Academic literature on the topic 'Quantum security definitions'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Quantum security definitions.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Quantum security definitions"

1

Arapinis, Myrto, Nikolaos Lamprou, Elham Kashefi, and Anna Pappa. "Definitions and Security of Quantum Electronic Voting." ACM Transactions on Quantum Computing 2, no. 1 (2021): 1–33. http://dx.doi.org/10.1145/3450144.

Full text
Abstract:
Recent advances indicate that quantum computers will soon be reality. Motivated by this ever more realistic threat for existing classical cryptographic protocols, researchers have developed several schemes to resist “quantum attacks.” In particular, for electronic voting (e-voting), several schemes relying on properties of quantum mechanics have been proposed. However, each of these proposals comes with a different and often not well-articulated corruption model, has different objectives, and is accompanied by security claims that are never formalized and are at best justified only against spe
APA, Harvard, Vancouver, ISO, and other styles
2

Arrazola, Juan Miguel, Petros Wallden, and Erika Andersson. "Multiparty quantum signature schemes." Quantum Information and Computation 16, no. 5&6 (2016): 435–64. http://dx.doi.org/10.26421/qic16.5-6-3.

Full text
Abstract:
Digital signatures are widely used in electronic communications to secure important tasks such as financial transactions, software updates, and legal contracts. The signature schemes that are in use today are based on public-key cryptography and derive their security from computational assumptions. However, it is possible to construct unconditionally secure signature protocols. In particular, using quantum communication, it is possible to construct signature schemes with security based on fundamental principles of quantum mechanics. Several quantum signature protocols have been proposed, but n
APA, Harvard, Vancouver, ISO, and other styles
3

RENNER, RENATO. "SECURITY OF QUANTUM KEY DISTRIBUTION." International Journal of Quantum Information 06, no. 01 (2008): 1–127. http://dx.doi.org/10.1142/s0219749908003256.

Full text
Abstract:
Quantum Information Theory is an area of physics which studies both fundamental and applied issues in quantum mechanics from an information-theoretical viewpoint. The underlying techniques are, however, often restricted to the analysis of systems which satisfy a certain independence condition. For example, it is assumed that an experiment can be repeated independently many times or that a large physical system consists of many virtually independent parts. Unfortunately, such assumptions are not always justified. This is particularly the case for practical applications — e.g. in quantum cryptog
APA, Harvard, Vancouver, ISO, and other styles
4

Schanck, John M., William Whyte, and Zhenfei Zhang. "Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world." Proceedings on Privacy Enhancing Technologies 2016, no. 4 (2016): 219–36. http://dx.doi.org/10.1515/popets-2016-0037.

Full text
Abstract:
Abstract We propose a circuit extension handshake for Tor that is forward secure against adversaries who gain quantum computing capabilities after session negotiation. In doing so, we refine the notion of an authenticated and confidential channel establishment (ACCE) protocol and define pre-quantum, transitional, and post-quantum ACCE security. These new definitions reflect the types of adversaries that a protocol might be designed to resist. We prove that, with some small modifications, the currently deployed Tor circuit extension handshake, ntor, provides pre-quantum ACCE security. We then p
APA, Harvard, Vancouver, ISO, and other styles
5

He, Chenfeng, Fatna Kouider, and Péter Kutas. "Updatable threshold encryption from isogenies." Annales Universitatis Scientiarum Budapestinensis de Rolando Eötvös Nominatae. Sectio computatorica 57 (2024): 69–99. https://doi.org/10.71352/ac.57.069.

Full text
Abstract:
In this paper, we propose a new primitive called updatable threshold encryption (UTE) which is motivated by real-world applications. Namely one would like to encrypt extremely sensitive data, handle post-compromise and forward security and distribute trust amongst many parties for decryption. As one is interested in long-term security we also would like the scheme to be quantum-resistant. UTE can be seen as a variant of updatable encryption (UE) with certain threshold properties. We introduce algorithms and security definitions for UTE and provide an instantiation with cryptographic group acti
APA, Harvard, Vancouver, ISO, and other styles
6

Alagic, Gorjan, Tommaso Gagliardoni, and Christian Majenz. "Can you sign a quantum state?" Quantum 5 (December 16, 2021): 603. http://dx.doi.org/10.22331/q-2021-12-16-603.

