2018
DOI: 10.3166/jesa.51.283-293
|View full text |Cite
|
Sign up to set email alerts
|

Efficient quantum cryptography technique for key distribution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…In the case of the two sides, the biometric trials do not match up, therefore, the validation procedure failed and the user was not possible to decipher the ciphertext. Using the users' biometric info as input to the proposed algorithm, we generate a hash value as output for integrity which will be used in the process of the dynamic random key generation [6][7][8][9][10], encipherment, and decipherment process. Utilizing users' biometric information as input to the proposed algorithm, in this work, we generate a hash value as output for integrity, which will be used in the process of dynamic random key generation, the encipherment process, and the decipherment process.…”
Section: Introductionmentioning
confidence: 99%
“…In the case of the two sides, the biometric trials do not match up, therefore, the validation procedure failed and the user was not possible to decipher the ciphertext. Using the users' biometric info as input to the proposed algorithm, we generate a hash value as output for integrity which will be used in the process of the dynamic random key generation [6][7][8][9][10], encipherment, and decipherment process. Utilizing users' biometric information as input to the proposed algorithm, in this work, we generate a hash value as output for integrity, which will be used in the process of dynamic random key generation, the encipherment process, and the decipherment process.…”
Section: Introductionmentioning
confidence: 99%
“…The CP-ABE & QKD Algorithm provides privacy and security over the different applications such as cloud, IoT, Ect. [4][5][6][7]. Eavesdropping will be the process of easily monitoring any classic private channel without the knowledge of the sender or receiver.…”
Section: Classical Vs Quantummentioning
confidence: 99%
“…Ref. [33] launched a novel user-secure confidentiality-based method for cloud environments. Together privacy and security are counted as the primary objective to enhance the effectiveness of cloud platforms.…”
Section: Drawbacks Of Conventional Attribute Encipherment Approachesmentioning
confidence: 99%