Security in quantum cryptography

C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …

A survey on secure data analytics in edge computing

D Liu, Z Yan, W Ding… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is gaining increasing popularity. Overwhelming volumes of data are
generated by IoT devices. Those data after analytics provide significant information that …

SoK of used cryptography in blockchain

M Raikwar, D Gligoroski, K Kralevska - IEEE Access, 2019 - ieeexplore.ieee.org
The underlying fundaments of blockchain are cryptography and cryptographic concepts that
provide reliable and secure decentralized solutions. Although many recent papers study the …

Quantum cryptography beyond quantum key distribution

A Broadbent, C Schaffner - Designs, Codes and Cryptography, 2016 - Springer
Quantum cryptography is the art and science of exploiting quantum mechanical effects in
order to perform cryptographic tasks. While the most well-known example of this discipline is …

State-of-the-art survey of quantum cryptography

A Kumar, S Garhwal - Archives of Computational Methods in Engineering, 2021 - Springer
In today Internet era, confidential information transmitted over an insecure channel. With the
significant development in the area of quantum computing, there is a need for unconditional …

System and methods to compensate for Doppler effects in multi-user (MU) multiple antenna systems (MAS)

A Forenza, SG Perlman - US Patent 9,312,929, 2016 - Google Patents
H04B7/0615—Diversity systems; Multi-antenna system, ie transmission or reception using
multiple antennas using two or more spaced independent antennas at the transmitting …

System and methods for planned evolution and obsolescence of multiuser spectrum

SG Perlman, A Forenza - US Patent 10,425,134, 2019 - Google Patents
A system and method are described which enable planned evolution and obsolescence of
multiuser wireless spectrum. One embodiment of such a system includes one or multiple …

[PDF][PDF] Realization of {RF} distance bounding

KB Rasmussen, S Capkun - 19th USENIX Security Symposium (USENIX …, 2010 - usenix.org
One of the main obstacles for the wider deployment of radio (RF) distance bounding is the
lack of platforms that implement these protocols. We address this problem and we build a …

Position-based quantum cryptography: Impossibility and constructions

H Buhrman, N Chandran, S Fehr, R Gelles… - SIAM Journal on …, 2014 - SIAM
In this work, we study position-based cryptography in the quantum setting. The aim is to use
the geographical position of a party as its only credential. On the negative side, we show that …

A monogamy-of-entanglement game with applications to device-independent quantum cryptography

M Tomamichel, S Fehr, J Kaniewski… - New Journal of …, 2013 - iopscience.iop.org
We consider a game in which two separate laboratories collaborate to prepare a quantum
system and are then asked to guess the outcome of a measurement performed by a third …