2018
DOI: 10.3166/isi.23.5.213-222
|View full text |Cite
|
Sign up to set email alerts
|

Secure key management in cloud environment using quantum cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…is is often considered a critical methodology in cloud-based systems, structures, and research. Hash-based homomorphic encipherment validates the confidentiality of users' sensitive information in the directive of determining the protection back issue of storage space or administering users' confidential information by unauthorized parties [14,15,[25][26][27][28][29][30]. With the affordances of WWW, cloud consumers are capable of utilizing cloud customer services just about every time and in any place.…”
Section: Related Workmentioning
confidence: 99%
“…is is often considered a critical methodology in cloud-based systems, structures, and research. Hash-based homomorphic encipherment validates the confidentiality of users' sensitive information in the directive of determining the protection back issue of storage space or administering users' confidential information by unauthorized parties [14,15,[25][26][27][28][29][30]. With the affordances of WWW, cloud consumers are capable of utilizing cloud customer services just about every time and in any place.…”
Section: Related Workmentioning
confidence: 99%
“…The vulnerability analysis using two prominent security tools, Nmap and Nessus is executed and presented by authors. Secure key management in cloud environment using quantum cryptography is presented by Kranthi and Sanyasi [31]. The proposed technique enhances the execution of the encryption/decoding procedure, and bolsters a more anchored information transmission process utilizing less computational time.…”
Section: Related Workmentioning
confidence: 99%
“…Ref. [27] presented a scheme for understanding complicated admittance management on enciphered text; by applying this scheme, the enciphered text could remain classified even though the third-party server is not trustable; additionally, this method has more confidence over the complicity occurrences by using users' attributes as IDs, while the enciphered text decides an access policy intended for the specific user to decipher. Ref.…”
Section: Conventional Hashing Standards On Cloud Environmentmentioning
confidence: 99%