Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (11)
  • Open Access

    ARTICLE

    NTRU_ SSS: Anew Method Signcryption Post Quantum Cryptography Based on Shamir’s Secret Sharing

    Asma Ibrahim Hussein1,*, Abeer Tariq MaoLood2, Ekhlas Khalaf Gbashi2

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 753-769, 2023, DOI:10.32604/cmc.2023.039804

    Abstract With the advent of quantum computing, numerous efforts have been made to standardize post-quantum cryptosystems with the intention of (eventually) replacing Elliptic Curve Cryptography (ECC) and Rivets-Shamir-Adelman (RSA). A modified version of the traditional N-Th Degree Truncated Polynomial Ring (NTRU) cryptosystem called NTRU Prime has been developed to reduce the attack surface. In this paper, the Signcryption scheme was proposed, and it is most efficient than others since it reduces the complexity and runs the time of the code execution, and at the same time, provides a better security degree since it ensures the integrity of the sent message, confidentiality… More >

  • Open Access

    ARTICLE

    Blockchain Privacy Protection Based on Post Quantum Threshold Algorithm

    Faguo Wu1,2,3,4,*, Bo Zhou2, Jie Jiang5, Tianyu Lei1, Jiale Song1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 957-973, 2023, DOI:10.32604/cmc.2023.038771

    Abstract With the rapid increase in demand for data trustworthiness and data security, distributed data storage technology represented by blockchain has received unprecedented attention. These technologies have been suggested for various uses because of their remarkable ability to offer decentralization, high autonomy, full process traceability, and tamper resistance. Blockchain enables the exchange of information and value in an untrusted environment. There has been a significant increase in attention to the confidentiality and privacy preservation of blockchain technology. Ensuring data privacy is a critical concern in cryptography, and one of the most important protocols used to achieve this is the secret-sharing method.… More >

  • Open Access

    ARTICLE

    Quantum Oblivious Transfer with Reusable Bell State

    Shu-Yu Kuo1, Kuo-Chun Tseng2, Yao-Hsin Chou3, Fan-Hsun Tseng4,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 915-932, 2023, DOI:10.32604/cmc.2023.032320

    Abstract In cryptography, oblivious transfer (OT) is an important multi-party cryptographic primitive and protocol, that is suitable for many upper-layer applications, such as secure computation, remote coin-flipping, electrical contract signing and exchanging secrets simultaneously. However, some no-go theorems have been established, indicating that one-out-of-two quantum oblivious transfer (QOT) protocols with unconditional security are impossible. Fortunately, some one-out-of-two QOT protocols using the concept of Crépeau’s reduction have been demonstrated not to conform to Lo’s no-go theorem, but these protocols require more quantum resources to generate classical keys using all-or-nothing QOT to construct one-out-of-two QOT. This paper proposes a novel and efficient one-out-of-two… More >

  • Open Access

    ARTICLE

    Code-based Sequential Aggregate Signature Scheme

    Bennian Dou1,*, Lei Xu1, Xiaoling Yu2, Lin Mei1, Cong Zuo3

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5219-5231, 2022, DOI:10.32604/cmc.2022.030270

    Abstract This paper proposes the first code-based quantum immune sequential aggregate signature (SAS) scheme and proves the security of the proposed scheme in the random oracle model. Aggregate signature (AS) schemes and sequential aggregate signature schemes allow a group of potential signers to sign different messages respectively, and all the signatures of those users on those messages can be aggregated into a single signature such that the size of the aggregate signature is much smaller than the total size of all individual signatures. Because of the aggregation of many signatures into a single short signature, AS and SAS schemes can reduce… More >

  • Open Access

    ARTICLE

    Improved Multi-party Quantum Key Agreement with Four-qubit Cluster States

    Hussein Abulkasim1,*, Eatedal Alabdulkreem2, Safwat Hamad3

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 225-232, 2022, DOI:10.32604/cmc.2022.025727

    Abstract Quantum key agreement is a promising key establishing protocol that can play a significant role in securing 5G/6G communication networks. Recently, Liu et al. (Quantum Information Processing 18(8):1-10, 2019) proposed a multi-party quantum key agreement protocol based on four-qubit cluster states was proposed. The aim of their protocol is to agree on a shared secret key among multiple remote participants. Liu et al. employed four-qubit cluster states to be the quantum resources and the X operation to securely share a secret key. In addition, Liu et al.'s protocol guarantees that each participant makes an equal contribution to the final key.… More >

