2019
DOI: 10.1016/j.future.2019.05.053
|View full text |Cite
|
Sign up to set email alerts
|

Efficient quantum-based security protocols for information sharing and data protection in 5G networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 96 publications
(42 citation statements)
references
References 46 publications
0
41
0
Order By: Relevance
“…digital) equivalents, there are two categories of quantum walks: discrete-time quantum walks and continuous-time quantum walks 20 . In this study, we focus on discrete-time quantum walks (or simply QWs), which have shown viability in wide-ranging cryptographic applications 18,19,25,26,28,30,45,[54][55][56][57][58] . QWs have two basic parts: the walker space H p and the coin particle .…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…digital) equivalents, there are two categories of quantum walks: discrete-time quantum walks and continuous-time quantum walks 20 . In this study, we focus on discrete-time quantum walks (or simply QWs), which have shown viability in wide-ranging cryptographic applications 18,19,25,26,28,30,45,[54][55][56][57][58] . QWs have two basic parts: the walker space H p and the coin particle .…”
Section: Methodsmentioning
confidence: 99%
“…Nevertheless, like any cryptographic mechanism, if the key parameters of the quantum-inspired quantum walk are disclosed, then anyone can access the probability distribution with appreciable precision. On the other hand, if the parameters are unknown, but a part of the probability distribution is disclosed, then it is very difficult to estimate the key parameters or the recover the probability distribution because our quantum-inspired quantum walk is a one-way mechanism 18,19,26 . Consequently, it is envisioned that the suggested cryptographic applications would offer additional layers of tamper-proof security within the precepts of quantum-inspired quantum walks.…”
Section: Methodsmentioning
confidence: 99%
“…Meanwhile, advances in quantum technologies are expected to usher in the quantum era whence there will be adequate computing power to tamper with the best of today's traditional cryptographic algorithms [27,28]. Already, numerous quantum algorithms have been validated at small scale and lab level as well as via simulations.…”
Section: Framework For Secure Transmission Of Images On Cloud-based Ementioning
confidence: 99%
“…There are two models of quantum walks: continuous-time quantum walk and discrete-time quantum walk (QW) [28]. In this paper, we focus only on QW, which is widely used in designing modern cryptographic applications [31]- [40]. The elementary components of running one-walker QW acting on a circle have two quantum systems: a particle |ψ p known as a walker living in a p-dimensional Hilbert space H p and a 2-dimensional quantum system |ψ c = cos α|0 +sin α|1 known as a coin living in Hilbert space H c .…”
Section: Preliminary Knowledgementioning
confidence: 99%
“…Quantum walks (QW) is considered as a universal quantum computational model [28]- [30], that can be accepted as a good key generator because of its inherent nonlinear chaotic dynamical behaviour [31]- [40]. QW similarly to chaos has chaotic behaviour and high sensitivity to initial conditions.…”
Section: Introductionmentioning
confidence: 99%