A review of quantum key distribution protocols in the perspective of smart grid communication security
PY Kong - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
Smart grid depends on an advanced communication network to collect information from the
power grid, and to disseminate control commands to the control devices. To safeguard the …
power grid, and to disseminate control commands to the control devices. To safeguard the …
Experimental quantum e-commerce
E-commerce, a type of trading that occurs at a high frequency on the internet, requires
guaranteeing the integrity, authentication, and nonrepudiation of messages through long …
guaranteeing the integrity, authentication, and nonrepudiation of messages through long …
One-time universal hashing quantum digital signatures without perfect keys
Quantum digital signatures (QDSs), generating correlated bit strings among three remote
parties for signatures through quantum law, can guarantee nonrepudiation, authenticity, and …
parties for signatures through quantum law, can guarantee nonrepudiation, authenticity, and …
Efficient quantum digital signatures without symmetrization step
Quantum digital signatures (QDS) exploit quantum laws to guarantee non-repudiation,
unforgeability and transferability of messages with information-theoretic security. Current …
unforgeability and transferability of messages with information-theoretic security. Current …
Optimizing Decoy‐State Protocols for Practical Quantum Key Distribution Systems
GJ Fan‐Yuan, ZH Wang, S Wang… - Advanced Quantum …, 2021 - Wiley Online Library
The decoy‐state protocol enables quantum key distribution (QKD) systems to achieve high
performance without using the single‐photon source. In the dozen years since the decoy …
performance without using the single‐photon source. In the dozen years since the decoy …
Quantum public-key designated verifier signature
X Xin, L Ding, C Li, Y Sang, Q Yang, F Li - Quantum Information …, 2022 - Springer
Based on the single-qubit rotations, a quantum public-key designated verifier signature
(DVS) is proposed. In this scheme, a rotation vector is employed as the signatory's secret …
(DVS) is proposed. In this scheme, a rotation vector is employed as the signatory's secret …
Quantum digital signatures with random pairing
Digital signatures can guarantee the unforgeability and transferability of the message.
Differently from classical digital signatures, whose security depends on computational …
Differently from classical digital signatures, whose security depends on computational …
Implementation of machine learning in quantum key distributions
In the future massive applications of quantum communication network, it is crucial to realize
real-time selection of the optimal quantum key distributions (QKD) protocol for the …
real-time selection of the optimal quantum key distributions (QKD) protocol for the …
Optimization of the multivariate polynomial public key for quantum safe digital signature
R Kuang, M Perepechaenko - Scientific Reports, 2023 - nature.com
Abstract Kuang, Perepechaenko, and Barbeau recently proposed a novel quantum-safe
digital signature algorithm called Multivariate Polynomial Public Key or MPPK/DS. The key …
digital signature algorithm called Multivariate Polynomial Public Key or MPPK/DS. The key …
Secure and practical multiparty quantum digital signatures
Quantum digital signatures (QDSs) promise information-theoretic security against
repudiation and forgery of messages. Compared with currently existing three-party QDS …
repudiation and forgery of messages. Compared with currently existing three-party QDS …