Cryptanalysis of the arbitrated quantum signature protocols

F Gao, SJ Qin, FZ Guo, QY Wen - Physical Review A—Atomic, Molecular, and …, 2011 - APS
As a new model for signing quantum messages, arbitrated quantum signature (AQS) has
recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS …

[PDF][PDF] Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm.

K Sudharson, S Arun - Intelligent Automation & Soft Computing, 2022 - cdn.techscience.cn
Quantum Computing (QC). The content of node or sink nodes is processed using the
fundamental principles of quantum mechanics. However, cryptography techniques face …

Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party

WW Zhang, KJ Zhang - Quantum information processing, 2013 - Springer
Recently, a quantum private comparison (QPC) protocol with a dishonest third party
(TP)(Yang et al. in Quantum Inf Process, 2012. doi: 10.1007/s11128-012-0433-4) was …

Efficient quantum private comparison employing single photons and collective detection

B Liu, F Gao, H Jia, W Huang, W Zhang… - Quantum information …, 2013 - Springer
Two efficient quantum private comparison (QPC) protocols are proposed, employing single
photons and collective detection. In the proposed protocols, two distrustful parties (Alice and …

Modeling and simulation of a novel secure quantum key distribution (SQKD) for ensuring data security in cloud environment

S Sasikumar, K Sundar, C Jayakumar… - … Modelling Practice and …, 2022 - Elsevier
In recent days, providing data security over cloud is a complicated process. There are many
research works that are developed for authentication based data security over cloud, using …

Improving the security of arbitrated quantum signature against the forgery attack

KJ Zhang, WW Zhang, D Li - Quantum information processing, 2013 - Springer
As a feasible model for signing quantum messages, some cryptanalysis and improvement of
arbitrated quantum signature (AQS) have received a great deal of attentions in recent years …

A novel multi-qubit quantum key distribution Ciphertext-policy attribute-based encryption model to improve cloud security for consumers

KK Singamaneni, G Muhammad… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the growing adoption of cloud computing, ensuring data security in cloud environments
has become a critical concern for business organizations. Quantum cryptography utilizes the …

Improved multiparty quantum key agreement in travelling mode

W Huang, Q Su, BJ Xu, B Liu, F Fan, HY Jia… - … Physics, Mechanics & …, 2016 - Springer
The need to simultaneously balance security and fairness in quantum key agreement (QKA)
makes it challenging to design a flawless QKA protocol, especially a multiparty quantum key …

Programmable quantum networked microgrids

Z Tang, P Zhang, WO Krawec… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Quantum key distribution (QKD) provides a potent solution to securely distribute keys for two
parties. However, QKD itself is vulnerable to denial of service (DoS) attacks. A flexible and …

An inter-bank E-payment protocol based on quantum proxy blind signature

X Wen, Y Chen, J Fang - Quantum information processing, 2013 - Springer
Security and anonymity are essential to E-payment systems. However, with the increasing
computing power, existing E-payment systems will gradually become insecure. In this paper …