Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology
DOI10.3934/nhm.2023057MaRDI QIDQ6145323
Ahmed Saeed AlGhamdi, Mrim M. Alnfiai, Santosh Kumar Henge, Sultan S. Alshamrani, Gitanjali Jayaraman, Roopkumar Rajakumar, Mamoon Rashid, M. Sreedevi
Publication date: 2 February 2024
Published in: Networks and Heterogeneous Media (Search for Journal in Brave)
artificial intelligencequantum cryptographypublic keyquantum digital signaturehomomorphic cryptosystemsecure keys
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Data structures (68P05) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem
- Quantum digital signature based on measurement-device-independent continuous-variable scheme
- Demonstration of Blind Quantum Computing
- The Case for Quantum Key Distribution
- Unconditional security in quantum cryptography
- Introduction to post-quantum cryptography
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
This page was built for publication: Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology