Articles with "key" as a keyword



Photo from wikipedia

Multi-cast key distribution: scalable, dynamic and provably secure construction

Sign Up to like & get
recommendations!
Published in 2017 at "International Journal of Information Security"

DOI: 10.1007/s10207-017-0389-6

Abstract: In this paper, we propose a two-round dynamic multi-cast key distribution (DMKD) protocol under the star topology with a central authentication server. Users can share a common session key without revealing any information of the… read more here.

Keywords: key; cast key; session key; session ... See more keywords
Photo from archive.org

Quantum Public Key Cryptosystem Based on Bell States

Sign Up to like & get
recommendations!
Published in 2017 at "International Journal of Theoretical Physics"

DOI: 10.1007/s10773-017-3506-4

Abstract: Classical public key cryptosystems (PKC), such as RSA, EIGamal, ECC, are no longer secure in quantum algorithms, and quantum cryptography has become a novel research topic. In this paper we present a quantum asymmetrical cryptosystem… read more here.

Keywords: key; bell states; quantum public; key cryptosystem ... See more keywords
Photo from wikipedia

ESKI-IBE: Efficient and secure key issuing identity-based encryption with cloud privacy centers

Sign Up to like & get
recommendations!
Published in 2019 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-019-7155-x

Abstract: Digital certificate validation associated with traditional public key cryptosystems make it impractical in real-world environments due to their storage cost. The identity-based cryptosystems have been proven advantageous as they do not require any digital certificate… read more here.

Keywords: key; private key; identity based; secure key ... See more keywords
Photo by hudsoncrafted from unsplash

Chau–Wang–Wong17 scheme is experimentally more feasible than the six-state scheme

Sign Up to like & get
recommendations!
Published in 2019 at "Quantum Information Processing"

DOI: 10.1007/s11128-019-2263-0

Abstract: Recently, Chau et al. (Phys Rev A 95:022311, 2017) reported a quantum key distribution (QKD) scheme using four-dimensional qudits. Surprisingly, as a function of the bit error rate of the raw key, the secret key… read more here.

Keywords: key; state scheme; six state; scheme ... See more keywords
Photo from wikipedia

Secure two-party SM9 signing

Sign Up to like & get
recommendations!
Published in 2020 at "Science China Information Sciences"

DOI: 10.1007/s11432-018-9589-x

Abstract: Dear editor, With the rapid development of digital currencies and blockchain technologies, an increasing number of countries are planning to launch or have already launched their own central bank-issued digital currency (CBDC). In addition to… read more here.

Keywords: key; private key; digital signature; two party ... See more keywords
Photo from archive.org

Towards a digital key to the lichens of Italy

Sign Up to like & get
recommendations!
Published in 2020 at "Symbiosis"

DOI: 10.1007/s13199-020-00714-8

Abstract: Work is in progress for the completion of a computer-aided key to all lichens known to occur in Italy, which will be freely available online, and as a free application for mobile devices. A first… read more here.

Keywords: key; key lichens; digital key; lichens italy ... See more keywords
Photo by radowanrehan from unsplash

Data privacy preservation in MAC aware Internet of things with optimized key generation

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of King Saud University - Computer and Information Sciences"

DOI: 10.1016/j.jksuci.2019.12.008

Abstract: Abstract Recently, the progression in Internet of Thing (IoT) has extensively influenced the model of wireless networking. As numerous wireless devices were emerged, the new Medium Access Control (MAC) and routing protocols has been introduced… read more here.

Keywords: key; algorithm; data privacy; preservation mac ... See more keywords
Photo by hudsoncrafted from unsplash

Morphology of Pholeoixodes species associated with carnivores in the western Palearctic: Pictorial key based on molecularly identified Ixodes (Ph.) canisuga, I. (Ph.) hexagonus and I. (Ph.) kaiseri males, nymphs and larvae.

Sign Up to like & get
recommendations!
Published in 2021 at "Ticks and tick-borne diseases"

DOI: 10.1016/j.ttbdis.2021.101715

Abstract: Three Palearctic members of the subgenus Pholeoixodes, i.e., Ixodes canisuga, Ixodes hexagonus and Ixodes kaiseri are frequently collected from dogs, cats, red foxes, badgers and other carnivorous/insectivorous hosts in Europe. While a pictorial identification key… read more here.

Keywords: pholeoixodes species; key; nymphs larvae; kaiseri ... See more keywords
Photo from wikipedia

‘Pushing’ keys through quantum networks and the complexity of search of the true key

Sign Up to like & get
recommendations!
Published in 2022 at "Laser Physics Letters"

DOI: 10.1088/1612-202x/ac50b2

Abstract: The question of the transfer of an external independent key through trusted nodes, between which the keys obtained during the quantum key distribution are located, is investigated. It is shown that when pushing external ɛ… read more here.

Keywords: pushing keys; key; networks complexity; quantum networks ... See more keywords
Photo from wikipedia

A Two-Layer Secure Quantization Algorithm for Secret Key Generation With Correlated Eavesdropping Channel

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2893594

Abstract: When the eavesdropping channel has a certain correlation with the legitimate channel, the physical layer key is susceptible to eavesdroppers. To ensure the security of the secret key, we propose a two-layer secure (TLS) quantization… read more here.

Keywords: key; layer; algorithm; quantization algorithm ... See more keywords
Photo by mbrunacr from unsplash

Comparative Analysis of Energy Costs of Asymmetric vs Symmetric Encryption-Based Security Applications

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3192970

Abstract: Public key algorithms are heavily used in many digital applications including key establishment schemes, secure messaging apps, and digital signature schemes in cryptocurrencies. Recent developments in the field of quantum computation have placed these algorithms… read more here.

Keywords: key; energy costs; energy; encryption ... See more keywords