  • Open Access

    ARTICLE

    Modeling and Verification of Aircraft Takeoff Through Novel Quantum Nets

    Maryam Jamal1, Nazir Ahmad Zafar2, Atta-ur-Rahman3,*, Dhiaa Musleh3, Mohammed A. Gollapalli4, Sghaier Chabani4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3331-3348, 2022, DOI:10.32604/cmc.2022.025205

    Abstract The formal modeling and verification of aircraft takeoff is a challenge because it is a complex safety-critical operation. The task of aircraft takeoff is distributed amongst various computer-based controllers, however, with the growing malicious threats a secure communication between aircraft and controllers becomes highly important. This research serves as a starting point for integration of BB84 quantum protocol with petri nets for secure modeling and verification of takeoff procedure. The integrated model combines the BB84 quantum cryptographic protocol with powerful verification tool support offered by petri nets. To model certain important properties of BB84, a new variant of petri nets… More >

  • Open Access

    ARTICLE

    Quantum Cryptography–A Theoretical Overview

    Pratik Roy*, Saptarshi Sahoo, Amit Kumar Mandal, Indranil Basu

    Journal of Quantum Computing, Vol.3, No.4, pp. 151-160, 2021, DOI:10.32604/jqc.2021.019864

    Abstract Quantum Key Distribution seems very promising as it offers unconditional security, that’s why it is being implemented by the tech giants of the networking industry and government. Having quantum phenomenon as a backbone, QKD protocols become indecipherable. Here we have focused on the complexities of quantum key distribution and how this technology has contributed to secure key communication. This article gives an updated overview of this technology and can serve as a guide to get familiar with the current trends of quantum cryptography. More >

  • Open Access

    ARTICLE

    Quantum Electronic Contract Scheme Based on Single Photon

    Tian Cao1, Yan Chang1, *, Lili Yan1, Shibin Zhang1, Qirun Wang2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1507-1517, 2020, DOI:10.32604/cmc.2020.010213

    Abstract An electronic contract is a contract signed by electronic means, which is widely used in electronic commerce activities. In recent years, with the rapid development of quantum cryptography technology, the quantum electronic contract has been widely studied by researchers. Supported by the basic principles of quantum mechanics, a quantum electronic contract scheme based on the single photon is proposed in this paper. In this scheme, two copies of the same contract are signed by both parties involved, and then a copy of each contract is sent to a trusted third party. The trusted third party verifies the signatures of both… More >

  • Open Access

    ARTICLE

    Privacy-Preserving Decision Protocols Based on Quantum Oblivious Key Distribution

    Kejia Zhang1, 2, 3, 4, Chunguang Ma5, Zhiwei Sun4, 6, *, Xue Zhang2, 3, Baomin Zhou2, Yukun Wang7

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1915-1928, 2020, DOI:10.32604/cmc.2020.09836

    Abstract Oblivious key transfer (OKT) is a fundamental problem in the field of secure multi-party computation. It makes the provider send a secret key sequence to the user obliviously, i.e., the user may only get almost one bit key in the sequence which is unknown to the provider. Recently, a number of works have sought to establish the corresponding quantum oblivious key transfer model and rename it as quantum oblivious key distribution (QOKD) from the well-known expression of quantum key distribution (QKD). In this paper, a new QOKD model is firstly proposed for the provider and user with limited quantum capabilities,… More >

  • Open Access

    ARTICLE

    A Controlled Quantum Dialogue Protocol Based on Quantum Walks

    Jinqiao Dai1, Shibin Zhang1, *, Yan Chang1, Xueyang Li1, Tao Zheng1, Jinyue Xia2

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1247-1260, 2020, DOI:10.32604/cmc.2020.010550

    Abstract In order to enable two parties to exchange their secret information equally, we propose a controlled quantum dialogue protocol based on quantum walks, which implements the equal exchange of secret information between the two parties with the help of the controller TP. The secret information is transmitted via quantum walks, by using this method, the previously required entangled particles do not need to be prepared in the initial phase, and the entangled particles can be produced spontaneously via quantum walks. Furthermore, to resist TP’s dishonest behavior, we use a hash function to verify the correctness of the secret information. The… More >

Displaying 1-10 on page 1 of 11. Per Page