Third International Conference on Innovative Computing Technology (INTECH 2013) 2013
DOI: 10.1109/intech.2013.6653697
|View full text |Cite
|
Sign up to set email alerts
|

Quantum key distribution by using public key algorithm(RSA)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…Also, Ref. [33] introduced a secure quantum algorithm which employs public key encryption to generate keys to enhance user authentication in quantum channel. In the scheme, Ref.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Also, Ref. [33] introduced a secure quantum algorithm which employs public key encryption to generate keys to enhance user authentication in quantum channel. In the scheme, Ref.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, in Refs. [32][33][34], authentication protocols involving quantum key distributions have been proposed for various application areas, such as cloud computing etc. However, these protocols cannot provide the vehicle-identity privacy which is a crucial requirement in VANET scenarios.…”
Section: Introductionmentioning
confidence: 99%
“…It is normally the method used to encrypt the data sent over web, It is a kind of algorithm that can be used for data encryption as well as digital signature. Very complicated maths make RSA algorithm [2] safe and secure for its users.Since RSA algorithm uses factorization of prime numbers,wich very tough,it is difficult to break. Moreover, the public key used for encrypting the data is known to every one and is easy to share.…”
Section: Rsa Algorithmmentioning
confidence: 99%
“…These are some of the proposed schemes that aim to enhance the security and efficiency of the conventional RSA. There are many other schemes like i-RSA [21], Quantum key Distribution [22], Modified RSA Cryptosystem Based on Offline Storage and Prime Number [23], Personal Information Protection Approach Based on RSA [24], etc.…”
Section: Related Workmentioning
confidence: 99%