Full text
Abstract:
Cryptography with quantum states exhibits a number of surprising and counterintuitive features. In a 2002 work, Barnum et al. argue that these features imply that digital signatures for quantum states are impossible (Barnum et al., FOCS 2002). In this work, we ask: can all forms of signing quantum data, even in a possibly weak sense, be completely ruled out? We give two results which shed significant light on this basic question.First, we prove an impossibility result for digital signatures for quantum data, which extends the result of Barnum et al. Specifically, we show that no nontrivial com
APA, Harvard, Vancouver, ISO, and other styles
7

Soumitra, Bhattacharya. "Cryptology and Information Security - Past, Present, and Future Role in Society." International Journal on Cryptography and Information Security (IJCIS) 9, no. 1/2 (2019): 13–36. https://doi.org/10.5281/zenodo.3341012.

Full text
Abstract:
This article provides a general introduction to the subject of Cryptology, Crytography and Crytoanalysis and explains the terminology and the practical application of security techniques… In recorded History , technological innovations have revolutionized societies. The printing press is an often-cited example of the great impact one humble person’s invention can have on ruling dynasties, world religions, and personal life.. Quantum encryption could rival Guttenberg’s printing press in its impact. Cryptology has a fascinating History., In Warfare Cryptography is a broad, sti
APA, Harvard, Vancouver, ISO, and other styles
8

Tejesh Raju Peruri, Rajesh Jujjuvarapu, Rishi Macha, Rishi Macha, Dinesh Balusu, and Hari Nagendra Nerusu. "Cryptographic Algorithms and Protocols: Evolution and Future Trend." International Research Journal on Advanced Engineering and Management (IRJAEM) 3, no. 06 (2025): 2253–55. https://doi.org/10.47392/irjaem.2025.0354.

Full text
Abstract:
This chapter provides a thorough analysis of cryptographic protocols and algorithms, tracing their development from antiquated to contemporary approaches and predicting emerging developments. It starts with some basic definitions and emphasizes how cryptography uses mathematical operations to encrypt and decrypt data in order to guarantee data secrecy, integrity, and validity. The historical progression demonstrates how the development of symmetric key algorithms (like DES, AES) and asymmetric key algorithms (like RSA, ECC)—driven by advances in computing power and the growing complexity of se
APA, Harvard, Vancouver, ISO, and other styles
9

Kent, Adrian. "S-money: virtual tokens for a relativistic economy." Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 475, no. 2225 (2019): 20190170. http://dx.doi.org/10.1098/rspa.2019.0170.

Full text
Abstract:
We propose definitions and implementations of ‘S-money’—virtual tokens designed for high-value fast transactions on networks with relativistic or other trusted signalling constraints, defined by inputs that in general are made at many network points, some or all of which may be space-like separated. We argue that one significant way of characterizing types of money in space–time is via the ‘summoning’ tasks they can solve: that is, how flexibly the money can be propagated to a desired space–time point in response to relevant information received at various space–time points. We show that S-mon
APA, Harvard, Vancouver, ISO, and other styles
10

Xin, Xiangjun, Qinglan Yang, and Fagen Li. "Quantum proxy signature with provable security." Modern Physics Letters A 35, no. 24 (2020): 2050197. http://dx.doi.org/10.1142/s0217732320501977.

Full text
Abstract:
A quantum proxy signature scheme makes the proxy signer can generate a quantum signature on behalf of the original signer. Although many quantum proxy signature schemes have been proposed, none of them can be formally proved to be secure. There is not even security model for the quantum proxy signatures. Some quantum proxy signature schemes have been proved to be insecure against forgery attacks. In this paper, first, the formal definition and the corresponding security model for the quantum proxy signatures are proposed. Second, based on the Hadamard operator and the controlled NOT operation,
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Quantum security definitions"

1

Van, de Graaf Jeroen. "Towards a formal definition of security for quantum protocols." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/NQ35648.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Puria, Shravan Kumar Parshuram. "Signcryption in a Quantum World." Thesis, 2019. https://etd.iisc.ac.in/handle/2005/5063.

Full text
Abstract:
With recent advancements and research on quantum computers, it is conjectured that in the foreseeable future, sufficiently large quantum computers will be built to break essentially all public key cryptosystems currently in use. As a response, quantum-safe cryptography has recently garnered significant attention. The aim of quantum-safe cryptography is to design cryptosystems that are secure against both classical and quantum computers. This involves identifying computational problems that are believed to be secure against quantum adversaries and building cryptosystems based on such probl
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Quantum security definitions"

1

Haque, Abida, and Alessandra Scafuro. "Threshold Ring Signatures: New Definitions and Post-quantum Security." In Lecture Notes in Computer Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45388-6_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhou, Biming, Yiting Liu, Haodong Jiang, and Yunlei Zhao. "SoK: Post-Quantum Key Encapsulation Mechanisms—Security Definitions, Constructions, and Applications." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-87541-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!