Cargando…

An Attack on Zawadzki’s Quantum Authentication Scheme

Identification schemes are interactive cryptographic protocols typically involving two parties, a prover, who wants to provide evidence of their identity and a verifier, who checks the provided evidence and decides whether or not it comes from the intended prover. Given the growing interest in quant...

Descripción completa

Detalles Bibliográficos
Autores principales: González-Guillén, Carlos E., González Vasco, María Isabel, Johnson, Floyd, Pérez del Pozo, Ángel L.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8064377/
https://www.ncbi.nlm.nih.gov/pubmed/33805925
http://dx.doi.org/10.3390/e23040389