Zobrazeno 1 - 10
of 2 746
pro vyhledávání: '"secret key"'
Autor:
Ints Meijers
Publikováno v:
Quantum Reports, Vol 6, Iss 3, Pp 426-435 (2024)
Quantum Key Distribution (QKD) offers a revolutionary approach to secure communication, leveraging the principles of quantum mechanics to generate and distribute cryptographic keys that are immune to eavesdropping. As QKD systems become more widely a
Externí odkaz:
https://doaj.org/article/46fe07733a8e4720b58812e1f4e4ff1e
Publikováno v:
IEEE Access, Vol 12, Pp 159534-159544 (2024)
Steganography hides a secret message inside another medium (cover-image) while maintaining imperceptibility and/or robustness/embedding capacity, making it a suitable candidate for keeping information safe and hiding the existence of data itself insi
Externí odkaz:
https://doaj.org/article/ee55aa89845d42d98240dd112807dddc
Publikováno v:
IEEE Access, Vol 12, Pp 89947-89956 (2024)
Physical layer secret key generation is a novel research direction that has attracted many researchers in recent years due to its low computational capacity and ability to obtain information-theoretic security. In this paper, we propose two methods b
Externí odkaz:
https://doaj.org/article/af85ff52bab44ca2b3f7409d3178b2bd
Publikováno v:
IEEE Access, Vol 12, Pp 82972-82983 (2024)
Physical Layer-based Secret Key Generation (PLSKG) between the legitimate nodes from the reciprocal wireless channel is a vastly studied area of Physical Layer Security (PLS). PLSKG aims to secure the wireless link between the legitimate nodes by sym
Externí odkaz:
https://doaj.org/article/ec50f7538b2947b0bb6455dd4cff4e46
Publikováno v:
IEEE Open Journal of the Communications Society, Vol 5, Pp 2089-2112 (2024)
New near-capacity continuous-variable quantum key distribution (CV-QKD) reconciliation schemes are proposed, where both the authenticated classical channel (ClC) and the quantum channel (QuC) for QKD are protected by separate forward error correction
Externí odkaz:
https://doaj.org/article/20c39c14c99a4deca9e97965824be177
Publikováno v:
IEEE Access, Vol 12, Pp 16462-16473 (2024)
Recently, Chait et al. proposed a new aggregate signature scheme under the RSA setting (IEEE Access, 2023). In this paper, we show that Chait et al.’s aggregate signature scheme is insecure when two signers collude with their own secret keys, by pr
Externí odkaz:
https://doaj.org/article/9953a73a23784166b8158a4038691aea
Publikováno v:
Photonics, Vol 11, Iss 10, p 922 (2024)
Coherent diffractive imaging is an optical methodology that encodes information about an object within the diffraction intensity. Here, we introduce a diffractive optical encryption system that utilizes multiple wavelengths and multiple distances, si
Externí odkaz:
https://doaj.org/article/94f0c3fd414b454e90e4170733a08e0c
Publikováno v:
Entropy, Vol 26, Iss 9, p 758 (2024)
This paper explores physical layer group key generation in wireless relay networks with a star topology. In this setup, the relay node plays the role of either a trusted or untrusted central node, while one legitimate node (Alice) acts as the referen
Externí odkaz:
https://doaj.org/article/b7ebae6608e64e41a450e2c8b75fb594
Publikováno v:
Sensors, Vol 24, Iss 16, p 5201 (2024)
In recent research, there has been a significant focus on establishing robust quantum cryptography using the continuous-variable quantum key distribution (CV-QKD) protocol based on Gaussian modulation of coherent states (GMCS). Unlike more stable fib
Externí odkaz:
https://doaj.org/article/106578ac16e8425da1f0e1ee43b8e0d0
Publikováno v:
Cyber Security and Applications, Vol 1, Iss , Pp 100012- (2023)
Recent advancements in drone technology have created new application opportunities, particularly for small drones. However, these advancements raise concerns about security, adaptability, and consistency. Data security is jeopardized by flying intell
Externí odkaz:
https://doaj.org/article/b2e288dba146412390ca65378d36050c