Decoherence can help quantum cryptographic security.
Vishal SharmaShrikant UtagiR. SrikanthSubhashish BanerjeePublished in: Quantum Inf. Process. (2018)
Keyphrases
- security protocols
- key management
- security properties
- encryption scheme
- smart card
- random number generator
- fuzzy vault
- encryption key
- information security
- secure communication
- security issues
- security requirements
- encryption decryption
- elliptic curve cryptography
- public key cryptography
- cryptographic protocols
- high assurance
- security policies
- intrusion detection
- public key encryption
- access control
- quantum computation
- stream cipher
- security threats
- public key
- security mechanisms
- cryptographic algorithms
- information systems
- security analysis
- data security
- security model
- security services
- computer security
- encryption algorithms
- high security
- resource constrained
- digital signature
- hash functions
- homomorphic encryption
- ad hoc networks