Cargando…
An Attack on Zawadzki’s Quantum Authentication Scheme
Identification schemes are interactive cryptographic protocols typically involving two parties, a prover, who wants to provide evidence of their identity and a verifier, who checks the provided evidence and decides whether or not it comes from the intended prover. Given the growing interest in quant...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8064377/ https://www.ncbi.nlm.nih.gov/pubmed/33805925 http://dx.doi.org/10.3390/e23040389 |