We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 534 results
  1. Physical Layer Security over Tsallis Statistics for Wireless Communications with Hardware Impairments in the Presence of some Eavesdroppers

    In this paper, considering Tsallis statistics, we investigate the problem of physical layer security (PLS) in information theory. To do this, we...

    Article 07 July 2023
  2. Security Loophole and Improvement of Quantum Private Query Protocol Based on W State

    As an important practical cryptographic protocol, quantum key distribution (QKD)-based quantum private query (QPQ) has gained widespread attention in...

    Xue Zhang, Sujuan Qin, ... Qiaoyan Wen in International Journal of Theoretical Physics
    Article 31 July 2023
  3. Estimating security of the quantum key distribution from the guesswork

    Quantum key distribution can provide information-theoretic security keys. In practice, the eavesdropper may attack the transmitted quantum state,...

    Hong-Wei Li, Jian-Hong Shi, ... Chang-Pu Sun in Quantum Information Processing
    Article 04 April 2022
  4. Security and application of semi-quantum key distribution protocol for users with different quantum capabilities

    Semi-quantum protocols serve as a bridge between quantum users and “classical” users with limited quantum capabilities, providing support for...

    Chong-Qiang Ye, Jian Li, ... Zhuo Wang in EPJ Quantum Technology
    Article Open access 20 June 2023
  5. Simple proof of security of the multiparty prepare and measure QKD

    The majority of research to date has concentrated on the Quantum Key Distribution (QKD) between two parties. In general, the QKD protocols proposed...

    Article 15 October 2022
  6. Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security

    Peev et al. (Int J Quantum Inf 03:225–231, 2005) introduced a key-efficient two-step hash function for authentication in quantum key distribution...

    Khodakhast Bibak, Robert Ritchie in Quantum Information Processing
    Article 03 July 2021
  7. Experimental quantum digital signature based on heralded single-photon sources

    The quantum digital signature (QDS) has become a popular research topic in the field of quantum information, due to its information-theoretic...

    Lei Zhan, Chun-Hui Zhang, ... Qin Wang in Quantum Information Processing
    Article 17 January 2024
  8. Entropically secure encryption with faster key expansion

    Entropically secure encryption is a way to encrypt a large plaintext with a small key and still have information-theoretic security, thus in a...

    Mehmet Hüseyin Temel, Boris Škorić in Quantum Information Processing
    Article Open access 23 March 2024
  9. Security Modeling and Simulation

    Modeling and simulation (M&S) represent the structure and behavior of a system with a focus on what the system is and does to provide value-delivery....
    Keith D. Willett, Ivan Taylor in Handbook of Security Science
    Reference work entry 2022
  10. Security Modeling and Simulation

    Modeling and simulation (M&S) represent the structure and behavior of a system with a focus on what the system is and does to provide value-delivery....
    Keith D. Willett, Ivan Taylor in Handbook of Security Science
    Living reference work entry 2022
  11. Modulation leakage-free continuous-variable quantum key distribution

    Distributing cryptographic keys over public channels in a way that can provide information-theoretic security is the holy grail for secure...

    Adnan A. E. Hajomer, Nitin Jain, ... Tobias Gehring in npj Quantum Information
    Article Open access 21 November 2022
  12. An Investigation on Data Sharing Security Risk Issues in Cloud System

    The utilization of cloud computing has enhanced quickly in numerous organizations. The little and medium organizations utilize administrations...
    Conference paper 2023
  13. Simple analysis of security of the BB84 quantum key distribution protocol

    A simple proof of security of the BB84 protocol is presented in this paper. The proof is achieved in an information-theoretic way without referring...

    Article 13 April 2020
  14. Authenticated QKD Based on Orthogonal States

    As is known, quantum key distribution (QKD) can theoretically realize information-theoretic security with a reliable identity authentication...

    Qiaoling **ong, Hou Fen, ... Yang Li in International Journal of Theoretical Physics
    Article 28 May 2022
  15. Leveraging the hardness of dihedral coset problem for quantum cryptography

    The dihedral coset problem (DCP) that comes from the hidden subgroup problem over dihedral group is one of the fundamental problems in quantum...

    **ngyu Yan, Lize Gu, ... Licheng Wang in Quantum Information Processing
    Article 17 September 2022
  16. Sender-controlled measurement-device-independent multiparty quantum communication

    Multiparty quantum communication is an important branch of quantum networks. It enables private information transmission with information-theoretic...

    Yuyan Wei, Siying Wang, ... Tao Li in Frontiers of Physics
    Article 10 March 2022
  17. Economic Security: Conceptual and Operational Intersection of Trade Policy and National Security

    Globalization in the twenty-first century is represented by a strengthening economically and technologically driven links that develop an...
    Living reference work entry 2022
  18. Economic Security: Conceptual and Operational Intersection of Trade Policy and National Security

    Globalization in the twenty-first century is represented by a strengthening economically and technologically driven links that develop an...
    Reference work entry 2022
  19. Generic security analysis framework for quantum secure direct communication

    Quantum secure direct communication provides a direct means of conveying secret information via quantum states among legitimate users. The past two...

    Zhang-Dong Ye, Dong Pan, ... Gui-Lu Long in Frontiers of Physics
    Article 28 December 2020
  20. A cost-efficient quantum access network with qubit-based synchronization

    Quantum key distribution (QKD) is a physical layer encryption technique that enables two distant parties to exchange secure keys with...

    Chunfeng Huang, Ye Chen, ... Ke** Wei in Science China Physics, Mechanics & Astronomy
    Article 27 February 2024
Did you find what you were looking for? Share feedback.