Secure quantum extraction protocols

P Ananth, RL La Placa - Theory of Cryptography Conference, 2020 - Springer
quantum extraction protocols we study: quantum extraction protocols secure against quantum
adversarial receivers (qQEXT) and quantum extraction protocols secure against classical …

Secure quantum steganography protocol for fog cloud internet of things

AA Abd El-Latif, B Abd-El-Atty, MS Hossain… - IEEE …, 2018 - ieeexplore.ieee.org
… intended content via the proposed extraction approach. This paper also presents a novel
quantum steganography protocol based on hash function and quantum entangled states. To …

A new secure quantum watermarking scheme

M Naseri, S Heidari, M Baghfalaki, R Gheibi, J Batle… - Optik, 2017 - Elsevier
… the original watermarked image, makes the present protocol more secure as compared to
protocols, in our scheme only a single key is used during the embedding and the extracting

[PDF][PDF] Protocols for secure quantum transmission: a review of recent developments

MMI Khan, M Sher - Pakistan Journal of Information and …, 2003 - sherleak.ueuo.com
… of these protocols and a review on the recent developments in the field of secure quantum
… We will also explore some well-known protocols that describe the efficient use of quantum

[HTML][HTML] Security of quantum key distribution protocols

M Mafu, M Senekane - Advanced Technologies of Quantum Key …, 2018 - intechopen.com
secure against any arbitrary attacks. In this chapter, we discuss and demonstrate security
proofs for QKD protocols… on the key extraction protocol. This can be expressed as ε = ε PE …

On the security of key extraction from measuring physical quantities

M Edman, A Kiayias, Q Tang… - … Forensics and Security, 2016 - ieeexplore.ieee.org
… be secure for a concrete parameter selection. In this way we provide a comprehensively
analyzed wireless key extraction protocol that is demonstrably secure … from quantum mechanics …

Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model

C Schaffner - Physical Review A—Atomic, Molecular, and Optical …, 2010 - APS
security of our protocols requires a large quantum memory with long storage times, neither
quantum memory nor the ability to perform quantumextracted as in the analysis of Protocol 1 (…

Quantum secure non-malleable-extractors

NG Boddu, R Jain, U Kapshikar - arXiv preprint arXiv:2109.03097, 2021 - arxiv.org
… ]), we get a 2-round PA protocol that is secure against active quantum adversaries with …
extractor with quantum side information, since we need to provide security with updated quantum

Qepp: A quantum efficient privacy protection protocol in 6g-quantum internet of vehicles

Z Qu, Z Chen, X Ning, P Tiwari - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
… Grover search algorithm substantially augments the efficiency and security of the protocol. …
3) Extraction process of private information: When extracting the private information at the …

Security in quantum cryptography

C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
… , such as those built in quantum cryptography, that are “almost perfectly secure.” Thus,
we need a … Consider a protocol that encrypts quantum information contained in a d-dimensional …