2017 International Conference on Computing, Networking and Communications (ICNC) 2017
DOI: 10.1109/iccnc.2017.7876212
|View full text |Cite
|
Sign up to set email alerts
|

Post-quantum hybrid security mechanism for MIMO systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…Some security functionalities such as primary authentication, access key management, identification, ciphering and generation of integrity protection keys should be reconsidered. These evaluation of these functionalities must also take into account the security of the air interface of cellular systems [29].…”
Section: -) Communicationmentioning
confidence: 99%
“…Some security functionalities such as primary authentication, access key management, identification, ciphering and generation of integrity protection keys should be reconsidered. These evaluation of these functionalities must also take into account the security of the air interface of cellular systems [29].…”
Section: -) Communicationmentioning
confidence: 99%
“…[78] proposes a middle system to share sensitive industrial data; interestingly, it is compatible with the Inter-Planetary File System (IPFS) and Ethereum. [79]- [81] also propose independent postquantum schemes to secure existing blockchains in a postquantum era such as secure digital archiving. [63], [82] aim to secure decentralized commercial stores that have already deployed their main-nets such as Bitcoin [24].…”
Section: A: History Of Decentralized Storesmentioning
confidence: 99%
“…One reason why the algorithms in [17] are sufficient for SPO334 is that the rows of G in (1) contain all 3 2 combinations of the three data symbols, where 3 2 represents the binomial coefficient 3 choose 2. With MPO468 however, r < 6 3 ; therefore, not all 6 3 combinations of the six data symbols appear in rows of G in (2). Thus a symbol permutation algorithm is required to provide these additional symbol combinations.…”
Section: A Symbol Permutationsmentioning
confidence: 99%
“…During this phase, it is desired for communication to begin; thus, a random seed is transmitted from BS to UE using a secret sharing method such as the post-quantum crosslayer key agreement scheme presented in [2]. Each entity performs modulo-2 addition, denoted by the ⊕ symbol in Fig.…”
Section: B Initializationmentioning
confidence: 99%
See 1 more Smart Citation