Search
Search Results
-
Security of quantum key distribution with virtual mutually unbiased bases
In a perfect quantum key distribution (QKD) protocol, quantum states should be prepared and measured with mutually unbiased bases (MUBs). However, in...
-
Optical communication security transmission based on blockchain
Information leakage, which damages the transmission medium in optical communication systems, is becoming increasingly serious. The existing optical...
-
Optimal quantum key distribution networks: capacitance versus security
The rate and security of quantum communications between users placed at arbitrary points of a quantum communication network depend on the structure...
-
Verifying the security of a continuous variable quantum communication protocol via quantum metrology
Quantum mechanics offers the possibility of unconditionally secure communication between multiple remote parties. Security proofs for such protocols...
-
A Semi-Quantum Private Comparison with High-Level Security Third Party
Based on three-particle pure states, a new anonymous semi-quantum privacy comparison is proposed to deal with the threat of quantum computing power...
-
Composable end-to-end security of Gaussian quantum networks with untrusted relays
Gaussian networks are fundamental objects in network information theory. Here many senders and receivers are connected by physically motivated...
-
Security analysis of the semi-quantum secret-sharing protocol of specific bits and its improvement
Recently, Tian et al. (Quantum Inf. Process., 20(6), 217(2021)) proposed an efficient semi-quantum secret-sharing protocol of specific bits. In their...
-
Research on key technologies of data security and privacy protection in Internet of Things group intelligence
With the increasing scale and complexity of IoT swarm intelligence applications, data security and privacy protection have become important factors...
-
Performance analysis of physical-layer security in mid-infrared FSO communication system
Based on the eavesdrop** model of non-line-of-sight (NLOS) scattering channel in mid-infrared (MIR) free-space optical (FSO) communication system,...
-
Cryptographic enhancement of image data security through quantum-classical hybrid encryption with parameterized pixel ratios
To enhance the security of image data, this paper proposes a quantum-classical hybrid image encryption scheme based on parameterized pixel ratios....
-
A probabilistic model of quantum states for classical data security
The phenomenal progress of quantum information theory over the last decade has substantially broadened the potential to simulate the superposition of...
-
On the security of image cryptosystems using DRPE based on scrambling and diffusion
Double random phase encoding (DRPE) is one of the most classic methods in optical image encryption. Since the linear property of DRPE makes the...
-
Security Loophole and Improvement of Quantum Private Query Protocol Based on W State
As an important practical cryptographic protocol, quantum key distribution (QKD)-based quantum private query (QPQ) has gained widespread attention in...
-
Finite sampling bandwidth effect on practical security of discretely modulated continuous-variable quantum key distribution
Finite sampling bandwidth of analog-to-digital converter (ADC) has an effect on performance of continuous-variable quantum key distribution (CVQKD)....
-
Impact of transmitter imbalances on the security of continuous variables quantum key distribution
Continuous-variable quantum key distribution (CV-QKD) provides a theoretical unconditionally secure solution to distribute symmetric keys among users...
-
AI drive: quantum-computational DRL framework for EHV navigational efficiency and security augmentation
The Q-learning approach, within deep reinforcement learning (DRL) methodology, is beneficial in multifarious tasks, one of them including enhancement...
-
Simple proof of security of the multiparty prepare and measure QKD
The majority of research to date has concentrated on the Quantum Key Distribution (QKD) between two parties. In general, the QKD protocols proposed...
-
Resource allocation with fuzzy logic based network optimization and security analysis in optical communication network
Modern optical transport networks are extremely complicated systems that make managing and distributing management information accurate and...
-
A verifiable framework of entanglement-free quantum secret sharing with information-theoretical security
Quantum secret sharing (QSS) schemes without entanglement have huge advantages in scalability and are easier to realize as they only require...
-
Data security using RTL algorithm with chaos synchronization for VLC system
The latest upcoming technology of visible light communication (VLC) system has become a beneficial part of most of the applications than older...