Filters








2,329 Hits in 7.4 sec

Insider-proof encryption with applications for quantum key distribution [article]

Matthew McKague, Lana Sheridan
2013 arXiv   pre-print
It has been pointed out that current protocols for device independent quantum key distribution can leak key to the adversary when devices are used repeatedly and that this issue has not been addressed.  ...  We introduce the notion of an insider-proof channel.  ...  Acknowledgements This work is funded by the Centre for Quantum Technologies, which is funded by the Singapore Ministry of Education and the Singapore National Research Foundation.  ... 
arXiv:1209.4696v2 fatcat:dkuk6bxponcb5mzmgm4ff6ji2i

Can you sign a quantum state?

Gorjan Alagic, Tommaso Gagliardoni, Christian Majenz
2021 Quantum  
with the public key of the intended recipient.  ...  We develop "as-strong-as-classical" security definitions for quantum signcryption and give secure constructions based on post-quantum public-key primitives.  ...  ., QAE-) secure symmetric-key quantum encryption scheme. Proof sketch. (For details, see Section A.1).  ... 
doi:10.22331/q-2021-12-16-603 fatcat:gnxwfymc5bc5rfe3qfjvzgiary

Can You Sign A Quantum State?

G. Alagic, T. Gagliardoni, C. Majenz
2020 Zenodo  
We then show a positive result: it is possible to sign quantum states, provided that they are also encrypted with the public key of the intended recipient.  ...  We also give secure constructions based on post-quantum public-key primitives.  ...  Acknowledgements The authors would like to thank Yfke Dulek, Christopher Portmann, Christian Schaffner, and Yi-Kai Liu for helpful feedback about this work.  ... 
doi:10.5281/zenodo.3947882 fatcat:yy3zsh2w3jcqlhmvlj33awuzly

Can you sign a quantum state? [article]

Gorjan Alagic, Tommaso Gagliardoni, Christian Majenz
2021 arXiv   pre-print
We then show a positive result: a quantum state can be signed with the same security guarantees as classically, provided that it is also encrypted with the public key of the intended recipient.  ...  We develop "as-strong-as-classical" security definitions for quantum signcryption and give secure constructions based on post-quantum public-key primitives.  ...  The key (or keys) for Π Hyb [Π, Σ] are the same as for Π. To encrypt , we generate a fresh key k for Σ and encrypt with k.  ... 
arXiv:1811.11858v4 fatcat:7kv3je7emvbhzcck6hhpanvawq

An Introduction to Data Encryption and Future Trends in Lightweight Cryptography and Securing IoT Environments

Sikha Bagui, Raffaele Galliera
2022 Transactions on Machine Learning and Artificial Intelligence  
Less traditional arguments are also shown, from the relevance of Key Management Services with its usage in Envelope Encryption, to Zero Knowledge proofs and their innovative applications.  ...  This paper presents an overview of the basic concepts of cryptography and encryption.  ...  For example, in digital signatures, data is often attached with a hashed version and encrypted with the sender's private key.  ... 
doi:10.14738/tmlai.102.11939 fatcat:5hdl6mf35jdqjjknol2cxsgddq

A Secure Multiparty Quantum Homomorphic Encryption Scheme

Jing-Wen Zhang, Xiu-Bo Chen, Gang Xu, Heng-Ji Li, Ya-Lan Wang, Li-Hua Miao, Yi-Xian Yang
2022 Computers Materials & Continua  
Firstly, each client obtains a secure encryption key through the measurement device independent quantum key distribution protocol and encrypts the private data by using the encryption operator and key.  ...  Finally, a concrete security analysis shows that the proposed multiparty quantum homomorphic encryption scheme can securely resist outside and inside attacks.  ...  The trusted key center, Charlie, introduced in our scheme, is responsible for cooperating with each client to realize the secure distribution of the encryption key, and updating the correct decryption  ... 
doi:10.32604/cmc.2022.029125 fatcat:dgl7zyd74nbkzo2dwv564ixeti

Quantum cryptography [article]

Dag Roar Hjelme, Lars Lydersen, Vadim Makarov
2011 arXiv   pre-print
This is a chapter on quantum cryptography for the book "A Multidisciplinary Introduction to Information Security" to be published by CRC Press in 2011/2012.  ...  Further Reading and Web Sites The web site http://www.iet.ntnu.no/groups/optics/qcr/ of our Quantum Hacking group presents how industrial implementations of the quantum key distribution system can be broken  ...  The web site http://pqcrypto.org/ investigates what will happen to cryptology when the first working quantum computer has been built.  ... 
arXiv:1108.1718v1 fatcat:qtmiplhnujcxzcvohi3vims3am

Lattice-Based Searchable Encryption Scheme Against Inside Keywords Guessing Attack

