Filters








12,207 Hits in 3.2 sec

Computational Security of Quantum Encryption [chapter]

Gorjan Alagic, Anne Broadbent, Bill Fefferman, Tommaso Gagliardoni, Christian Schaffner, Michael St. Jules
2016 Lecture Notes in Computer Science  
In this work, we initiate the study of another relevant topic: the encryption of quantum data in the computational setting.  ...  Finally, we construct secure quantum encryption schemes from basic primitives.  ...  Indistinguishability Semantic security formalizes the notion of security of an encryption scheme under computational assumptions.  ... 
doi:10.1007/978-3-319-49175-2_3 fatcat:ot3qb4jbrzhn5j6ub5kmpavgay

Security of Encryption Procedures and Practical Implications of Building a Quantum Computer

Ferenc Koczka
2020 Academic and Applied Research in Military and Public  
a quantum computer and some algorithms relevant to the topic.  ...  The construction of the quantum computer creates a new situation, which requires a number of procedures to be eliminated and its parameters to be modified or protected by additional methods.  ...  How a quantum computer works The operation and algorithms of a quantum computer are significantly different from those of a traditional computer.  ... 
doi:10.32565/aarms.2020.3.1 fatcat:vejundzk4fgczlv7d6br7zt6oi

Homomorphic encryption of linear optics quantum computation on almost arbitrary states of light with asymptotically perfect security [article]

Yingkai Ouyang and Si-Hui Tan and Joseph Fitzsimons and Peter P. Rohde
2019 arXiv   pre-print
Homomorphic encryption is an approach for encrypted, outsourced quantum computation, where the client's data remains secret, even during execution of the computation.  ...  latter of which is universal for quantum computation.  ...  In the upcoming quantum era, it is to be expected that client/server models for quantum computing will emerge, owing to the high expected cost of quantum hardware.  ... 
arXiv:1902.10972v1 fatcat:zugp4i3yv5cwzbio4d6niwmeju

Will quantum computers be the end of public key encryption?

William Buchanan, Alan Woodward
2016 Journal of Cyber Security Technology  
Breaking RSA An example of how quantum computers will impact current public key encryption schemes is exemplified by studying how the RSA algorithm is at risk.  ...  We present a high-level review of the threat posed by quantum computers, using RSA and Shor's algorithm as an example but we explain why we feel that the range of quantum algorithms that pose a threat  ...  Emergence of public key encryption One of the perennial problems with symmetric encryption has been establishing a secure channel over which to pass the shared secret key.  ... 
doi:10.1080/23742917.2016.1226650 fatcat:sfcvw3en6jho3jg5bvt5q2fpri

Homomorphic encryption of linear optics quantum computation on almost arbitrary states of light with asymptotically perfect security

Yingkai Ouyang, Si-Hui Tan, Joseph Fitzsimons, Peter P. Rohde
2020 Physical Review Research  
Homomorphic encryption is an approach for encrypted, outsourced quantum computation, where the client's data remains secret, even during execution of the computation.  ...  latter of which is universal for quantum computation.  ...  INTRODUCTION In the upcoming quantum era, it is to be expected that client/server models for quantum computing will emerge, owing to the high expected cost of quantum hardware.  ... 
doi:10.1103/physrevresearch.2.013332 fatcat:smaynzx6yfdpjbp63i7rqo4kgi

Post-quantum secure encryption and cybersecurity education

2020 Research Outreach  
positions globally by 2021, highlighting the need to train hardware security specialists to secure cyberinfrastructure.  ...  Indeed, the emergence of quantum computers places existing security standards under severe threat. New encryption systems that can survive quantum computer attacks are urgently required.  ...  Dr Aydin Aysu The development of new encryption systems capable of surviving quantum computer attacks is crucial. future of cybersecurity relies on developing quantum-secure algorithms, implementing them  ... 
doi:10.32907/ro-114-9093 fatcat:a4l4plh7bjd6bgitg6vdpowkk4

Cloud Computing Cryptography "State-Of-The-Art"

Omer K. Jasim, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem
2013 Zenodo  
This paper surveys the "keys generation and management" mechanism and encryption/decryption algorithms used in cloud computing environments, we proposed new security architecture for cloud computing environment  ...  A new cryptographic environment that implements quantum mechanics in order to gain more trusted with less computation cloud communications is given.  ...  -QKD: QKD is a powerful secure technique in which all tasks are computed by quantum physics and computing theory.  ... 
doi:10.5281/zenodo.1088898 fatcat:sri45syf7rdl5fzqu3shjzakum

Quantum Homomorphic Encryption for Circuits of Low T-gate Complexity [chapter]

Anne Broadbent, Stacey Jeffery
2015 Lecture Notes in Computer Science  
Here, we formally define and give schemes for quantum homomorphic encryption, which is the encryption of quantum information such that quantum computations can be performed given the ciphertext only.  ...  A further contribution of ours is to formally define the security of encryption schemes for quantum messages: we define quantum indistinguishability under chosen plaintext attacks in both the public and  ...  A number of works have studied the secure delegation of quantum computation [1, 9-11, 16, 30] None directly address the question of quantum homomorphic encryption, since they are interactive schemes,  ... 
doi:10.1007/978-3-662-48000-7_30 fatcat:wsf2x4neurelndt52xvfgrhtcy

