The Internet Archive has a preservation copy of this work in our general collections.
The file type is
We introduce a related new primitive - quantum bit escrow. In this primitive Alice commits to a bit b to Bob. ... We develop techniques to prove quantitative statements about the binding and sealing properties of the quantum bit escrow protocol. ... (Bit Escrow) For an angle α ∈ [−π, π] define φα = cos(α)|0 + sin(α)|1 . ...arXiv:quant-ph/0004017v1 fatcat:zhpdtggyijgxpdwfxag5mjco2a
We introduce a related new primitive -quantum bit escrow. In this primitive Alice commits to a bit b to Bob. ... We develop techniques to prove quantitative statements about the binding and sealing properties of the quantum bit escrow protocol. ... Thus, our bit escrow protocol gives quadratic sealing. ...doi:10.1145/335305.335404 dblp:conf/stoc/AharonovTVY00 fatcat:34claovrdzhg5otijtsrheiuo4
International Journal of Advanced Multidisciplinary Scientific Research
Quantum Key Distribution It is the best known use of quantum cryptography. ... This can be accomplished when Alice encodes the bits previously sending it to the Bob. ...doi:10.31426/ijamsr.2018.1.5.517 fatcat:cdcgjfpfsva27kvoiqietwktba
This paper proposes a concrete scheme for quantum public-key cryptosystems: a quantum public-key encryp- tion scheme or quantum trapdoor one-way function. ... no quantum channels) are employed. ...
Let Ex, be the encryption function of a block cipher under a key K,, operating on n bit blocks. ... (English summary) Quantum information and computation. J. Phys. A 34 (2001), no. 35, 6957-6967. Summary: “Quantum key distribution is the best known appli- cation of quantum cryptography. ...
We also point out the difficulty in developing cheat-sensitive quantum bit commitment in terms of the uncomposability of a QCF. ... We show that a biased quantum coin flip (QCF) cannot provide the performance of a black-boxed biased coin flip, if it satisfies some fidelity conditions. ... As mentioned before, the situation considered in this paper is analogous to quantum bit escrow  (it is in fact regarded as its entanglement version). ...doi:10.1103/physrevlett.100.070501 pmid:18352530 fatcat:zuiqiamet5gh7lc4cngpkkjsoa
We simulate the environment for mobile networks with the proposed algorithm named Enhanced Key Escrow Based ECC (KEYBECC) with comparison of the traditional algorithms prevailing for MANETs. ... Here the model of scheme is to divide a large group into several subgroups, each maintaining its subgroup secret keys to control the subgroup and managing many subgroups using KEY escrow Based Elliptic ... Basically all recent activity in quantum cryptography is in quantum key exchange (QKE) in the network  . The algorithm use photons to create a shared bit string between two nodes in the network. ...doi:10.34218/ijaret.11.1.2020.014 fatcat:sjhkewzl25ex5cdh7vhaovkkoa
By 2001, key escrow was virtually abandoned  . The SKIPJACK algorithm was made public in 1998. At that time, it was considered to be a strong 80 bit key algorithm. ... Given that SKIPJACK used an 80 bit key, was the 56 bit key used by the DES still providing adequate security? ...doi:10.6028/jres.126.024 fatcat:mco3pr5pabenpjs5tic3lfd7au
However, blockchain faces the problem of data privacy leakage during the application process, and the rapid development of quantum computing also brings the threat of quantum attack to blockchain. ... key based on certificateless scheme, which is composed of the private key together with the secret value selected by the user, thus effectively avoiding the problems of certificate management and key escrow ... In addition, the algorithm can solve the key escrow and certificate management problems effectively based on the certificateless system. (2) Based on the LCFHE algorithm, we propose a post-quantum blockchain ...doi:10.32604/jcs.2022.027693 fatcat:zkkuve67vbhjvfmzq7qaz7tilm
MPKC-CLBMSS not only solves the problem of quantum computing attacks, but also avoids the key escrow issue in IB-PKC along with the certificate management problem in traditional PKI. ... Thus, broadcast multisignature schemes will suffer from the potential threat of the quantum computing attacks. ... MPKC-CLBMSS can resist quantum computing attacks and solve the key escrow issue together with certificate management problem. ...doi:10.1109/access.2020.2965978 fatcat:go5mho6ck5gpziapxbkmfeans4
We give an example of an unconditionally secure cheat sensitive non-relativistic bit commitment protocol which uses quantum information to implement a task which is classically impossible; we also describe ...  , who define and implement a related weaker cryptographic task, quantum bit escrow. ... We distinguish quantum protocols, which allow the exchange of quantum information, from classical protocols, which do not. ...doi:10.1103/physrevlett.92.157901 pmid:15169319 fatcat:zq27dulcgrdrnifakzknmdwcmq
The proposed work also eliminates key escrow and key exposure problems. The files are encrypted and decrypted using Rivest-Shamir-Adleman (RSA) algorithm. ... Yuqi Wang and Kun She  A Practical Quantum Public-key Encryption Model, the paper proposes a down to earth quantum open key encryption show. ... In the meantime, the quantity of duplicates of the quantum open key distributed by the PKDC is constrained. ...doi:10.35940/ijeat.e1049.0785s319 fatcat:r2yck2o5wffg7inkmms2p4zoli
Lecture Notes in Computer Science
We propose a public key infrastructure framework, inspired by modern distributed cryptocurrencies, that allows for tunable key escrow, where the availability of key escrow is only provided under strict ... We argue that any key escrow scheme designed for the global scale must be both inert -requiring considerable effort to recover a key -and publiceverybody should be aware of all key recovery attempts. ... Utilising quantum resistant public key schemes may be necessary for long term use. ...doi:10.1007/978-3-319-61273-7_6 fatcat:xri5k6db7jcgvn5ddxarb4yc6a
Lecture Notes in Computer Science
Post-quantum cryptography has attracted increased attention in the last couple of years, due to the threat of quantum computers breaking current cryptosystems. ... In particular, the key size and performance of post-quantum algorithms became a significant target for optimization. ... post-quantum security. ...doi:10.1007/978-3-319-47560-8_12 fatcat:ouvydjyguvehlefiv74jr5djdq
Hence, t is not free from Key Escrow. A secure channel of transmission is required between sender/receiver and the IBE server. IBE solutions aren't immune against code breaking Quantum computer attacks ... The drawback of this system was that, the identities were seen as bit strings. As a result, bilinear maps were required for every bit in the identity. ...doi:10.17148/ijarcce.2017.6163 fatcat:nax4qzuo2nf3xlg3rdni3cocjm
« Previous Showing results 1 — 15 out of 267 results