Zobrazeno 1 - 10
of 309
pro vyhledávání: '"Huanguo Zhang"'
Publikováno v:
IEEE Access, Vol 7, Pp 44613-44621 (2019)
Private comparison allows n(n ≥ 2) participants who do not trust each other to compare whether their secret data are the same, without leaking the secret data of their own. Quantum private comparison (QPC) uses quantum mechanics to accomplish the c
Externí odkaz:
https://doaj.org/article/f13570aeebf84bd09bf45f40509a76a0
Publikováno v:
Information, Vol 11, Iss 11, p 523 (2020)
Ultra-large-scale matrix inversion has been applied as the fundamental operation of numerous domains, owing to the growth of big data and matrix applications. Using cryptography as an example, the solution of ultra-large-scale linear equations over f
Externí odkaz:
https://doaj.org/article/94850868ff874146ada5c7b7ac46bc8a
Publikováno v:
Tsinghua Science and Technology. 27:751-759
Publikováno v:
Wuhan University Journal of Natural Sciences. 27:17-25
Many evidences have showed that some intelligence agencies (often called big brother) attempt to monitor citizens’ communication by providing coerced citizens a lot of subverted cryptographic algorithms and coercing them to adopt these algorithms.
Publikováno v:
Security and Communication Networks. 2022:1-9
Healthcare cyber-physical system significantly facilitates healthcare services and patient treatment effectiveness by analyzing patients’ health information data conveniently. Nevertheless, it also develops the threats to the confidentiality of hea
Autor:
Yahui WANG, Huanguo ZHANG
Publikováno v:
Wuhan University Journal of Natural Sciences. 26:489-494
Shor in 1994 proposed a quantum polynomial-time algorithm for finding the order r of an element a in the multiplicative group Zn*, which can be used to factor the integer n by computing [see formula in PDF] and hence break the famous RSA cryptosystem
Publikováno v:
Science China Information Sciences. 65
Publikováno v:
International Journal of Theoretical Physics. 59:1866-1875
This paper presents a novel quantum private comparision (QPC) protocol based on the single-qubit rotations, quantum SWAP-test and quantum SWAP gates. The proposed QPC protocol can secretly compare information of the two participants without the help
Publikováno v:
Integration. 70:60-69
Higher-order masking schemes have been proven in theory to be secure countermeasures against side-channel attacks in the algorithm level. The ISW framework is one of the most acceptable secure models of the existing higher-order masking schemes. Howe
Publikováno v:
IEEE Internet of Things Journal. :1-1