Analyzing the Data of Software Security Life-Span: Quantum Computing Era

Hashem Alyami, Mohd Nadeem, Wael Alosaimi, Abdullah Alharbi, Rajeev Kumar, Bineet Kumar Gupta, Alka Agrawal, Raees Ahmad Khan
2022 Intelligent Automation and Soft Computing  
This paper will talk about the definition and characterization of quantum computing in software security.  ...  In the context of software and web application, a thorough assessment of security factors will significantly influence the software's durability in the era of quantum computing.  ...  Quantum security deals with the security in the era of quantum computing. Nowadays the rate of development of quantum technology is exponential.  ... 
doi:10.32604/iasc.2022.020780 fatcat:yxuorfibcnhpnpvgtg7bxf5yei

Quantum fully homomorphic encryption scheme based on quantum fault-tolerant construction [article]

Min Liang, Li Yang
2015 arXiv   pre-print
Fully homomorphic encryption is a kind of encryption scheme, which enables arbitrary computation on encrypted data without accessing the data.  ...  In the scheme, when Server performs quantum computation on the encrypted plaintext, some ancillary quantum states should be provided by Client.  ...  Acknowledgement This work was supported by the National Natural Science Foundation of China under Grant No.61173157.  ... 
arXiv:1503.04061v1 fatcat:t5n43bfpezc6peywa3fzh2brzu

Enhancement of Quantum Key Distribution Protocol for Data Security in Cloud Environment

Yasser Hassen Jassem, Alharith Abdulkareem Abdullah
2020 Innovative Computing Information and Control Express Letters, Part B: Applications  
Also, to more security, we need to store the key away from the cloud and need data encryption in way that cannot break by the high computing like quantum computer.  ...  The simulation results show that our proposed system was effective in producing more security and less time in the process of data encryption and it provides a security for confidentiality of the user's  ...  computing as well as in the age of computing quantum.  ... 
doi:10.24507/icicelb.11.03.279 fatcat:3q6e724bvjf3zn3346astpr4k4

A Secure Multiparty Quantum Homomorphic Encryption Scheme

Jing-Wen Zhang, Xiu-Bo Chen, Gang Xu, Heng-Ji Li, Ya-Lan Wang, Li-Hua Miao, Yi-Xian Yang
2022 Computers Materials & Continua  
The significant advantage of the quantum homomorphic encryption scheme is to ensure the perfect security of quantum private data.  ...  In this paper, a novel secure multiparty quantum homomorphic encryption scheme is proposed, which can complete arbitrary quantum computation on the private data of multiple clients without decryption by  ...  In the beginning, a large amount of research work [14] [15] [16] addressed the task of secure implementation of delegated quantum computation on the encrypted data, but the interaction requirements of  ... 
doi:10.32604/cmc.2022.029125 fatcat:dgl7zyd74nbkzo2dwv564ixeti

Adaptive Multi-Applications Cryptographic System

Basil Al-Kasasbeh
2021 International journal of advances in soft computing and its applications  
Keywords: Cryptography, symmetric key encryption, block cipher, delay and performance, quantum computing.  ...  The requirements are then identified and encoded according to four options: high, moderate, low, and no security requirements.  ...  the confidentiality of traditional and quantum computing.  ... 
doi:10.15849/ijasca.211128.03 fatcat:mojhh4c4ozcyljr546yuxfm6um

Practical cryptographic strategies in the post-quantum era

I.S. Kabanov, R.R. Yunusov, Y.V. Kurochkin, A.K. Fedorov
2018 arXiv   pre-print
We review new frontiers in information security technologies in communications and distributed storage technologies with the use of classical, quantum, hybrid classical-quantum, and post-quantum cryptography  ...  An approach concerning the selection of practical encryption technologies for enterprises with branched communication networks is introduced.  ...  Acknowledgments We acknowledge financial support from Ministry of Education and Science of the Russian Federation (Agreement 14.582.21.0009, ID RFMEFI58215X0009).  ... 
arXiv:1703.04285v2 fatcat:gujjx5okzndizegkoijy2uqcea

Indistinguishability and semantic security for quantum encryption scheme [article]

Chong Xiang, Li Yang
2015 arXiv   pre-print
We investigate the definition of security for encryption scheme in quantum context.  ...  The equivalence between the indistinguishability and semantic security of quantum encryption scheme is also proved.  ...  Semantic security for quantum encryption scheme The semantic security for quantum encryption scheme means that whatever can be efficiently computed from the ciphertext can be efficiently computed when  ... 
arXiv:1506.05944v1 fatcat:pstugg66p5hz7cgw2vkfwexp4u
« Previous Showing results 1 — 15 out of 12,207 results