2021
DOI: 10.1007/s11831-021-09578-7
|View full text |Cite|
|
Sign up to set email alerts
|

The Emerging Trends of Quantum Computing Towards Data Security and Key Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 48 publications
0
2
0
Order By: Relevance
“…Authors [36] have used this proposition to generate a unique polynomial as explained in the theorem to secretly discard the corrupted bits such that Alice and Bob have a secure and correct key. The secrecy of the key bits depends on the secrecy of the polynomial [37] which is guaranteed by the above proposition [38].…”
Section: Propositionmentioning
confidence: 98%
“…Authors [36] have used this proposition to generate a unique polynomial as explained in the theorem to secretly discard the corrupted bits such that Alice and Bob have a secure and correct key. The secrecy of the key bits depends on the secrecy of the polynomial [37] which is guaranteed by the above proposition [38].…”
Section: Propositionmentioning
confidence: 98%
“…Researchers have investigated quantum-resistant encryption techniques to solve this weakness. We include a Quantum Computation Protocol (QCP) for dynamic key creation in our suggested framework [57][58]. To create extremely safe encryption keys, this protocol makes use of the special qualities of quantum computing, such as superposition and entanglement.…”
Section: Data Security and Quantum Computingmentioning
confidence: 99%
“…After encoding each bit with the appropriate polarization, Alice uses the quantum channel to send a photon to Bob for each bit. In Step 2, Bob gathers the polarized rays by picking bases at random [36,37]. By means of a freely accessible forum (including two-way interaction): Alice communicates with Bob about the polarization state she employed when sending a bit, but the bit's value remains secret.…”
Section: Via Quantum Channel (One Way Correspondence)mentioning
confidence: 99%