Verifiable multi-dimensional (t, n) threshold quantum secret sharing based on quantum walk

Y Wang, X Lou, Z Fan, S Wang, G Huang - International Journal of …, 2022 - Springer
The latest verifiable threshold quantum state sharing schemes have advantages over
efficiency and security, since the secret message can be expanded to multiple dimension …

Quantum physical unclonable functions: Possibilities and impossibilities

M Arapinis, M Delavar, M Doosti, E Kashefi - Quantum, 2021 - quantum-journal.org
Abstract A Physical Unclonable Function (PUF) is a device with unique behaviour that is
hard to clone hence providing a secure fingerprint. A variety of PUF structures and PUF …

Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions

S Chowdhury, A Covic, RY Acharya, S Dupee… - Journal of Cryptographic …, 2021 - Springer
Over the past decades, quantum technology has seen consistent progress, with notable
recent developments in the field of quantum computers. Traditionally, this trend has been …

Cryptographic one-way function based on boson sampling

GM Nikolopoulos - Quantum Information Processing, 2019 - Springer
The quest for practical cryptographic primitives that are robust against quantum computers is
of vital importance for the field of cryptography. Among the abundance of different …

Theoretical framework for physical unclonable functions, including quantum readout

G Gianfelici, H Kampermann, D Bruß - Physical Review A, 2020 - APS
We propose a theoretical framework to quantitatively describe physical unclonable functions
(PUFs), including extensions to quantum protocols, so-called quantum readout PUFs (QR …

A semi-quantum authentication protocol for message and identity

XJ Wen, XQ Zhao, LH Gong, NR Zhou - Laser Physics Letters, 2019 - iopscience.iop.org
A semi-quantum authentication protocol based on a GHZ-like state and W state is proposed
to determine the identities of two participants and to ensure the credibility of the important …

Client-server identification protocols with quantum puf

M Doosti, N Kumar, M Delavar, E Kashefi - ACM Transactions on …, 2021 - dl.acm.org
Recently, major progress has been made towards the realisation of quantum internet to
enable a broad range of classically intractable applications. These applications such as …

Semi-quantum bi-signature scheme based on W states

XQ Zhao, HY Chen, YQ Wang, NR Zhou - International Journal of …, 2019 - Springer
A semi-quantum bi-signature scheme based on W states is designed, in which two signers
sign the same message. The unconditional security of the new semi-quantum bi-signature …

Quantum cryptography beyond key distribution: theory and experiment

M Bozzio, C Crépeau, P Wallden, P Walther - arXiv preprint arXiv …, 2024 - arxiv.org
Due to its fundamental principles, quantum theory holds the promise to enhance the security
of modern cryptography, from message encryption to anonymous communication, digital …

Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions

S Chowdhury, A Covic, RY Acharya, S Dupee… - arXiv preprint arXiv …, 2020 - arxiv.org
Over the past decades, quantum technology has seen consistent progress, with notable
recent developments in the field of quantum computers. Traditionally, this trend has been …