Cargando…
An Attack on Zawadzki’s Quantum Authentication Scheme
Identification schemes are interactive cryptographic protocols typically involving two parties, a prover, who wants to provide evidence of their identity and a verifier, who checks the provided evidence and decides whether or not it comes from the intended prover. Given the growing interest in quant...
Autores principales: | González-Guillén, Carlos E., González Vasco, María Isabel, Johnson, Floyd, Pérez del Pozo, Ángel L. |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8064377/ https://www.ncbi.nlm.nih.gov/pubmed/33805925 http://dx.doi.org/10.3390/e23040389 |
Ejemplares similares
-
Experimentally attacking quantum money schemes based on quantum retrieval games
por: Jiráková, Kateřina, et al.
Publicado: (2019) -
Quantum Attack-Resistent Certificateless Multi-Receiver Signcryption Scheme
por: Li, Huixian, et al.
Publicado: (2013) -
Continuous Authentication against Collusion Attacks †
por: Lyu, Pin, et al.
Publicado: (2022) -
Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks
por: Asghar, Iqra, et al.
Publicado: (2023) -
Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes
por: Li, Fengyin, et al.
Publicado: (2023)