2005
DOI: 10.1016/j.ins.2004.08.011
|View full text |Cite
|
Sign up to set email alerts
|

Distribution of digital contents based on public key considering execution speed and security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
3
0
3

Year Published

2007
2007
2015
2015

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 9 publications
0
3
0
3
Order By: Relevance
“…Thus, currently available cryptosystems will in comparison become useless and lacking in security [17,20,28] when quantum computers become practical reality. Most public key cryptosystems apply simple mathematics that can be hacked easily by scanning for loopholes and backdoors.…”
Section: Origin Of Quantum Cryptographic Systemmentioning
confidence: 99%
“…Thus, currently available cryptosystems will in comparison become useless and lacking in security [17,20,28] when quantum computers become practical reality. Most public key cryptosystems apply simple mathematics that can be hacked easily by scanning for loopholes and backdoors.…”
Section: Origin Of Quantum Cryptographic Systemmentioning
confidence: 99%
“…Mientras que la mayoría de las tecnologías criptográficas actuales, tales como RSA 2 , DES 3 , ECC 4 y otros tienen sus bases en la factorización de números primos de gran tamaño, en los logaritmos discretos y otras operaciones exponenciales matemáticas, el algoritmo de Shor [2] en un computador cuántico puede resolver eficazmente los problemas de ecuaciones exponenciales. Por lo tanto los sistemas criptográficos actualmente disponibles se volverán inútiles y carentes de seguridad [3][4] cuando los computadores cuánticos se vuelvan una realidad.…”
Section: Introductionunclassified
“…Por lo tanto los sistemas criptográficos actualmente disponibles se volverán inútiles y carentes de seguridad [3][4] cuando los computadores cuánticos se vuelvan una realidad.…”
Section: Introductionunclassified
See 1 more Smart Citation
“…Many GOCs have since been proposed [2,3,5,8,9,13,16,17,[19][20][21][22][23][24]. Due to the difference in the composition of the authorized subsets, the existing GOCs are divided into two main categories: a (t, n) threshold cryptosystem [2,3,5,13,16,17,24] and a generalized threshold cryptosystem [8,9,[20][21][22].…”
Section: Introductionmentioning
confidence: 99%