![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Quantum security analysis of a lattice-based oblivious transfer protocol
Because of the concise functionality of oblivious transfer (OT) protocols, they have been widely used as building blocks in secure multiparty computation and high-level protocols. The security of OT protocols ...
-
Article
Efficient quantum dialogue using entangled states and entanglement swap** without information leakage
We propose a novel quantum dialogue protocol by using the generalized Bell states and entanglement swap**. In the protocol, a sequence of ordered two-qutrit entangled states acts as quantum information chann...
-
Article
Efficient identity-based signature over NTRU lattice
Identity-based signature has become an important technique for lightweight authentication as soon as it was proposed in 1984. Thereafter, identity-based signature schemes based on the integer factorization pro...
-
Article
Efficient Quantum Dialogue by Using the Two-Qutrit Entangled States Without Information Leakage
A quantum dialogue protocol, based on the two-qutrit entangled states is proposed in this paper. In this protocol, the security of communication is ensured by the secret transmitting order of qutrits. Two legi...
-
Article
CCA2 secure biometric identity based encryption with constant-size ciphertext
We propose a new biometric identity based encryption scheme (Bio-IBE), in which user biometric information is used to generate the public key with a fuzzy extractor. This is the first Bio-IBE scheme that achie...