Search
Search Results
-
Physical Layer Security over Tsallis Statistics for Wireless Communications with Hardware Impairments in the Presence of some Eavesdroppers
In this paper, considering Tsallis statistics, we investigate the problem of physical layer security (PLS) in information theory. To do this, we...
-
Security Loophole and Improvement of Quantum Private Query Protocol Based on W State
As an important practical cryptographic protocol, quantum key distribution (QKD)-based quantum private query (QPQ) has gained widespread attention in...
-
Estimating security of the quantum key distribution from the guesswork
Quantum key distribution can provide information-theoretic security keys. In practice, the eavesdropper may attack the transmitted quantum state,...
-
Security and application of semi-quantum key distribution protocol for users with different quantum capabilities
Semi-quantum protocols serve as a bridge between quantum users and “classical” users with limited quantum capabilities, providing support for...
-
Simple proof of security of the multiparty prepare and measure QKD
The majority of research to date has concentrated on the Quantum Key Distribution (QKD) between two parties. In general, the QKD protocols proposed...
-
Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security
Peev et al. (Int J Quantum Inf 03:225–231, 2005) introduced a key-efficient two-step hash function for authentication in quantum key distribution...
-
Experimental quantum digital signature based on heralded single-photon sources
The quantum digital signature (QDS) has become a popular research topic in the field of quantum information, due to its information-theoretic...
-
Entropically secure encryption with faster key expansion
Entropically secure encryption is a way to encrypt a large plaintext with a small key and still have information-theoretic security, thus in a...
-
Security Modeling and Simulation
Modeling and simulation (M&S) represent the structure and behavior of a system with a focus on what the system is and does to provide value-delivery.... -
Security Modeling and Simulation
Modeling and simulation (M&S) represent the structure and behavior of a system with a focus on what the system is and does to provide value-delivery.... -
Modulation leakage-free continuous-variable quantum key distribution
Distributing cryptographic keys over public channels in a way that can provide information-theoretic security is the holy grail for secure...
-
An Investigation on Data Sharing Security Risk Issues in Cloud System
The utilization of cloud computing has enhanced quickly in numerous organizations. The little and medium organizations utilize administrations... -
Simple analysis of security of the BB84 quantum key distribution protocol
A simple proof of security of the BB84 protocol is presented in this paper. The proof is achieved in an information-theoretic way without referring...
-
Authenticated QKD Based on Orthogonal States
As is known, quantum key distribution (QKD) can theoretically realize information-theoretic security with a reliable identity authentication...
-
Leveraging the hardness of dihedral coset problem for quantum cryptography
The dihedral coset problem (DCP) that comes from the hidden subgroup problem over dihedral group is one of the fundamental problems in quantum...
-
Sender-controlled measurement-device-independent multiparty quantum communication
Multiparty quantum communication is an important branch of quantum networks. It enables private information transmission with information-theoretic...
-
Economic Security: Conceptual and Operational Intersection of Trade Policy and National Security
Globalization in the twenty-first century is represented by a strengthening economically and technologically driven links that develop an... -
Economic Security: Conceptual and Operational Intersection of Trade Policy and National Security
Globalization in the twenty-first century is represented by a strengthening economically and technologically driven links that develop an... -
Generic security analysis framework for quantum secure direct communication
Quantum secure direct communication provides a direct means of conveying secret information via quantum states among legitimate users. The past two...
-
A cost-efficient quantum access network with qubit-based synchronization
Quantum key distribution (QKD) is a physical layer encryption technique that enables two distant parties to exchange secure keys with...