Xiaoling Yu, Chungen Xu, Lei Xu, Yuntao Wang
2020 Computers Materials & Continua  
Since encryption can reduce the data availability, public-key encryption with keyword search (PEKS) is developed to achieve the retrieval of the encrypted data without decrypting them.  ...  To resist inside KGA, this scheme adopts a lattice-based signature technique into the encryption of keywords to prevent the malicious server from forging a valid ciphertext.  ...  Compared with symmetric SE, the application of PEKS is more flexible, where more than one data owners can share their data with the data user.  ... 
doi:10.32604/cmc.2020.09680 fatcat:eu67qkhsyrgybnz6ybpc7sqqdi

From Quantum Cheating to Quantum Security

Daniel Gottesman, Hoi‐Kwong Lo
2000 Physics today  
For thousands of years, code-makers and code-breakers have been competing for supremacy. Their arsenals may soon include a powerful new weapon: quantum mechanics.  ...  We give an overview of quantum cryptology as of November 2000.  ...  a cryptographic system with the same private key for both encryption and decryption. show that when Alice and Bob hold a pure state, quantum bit commitment is impossible.  ... 
doi:10.1063/1.1333282 fatcat:kjcxbbgzizaqjdkvip6zga4p3a

Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks

Tiago M. Fernandez-Carames, Paula Fraga-Lamas
2020 IEEE Access  
Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in the last years and their use has been suggested for numerous applications due to their ability to provide transparency  ...  Furthermore, extensive comparisons are provided on the characteristics and performance of the most promising post-quantum public-key encryption and digital signature schemes for blockchains.  ...  For instance, a lattice-based blind signature scheme is detailed in [173] , which was specifically conceived for providing user anonymity and untraceability in distributed blockchain-based applications  ... 
doi:10.1109/access.2020.2968985 fatcat:7wsxhxrfojdmzcxtjtrk6cmcci

The Odyssey of Entropy: Cryptography

Behrouz Zolfaghari, Khodakhast Bibak, Takeshi Koshiba
2022 Entropy  
Moreover, we study existing trends, and establish a roadmap for future research in these areas.  ...  After being introduced by Shannon as a measure of disorder and unavailable information, the notion of entropy has found its applications in a broad range of scientific disciplines.  ...  Acknowledgments: The authors would like to thank the referees for carefully reading the paper, and for their useful comments which helped improve the paper.  ... 
doi:10.3390/e24020266 pmid:35205560 pmcid:PMC8870987 fatcat:2vp2bbr4abc2ngsphrybwhfvwu

Impossibility of Quantum Virtual Black-Box Obfuscation of Classical Circuits [article]

Gorjan Alagic, Zvika Brakerski, Yfke Dulek, Christian Schaffner
2020 arXiv   pre-print
We show that, under the assumption that learning-with-errors (LWE) is hard for quantum computers, this quantum variant of virtual black-box obfuscation of classical circuits is generally impossible.  ...  Virtual black-box obfuscation is a strong cryptographic primitive: it encrypts a circuit while maintaining its full input/output functionality. A remarkable result by Barak et al.  ...  Acknowledgements We thank Andrea Coladangelo, Urmila Mahadev and Alexander Poremba for useful discussions.  ... 
arXiv:2005.06432v2 fatcat:scvlp67pe5en5p74ljvovrw7ru

Signcryption in a Quantum World [article]

Sanjit Chatterjee, Tapas Pandit, Shravan Kumar Parshuram Puria, Akash Shah
2020 IACR Cryptology ePrint Archive  
For doing that we define the confidentiality and authenticity of signcryption for classical data both in insider and outsider models against quantum adversaries.  ...  In the insider model, we show that the quantum variants of the classical results hold in the quantum setting.  ...  Christian Majenz for his comments on the earlier version of this report which helped us in polishing our work.  ... 
dblp:journals/iacr/ChatterjeePPS20 fatcat:35axnlejenbdlebox737yfmalq

Integrated Quantum and Classical Key Scheme for Two Servers Password Authentication

Krishnan
2010 Journal of Computer Science  
Further the proposal applied quantum key distribution model along with classical key exchange in the two server authentication.  ...  Three-party Quantum key distribution used in this model, one with implicit user authentication and other with explicit mutual authentication, deployed for ecommerce buyer authentication in internet peer  ...  During the session key distribution, the pre-shared secret key together with a random string are used to produce another key encryption key to encipher the session key.  ... 
doi:10.3844/jcssp.2010.1396.1405 fatcat:c4xk55sv4zhmjna5tgm6er4yva

Using quantum key distribution for cryptographic purposes: a survey [article]

Romain Alléaume, Cyril Branciard, Jan Bouda, Thierry Debuisschert, Mehrdad Dianati, Nicolas Gisin, Mark Godfrey, Philippe Grangier, Thomas Langer, Norbert Lutkenhaus, Christian Monyk, Philippe Painchault, Momtchil Peev (+9 others)
2014 arXiv   pre-print
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys.  ...  As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications  ...  A also acknowledges enlightning discussions with Sylvain Guilley, Philippe Hoogsvorst and Jean-Luc Danger about side-channel attacks on cryptographic hardware.  ... 
arXiv:quant-ph/0701168v3 fatcat:j3wuwqjuarav3ft6chdvdsaw5a
« Previous Showing results 1 — 15 out of 2,329 results