Zobrazeno 1 - 10
of 270
pro vyhledávání: '"security proof"'
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-28 (2024)
Abstract The semi-classical One-Way to Hiding (SC-O2H) lemma given by Ambainis et al. (CRYPTO 2019) is a crucial technique to solve the reprogramming problem in the quantum random oracle model (QROM), which can lead to quadratically better bounds for
Externí odkaz:
https://doaj.org/article/1d14f7826eaa4256bd325d10a6408900
Autor:
JIN An-ran, LI He
Publikováno v:
Guangtongxin yanjiu, Pp 24-31 (2023)
As one of the main applications of quantum cryptography, Quantum Key Distribution (QKD) is a promising secure key transmission method. Compared with traditional communication methods, QKD protocols based on the basic principles of quantum mechanics h
Externí odkaz:
https://doaj.org/article/3523364f5ebc44e691e725f18e07c25c
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Heliyon, Vol 9, Iss 2, Pp e13719- (2023)
Compared with the traditional BB84 protocol, the counterfactual quantum key distribution (QKD) does not rely on any signal travelling in the quantum channel, and therefore can present a security advantage where Eve cannot fully access signal. However
Externí odkaz:
https://doaj.org/article/3369c896f5064de8a30c26a1e26c2ab6
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 33, Iss 5, Pp 593-599 (2021)
Cloud Data storage services allows users to easily store and access their data with any type of connected devices. However, since the data is outsourced, the user needs an auditing mechanism that enables him to check the integrity of his data without
Externí odkaz:
https://doaj.org/article/f0818d859fc04f49be23dafd49375c39
Publikováno v:
Tongxin xuebao, Vol 42, Pp 139-149 (2021)
Due to the advantages of cloud computing, such as virtualization and high scalability, individuals and enterprises are willing to outsource local data storage and computing to cloud servers.However, encryption breaks the linkability between the data.
Externí odkaz:
https://doaj.org/article/28c64414c0604f5a8b37b19d5887edb3
Autor:
Ilya M. Shilov, Danil A. Zakoldaev
Publikováno v:
Naučno-tehničeskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki, Vol 21, Iss 2, Pp 249-255 (2021)
The paper considers the problem of constructing a model of the robust distributed ledger for security proof of a multidimensional blockchain. Several requirements for the model are imposed, among which most important are compatibility with existing m
Externí odkaz:
https://doaj.org/article/11ceb7bb5a3146c999c3d9294059dc60
Publikováno v:
Cybersecurity, Vol 3, Iss 1, Pp 1-13 (2020)
Abstract As the only approved Identity-Based Encryption scheme in China that is also standardized by ISO, SM9-IBE has been widely adopted in many real-world applications. However, similar to other IBE standard algorithms, SM9-IBE currently lacks revo
Externí odkaz:
https://doaj.org/article/5bd2403f861b4fa1b636da1c3b95bcbf