Filters








267 Hits in 1.7 sec

Quantum Bit Escrow [article]

Dorit Aharonov, Amnon Ta-Shma, Umesh Vazirani, Andrew Yao
2000 arXiv   pre-print
We introduce a related new primitive - quantum bit escrow. In this primitive Alice commits to a bit b to Bob.  ...  We develop techniques to prove quantitative statements about the binding and sealing properties of the quantum bit escrow protocol.  ...  (Bit Escrow) For an angle α ∈ [−π, π] define φα = cos(α)|0 + sin(α)|1 .  ... 
arXiv:quant-ph/0004017v1 fatcat:zhpdtggyijgxpdwfxag5mjco2a

Quantum bit escrow

Dorit Aharonov, Amnon Ta-Shma, Umesh V. Vazirani, Andrew C. Yao
2000 Proceedings of the thirty-second annual ACM symposium on Theory of computing - STOC '00  
We introduce a related new primitive -quantum bit escrow. In this primitive Alice commits to a bit b to Bob.  ...  We develop techniques to prove quantitative statements about the binding and sealing properties of the quantum bit escrow protocol.  ...  Thus, our bit escrow protocol gives quadratic sealing.  ... 
doi:10.1145/335305.335404 dblp:conf/stoc/AharonovTVY00 fatcat:34claovrdzhg5otijtsrheiuo4

Evaluation And Categorization Of Cryptography

Saragadam Sushma
2018 International Journal of Advanced Multidisciplinary Scientific Research  
Quantum Key Distribution It is the best known use of quantum cryptography.  ...  This can be accomplished when Alice encodes the bits previously sending it to the Bob.  ... 
doi:10.31426/ijamsr.2018.1.5.517 fatcat:cdcgjfpfsva27kvoiqietwktba

Page 7006 of Mathematical Reviews Vol. , Issue 2002I [page]

2002 Mathematical Reviews  
This paper proposes a concrete scheme for quantum public-key cryptosystems: a quantum public-key encryp- tion scheme or quantum trapdoor one-way function.  ...  no quantum channels) are employed.  ... 

Page 7756 of Mathematical Reviews Vol. , Issue 2002J [page]

2002 Mathematical Reviews  
Let Ex, be the encryption function of a block cipher under a key K,, operating on n bit blocks.  ...  (English summary) Quantum information and computation. J. Phys. A 34 (2001), no. 35, 6957-6967. Summary: “Quantum key distribution is the best known appli- cation of quantum cryptography.  ... 

Dilemma that Cannot Be Resolved by Biased Quantum Coin Flipping

Satoshi Ishizaka
2008 Physical Review Letters  
We also point out the difficulty in developing cheat-sensitive quantum bit commitment in terms of the uncomposability of a QCF.  ...  We show that a biased quantum coin flip (QCF) cannot provide the performance of a black-boxed biased coin flip, if it satisfies some fidelity conditions.  ...  As mentioned before, the situation considered in this paper is analogous to quantum bit escrow [8] (it is in fact regarded as its entanglement version).  ... 
doi:10.1103/physrevlett.100.070501 pmid:18352530 fatcat:zuiqiamet5gh7lc4cngpkkjsoa

DYNAMIC KEY DISTRIBUTION MANAGEMENT USING KEY ESCROW BASED ECC ALGORITHM IN MANETS

B. VANATHY, M. RAMAKRISHNAN
2020 INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING & TECHNOLOGY  
We simulate the environment for mobile networks with the proposed algorithm named Enhanced Key Escrow Based ECC (KEYBECC) with comparison of the traditional algorithms prevailing for MANETs.  ...  Here the model of scheme is to divide a large group into several subgroups, each maintaining its subgroup secret keys to control the subgroup and managing many subgroups using KEY escrow Based Elliptic  ...  Basically all recent activity in quantum cryptography is in quantum key exchange (QKE) in the network [6] . The algorithm use photons to create a shared bit string between two nodes in the network.  ... 
doi:10.34218/ijaret.11.1.2020.014 fatcat:sjhkewzl25ex5cdh7vhaovkkoa

Development of the Advanced Encryption Standard

Miles E. Smid
2021 Journal of Research of the National Institute of Standards and Technology  
By 2001, key escrow was virtually abandoned [15] . The SKIPJACK algorithm was made public in 1998. At that time, it was considered to be a strong 80 bit key algorithm.  ...  Given that SKIPJACK used an 80 bit key, was the 56 bit key used by the DES still providing adequate security?  ... 
doi:10.6028/jres.126.024 fatcat:mco3pr5pabenpjs5tic3lfd7au

