, and DNA algorithm is proposed and...
-
Quantum Secure Multi-party Private Set Intersection Cardinality
As we know that data sharing, a critical element in social networks, has the benefits of exploring important information, while also has the...
-
Quantum blockchain architecture using cyclic QSCD and QKD
Quantum blockchain (QBC) is a novel decentralised concept anticipated to offer an alternative to the classical blockchain to provide transaction...
-
Quantum circuit implementation and resource analysis of LBlock and LiCi
Due to Grover’s algorithm, any exhaustive search attack of block ciphers can achieve a quadratic speed-up. To implement Grover’s exhaustive search...
-
Quantum implementation of SHA1 and MD5 and comparison with classical algorithms
The foundation of this research is the quantum implementation of two hashing algorithms, namely Secure Hash Algorithm (SHA1) and Message Digest...