156
Views
1
CrossRef citations to date
0
Altmetric
Research Article

Quantum cryptography and security analysis

&
Pages 2205-2216 | Received 01 Sep 2019, Published online: 15 Feb 2021

References

  • Zhou Tianqi, Shen Jian, Li Xiong, Wang Chen and Shen Jun, Quantum cryptography for the future internet and the security analysis, Security and Communication Networks, Hindawi, vol. 2018, (2018). https://doi.org/10.1155/2018/8214619.
  • Adrian D., Bhargavan K., Durumeric Z. and Zimmermann P. Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice, In the proceedings 22nd ACM Conference on Computer and Communications Security, (2015) http://doi.org/10.1145/2810103.2813707.
  • Kaplan M., Leurent G., Leverrier A. and Naya-Plasencia M. Quantum Differential and Linear Cryptanalysis, ArXiv preprint, (2015). http://arxiv.org/abs/1510.05836.
  • Winkler S. and Wullschleger J. On the efficiency of classical and quantum oblivious transfer reductions, Lecture Notes in Computer Science and Artificial Intelligence, vol.6223, pp. 707–723, (2010).
  • Goel Rajni, Moses Garuba and Anteneh Girma. Research directions in quantum cryptography, in fourth international conference on information technology: New Generations (ITNG 2007), Nevada, USA, (2007).
  • Bennett C.H.. Experimental quantum cryptography, Journal on Cryptography, vol. 5, pp. 3–28, (1992).
  • Chailloux A., Kerenidis I. and Sikora J., Lower bounds for quantum oblivious transfer, Quantum Information & Computation, vol. 13, no. 1-2, pp. 0158-0177, (2013).
  • Peev M.. The SECOQC quantum key distribution network in Vienna, New Journal of Physics, (2009).
  • Bennett C. H. and Brassard G. WITHDRAWN: Quantum cryptography: Public key distribution and coin tossing, Theoretical Computer Science, (2011).
  • Souto Balado Daniel, Linares Jesus and Prieto-Blanco Xesus. Phase auto-compensating high-dimensional quantum cryptography in elliptical-core few mode fibres, Journal of Modern Optics, vol. 66, issue 9, (2019).
  • Etaiwi Al Wael and Hraiz Safaa. Structured encryption algorithm for text cryptography, Journal of Discrete Mathematical Sciences and Cryptography, vol. 21, issue 7-8, (2018).
  • Gisin N. and Thew R. Quantum communication, Nature Photonics, vol. 1(3), pp. 159-165, (2007). doi: 10.1038/nphoton.2007.22
  • Guo Fuchun, Mu Yi and Chen Zhide. Multi-identity management for identity-based cryptography, Journal of Discrete Mathematical Sciences and Cryptography, vol. 11, issue 6, (2013).
  • Bennett C.H., Brassard G., Crepeau C. and Skubiszewska M.H. Practical Quantum oblivious transfer, in Annual Internation Cryptology Conference, pp. 351-366, Springer, (2016).
  • Brassard G and Crepeau C. Quantum bit commitment and coin tossing protocols, in proceedings of the conference on the Theory and Application of Cryptography, pp. 49-61, Springer, (2017).
  • Rass S. Secure Message Relay over Networks with QKD-Links, in the proceedings of 2nd international conference on Quantum, Nano and Micro Technologies, pp. 10-15, (2008).
  • Scarani Valerio and Kurtsiefer Christian. The black paper of quantum cryptography: Real implementation problems, Theoretical Computer Science, Elsevier, vol. 560, pp. 27-32, (2014). https://doi.org/10.1016/j.tcs.2014.09.015.
  • Lo H.K. and Zhao Y. Encyclopedia of complexity and systems sciences, Springer, U.S., vol. 8, pp. 7265-7289, (2009). doi: 10.1007/978-0-387-30440-3_432
  • Li P., Li J., Huang Z., Gao C.Z., Chen W.B. and Chen K. Privacy-preserving outsourced classification in cloud computing, Cluster Computing, pp. 1-10, (2017).
  • Shannon C.E. Communication theory of secrecy systems, The Bell System Technical Journal, pp. 656-715, (1949). doi: 10.1002/j.1538-7305.1949.tb00928.x
  • Shen J, Liu D., Shen J., Liu Q. and Sun X., A secure cloud-assisted urban data sharing framework for ubiquitous cities. Pervasive and Mobile Computing, vol. 41, pp. 219-230, (2017). doi: 10.1016/j.pmcj.2017.03.013
  • Shen J., Zhou T., He D., Zhang Y., Sun X. and Xiang Y. Block design-based key agreement for group data sharing in cloud computing, IEEE Transactions on Dependable and Secure Computing, no. 99, (2017).
  • Shen J., Zhou T., He D., Zhang Y., Sun X., and Xiang Y. Block design based key agreement for group data sharing in cloud computing, IEEE Transactions on Dependable and Secure Computing, no. 99, (2017).
  • Liu C., Yao Y., Sun Y., and Zhao X. Average capacity for heterodyne FSO communication systems over Gamma-Gamma turbulence channels with pointing errors, Electronics Letters, vol. 46, no. 12, pp. 851–853, (2010). doi: 10.1049/el.2010.0633
  • Alkholidi A.G. and Altowij K.S. Free Space optical communications – Theory and practices, Intech (2014).
  • Tianqi Zhou, Jian Shen, Xiong Li., Chen Wang and Jun Shen. Quantum Cryptography for the future internet and the security analysis, Journal of Security and Communication Networks, Wiley Hindawi, vol. 2018, pp. 260-267, (2018), https://doi.org/10.1155/2018/8214619.
  • Kumar Ankit. An improved quantum key distribution protocol for verification. Journal of Discrete Mathematical Sciences and Cryptography, 22.4, pp. 491-498, (2019). doi: 10.1080/09720529.2019.1637153
  • Khan, Tayyab, Karan Singh, Mohamed Abdel-Basset, Hoang Viet Long, Satya P. Singh, and Manisha Manjul. “A Novel and Comprehensive Trust Estimation Clustering-Based Approach for Large Scale Wireless Sensor Networks.” IEEE Access, vol. 7, pp. 58221-58240, (2019). doi: 10.1109/ACCESS.2019.2914769
  • Kalra, Manish, and Ramesh C. Poonia. “Design a new protocol for quantum key distribution.” Journal of Information and Optimization Sciences 38, no. 6 (2017): 1047-1054. doi: 10.1080/02522667.2017.1374723
  • Krishna, Addepalli VN. “A big–data security mechanism based on fully homomorphic encryption using cubic spline curve public key cryptography.” Journal of Information and Optimization Sciences 39, no. 6 (2018): 1387-1399. doi: 10.1080/02522667.2018.1507762
  • Lin, Chu-Hsing, and Jia-Hao Lee. “An efficient hierarchical key management scheme based on elliptic curves.” Journal of Interdisciplinary Mathematics 5, no. 3 (2002): 293-301. doi: 10.1080/09720502.2002.10700323
  • Kalra, Manish, and Ramesh C. Poonia. “Simulation of BB84 and proposed protocol for quantum key distribution.” Journal of Statistics and Management Systems 21, no. 4 (2018): 661-666. doi: 10.1080/09720510.2018.1475075
  • Suhag, Deepika, Shailendra Singh Gaur, and A. K. Mohapatra. “A proposed scheme to achieve node authentication in military applications of wireless sensor network.” Journal of Statistics and Management Systems 22, no. 2 (2019): 347-362. doi: 10.1080/09720510.2019.1580909

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.