Computing on quantum shared secrets
نویسندگان
چکیده
منابع مشابه
Performing Computations on Hierarchically Shared Secrets
Hierarchical secret sharing schemes distribute a message to a set of shareholders with different reconstruction capabilities. In distributed storage systems, this is an important property because it allows to grant more reconstruction capability to better performing storage servers and vice versa. In particular, Tassa’s conjunctive and disjunctive hierarchical secret sharing schemes are based o...
متن کاملAnonymous Authentication with Shared Secrets
Anonymity and authenticity are both important yet often conflicting security goals in a wide range of applications. On the one hand for many applications (say for access control) it is crucial to be able to verify the identity of a given legitimate party (a.k.a. entity authentication). Alternatively an application might require that no one but a party can communicate on its behalf (a.k.a. messa...
متن کاملJam Resistant Communications without Shared Secrets
Information security is only attained when all four of the classic information assurance goals confidentiality, integrity, authenticity, and availability – are attained. The work presented focuses exclusively on the availability goal; in particular, maintaining the availability of the physical layer link in an omnidirectional wireless communications system. Hostile jamming is a direct attack on...
متن کاملRFID Privacy Using Spatially Distributed Shared Secrets
Many of today’s proposed RFID privacy schemes rely on the encryption of tag IDs with user-chosen keys. However, password management quickly becomes a bottleneck in such proposals, rendering them infeasible in situations where tagged items are repeatedly exchanged in informal (i.e., personal) situations, in particular outside industrial supply-chains or supermarket checkout lanes. An alternative...
متن کاملA Wireless Security Framework without Shared Secrets
This paper develops a framework for wireless security that provides confidentiality, identity authentication, message authentication, integrity, sender non-repudiation, receiver non-repudiation and anonymity. Our framework is based on two physical primitives: collaborative jamming and spatial signature enforcement. Notably, it eschews the use of shared secrets, while providing a cryptosystem th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review A
سال: 2017
ISSN: 2469-9926,2469-9934
DOI: 10.1103/physreva.96.052333