Quantum identity authentication scheme of vehicular ad-hoc networks
From MaRDI portal
Publication:1740934
DOI10.1007/s10773-018-3908-yzbMath1451.81200OpenAlexW2896306947WikidataQ129106021 ScholiaQ129106021MaRDI QIDQ1740934
Zhiya Chen, Qin Liao, Kunlin Zhou
Publication date: 3 May 2019
Published in: International Journal of Theoretical Physics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10773-018-3908-y
intelligent transportation systemInternet of vehiclesquantum communication protocolBB84 quantum key distributionvehicular ad-hoc networks
Related Items (3)
\(\mathbb{F}_qR\)-linear skew constacyclic codes and their application of constructing quantum codes ⋮ Maximal entanglement-assisted quantum error correction codes from the skew group ring \(\mathbb{F}_4\rtimes_\varphi G\) by a heuristic search scheme ⋮ Verifiable multi-dimensional (t,n) threshold quantum secret sharing based on quantum walk
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Quantum cryptography: public key distribution and coin tossing
- Provably secure three-party password-based authenticated key exchange protocol using Weil pairing
- Secure key rate of the BB84 protocol using finite sample bits
- Unconditional security in quantum cryptography
- Quantum computation and quantum information†
- Efficient one-out-of-two quantum oblivious transfer based on four-coherent-state postselection protocol
- Nonlinear Lie algebra and ladder operators for orbital angular momentum
- Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs
- A single quantum cannot be cloned
- Bakerian Lecture - The physical interpretation of quantum mechanics
This page was built for publication: Quantum identity authentication scheme of vehicular ad-hoc networks