Quantum Computing in Data Security: A Critical Assessment

S Khan, C Jain, S Rathi, PK Maravi… - Quantum Computing …, 2023 - Wiley Online Library
In many fields, such as data search from large data repositories, prime factorization, number
theory, cybersecurity, polynomial evaluation, interpolation, machine learning, and artificial …

Quantum computing in data security: A critical assessment

P Nair, S Patil - Proceedings of the 3rd International Conference on …, 2020 - papers.ssrn.com
Inception of “quantum supremacy” officially announced by Google has given rise to future
threats to data security and privacy. One of the areas that we must focus on is the future …

Blind Digital Signature schemes with four particle entanglement states

S Babu, R Abdulhammed, K Elleithy… - 2017 IEEE Long Island …, 2017 - ieeexplore.ieee.org
Quantum Digital Signature (QDS) schemes provides authenticity of information that is
guaranteed by quantum mechanics. This paper compares the blind signature schemes with …

An digital signature method applied for distributed rending submit system

X Weihua, F Shuang - 2017 IEEE/ACIS 16th International …, 2017 - ieeexplore.ieee.org
In this paper, a digital signature method based on WEB is presented. Firstly, the normal old
system may exist in question of uploading forged user files, integrity and security and upload …

[PDF][PDF] Digital signatures

MNO Sadiku, SM Musa, M Tembley - Journal of Multidisciplinary …, 2016 - jmest.org
With the growing use of the Internet for business, healthcare, finance, education, and legal
transactions, there is a need for secured transactions and contractual agreements. The open …