A Certificateless Homomorphic Encryption Scheme for Protecting Transaction Data Privacy of Post-Quantum Blockchain

Meng-Wei Zhang, Xiu-Bo Chen, Haseeb Ahmad, Gang Xu, Yi-Xian Yang
2022 Journal of Cyber Security  
However, blockchain faces the problem of data privacy leakage during the application process, and the rapid development of quantum computing also brings the threat of quantum attack to blockchain.  ...  key based on certificateless scheme, which is composed of the private key together with the secret value selected by the user, thus effectively avoiding the problems of certificate management and key escrow  ...  In addition, the algorithm can solve the key escrow and certificate management problems effectively based on the certificateless system. (2) Based on the LCFHE algorithm, we propose a post-quantum blockchain  ... 
doi:10.32604/jcs.2022.027693 fatcat:zkkuve67vbhjvfmzq7qaz7tilm

Certificateless Broadcast Multisignature Scheme Based on MPKC

Huifang Yu, Shuaifeng Fu, Yixian Liu, Shuai Zhang
2020 IEEE Access  
MPKC-CLBMSS not only solves the problem of quantum computing attacks, but also avoids the key escrow issue in IB-PKC along with the certificate management problem in traditional PKI.  ...  Thus, broadcast multisignature schemes will suffer from the potential threat of the quantum computing attacks.  ...  MPKC-CLBMSS can resist quantum computing attacks and solve the key escrow issue together with certificate management problem.  ... 
doi:10.1109/access.2020.2965978 fatcat:go5mho6ck5gpziapxbkmfeans4

Cheat Sensitive Quantum Bit Commitment

Lucien Hardy, Adrian Kent
2004 Physical Review Letters  
We give an example of an unconditionally secure cheat sensitive non-relativistic bit commitment protocol which uses quantum information to implement a task which is classically impossible; we also describe  ...  [16] , who define and implement a related weaker cryptographic task, quantum bit escrow.  ...  We distinguish quantum protocols, which allow the exchange of quantum information, from classical protocols, which do not.  ... 
doi:10.1103/physrevlett.92.157901 pmid:15169319 fatcat:zq27dulcgrdrnifakzknmdwcmq

Secure Collaborative Key Management System for Mobile Cloud Data Storage

2019 International Journal of Engineering and Advanced Technology  
The proposed work also eliminates key escrow and key exposure problems. The files are encrypted and decrypted using Rivest-Shamir-Adleman (RSA) algorithm.  ...  Yuqi Wang and Kun She [7] A Practical Quantum Public-key Encryption Model, the paper proposes a down to earth quantum open key encryption show.  ...  In the meantime, the quantity of duplicates of the quantum open key distributed by the PKDC is constrained.  ... 
doi:10.35940/ijeat.e1049.0785s319 fatcat:r2yck2o5wffg7inkmms2p4zoli

Key Recovery: Inert and Public [chapter]

Colin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines
2017 Lecture Notes in Computer Science  
We propose a public key infrastructure framework, inspired by modern distributed cryptocurrencies, that allows for tunable key escrow, where the availability of key escrow is only provided under strict  ...  We argue that any key escrow scheme designed for the global scale must be both inert -requiring considerable effort to recover a key -and publiceverybody should be aware of all key recovery attempts.  ...  Utilising quantum resistant public key schemes may be necessary for long term use.  ... 
doi:10.1007/978-3-319-61273-7_6 fatcat:xri5k6db7jcgvn5ddxarb4yc6a

Speeding up R-LWE Post-quantum Key Exchange [chapter]

Shay Gueron, Fabian Schlieker
2016 Lecture Notes in Computer Science  
Post-quantum cryptography has attracted increased attention in the last couple of years, due to the threat of quantum computers breaking current cryptosystems.  ...  In particular, the key size and performance of post-quantum algorithms became a significant target for optimization.  ...  post-quantum security.  ... 
doi:10.1007/978-3-319-47560-8_12 fatcat:ouvydjyguvehlefiv74jr5djdq

A Survey of the Various Identity-based Encryption Techniques in Wireless Sensor Networks

Shrishty Gautam, Charu Wahi, Seema Sharma
2017 IJARCCE  
Hence, t is not free from Key Escrow.  A secure channel of transmission is required between sender/receiver and the IBE server.  IBE solutions aren't immune against code breaking Quantum computer attacks  ...  The drawback of this system was that, the identities were seen as bit strings. As a result, bilinear maps were required for every bit in the identity.  ... 
doi:10.17148/ijarcce.2017.6163 fatcat:nax4qzuo2nf3xlg3rdni3cocjm
« Previous Showing results 1 — 15 out of 267 results