September 2023
·
24 Reads
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
September 2023
·
24 Reads
August 2023
·
34 Reads
·
2 Citations
Quantum Information Processing
This paper proposes a three-party authenticated lightweight quantum key distribution (TPALQKD) protocol. By utilizing a semi-honest third party (TP), the proposed protocol enables two lightweight participants to share a secret key without pre-share keys or establish any quantum channel between them. Compared with existing similar research, the proposed TPALQKD protocol reduces the quantum burden of participants, lowers the trustworthiness level required for the TP, and improves qubit efficiency. Furthermore, the proposed TPALQKD protocol has been extended to a quantum dialogue. The security analysis shows that the proposed protocol is robust against collective attacks.
August 2023
·
87 Reads
·
8 Citations
Journal of King Saud University - Computer and Information Sciences
June 2023
·
8 Reads
·
2 Citations
Optik
January 2023
·
244 Reads
Journal of Advances in Information Technology
October 2022
·
9 Reads
·
5 Citations
September 2022
·
13 Reads
·
1 Citation
August 2022
·
20 Reads
·
4 Citations
Recently, Zhang et al. proposed a single-state semi-quantum key distribution protocol to help a quantum participant share a secret key with a classical participant. However, this study shows that an eavesdropper can use a double C-NOT attack to obtain parts of the final shared key without being detected by the participants. To avoid this problem, a modification is proposed here.
January 2022
·
6 Reads
·
1 Citation
IEEE Sensors Journal
This disruptive era has a significant impact on the developing technologies in human beings, such as Internet of Things (IoT). IoT allows people and devices to transmit their data, hence intelligent environments, such as intelligent healthcare system, smart transportation, smart city, etc, are invented. Unfortunately, the wireless-based communication used by IoT offers opportunities for an adversary to eavesdrop, delete, and alter the data transmitted to each device. In additional, the adversary can perform severe attacks, such as cloning, impersonation, and others. On the other hand, IoT opens a new challenge for achieving the security properties in preserving privacy in untraceable and unclonable device movement. This paper proposes the unclonable and untraceable sensor movement in the distributed IoT environments to resolve the aforementioned problems. The informally and formally analyses are used to ensure that our proposed protocol has achieved security features and withstood from various attacks. A comparison with the related protocols in the computational complexity will make our proposed protocol suitable for the IoT environment.
August 2021
·
23 Reads
·
9 Citations
Quantum Information Processing
This paper proposes a new measure-resend ASQKD protocol. The proposed ASQKD protocol uses only single photons, needs fewer pre-shared keys and even provides better qubit efficiency than the state-of-the-art ASQKD protocols. The security proof shows the robustness of the proposed protocol under the collective attack.
... Based on thorough comparisons and performance-and security-focused findings, it can be concluded that the suggested MFA approach protects user credentials from unauthorized parties and is resistant to threats that have [50] Chen and Chen [51] Sudhakar et al. [52] Google 2-step [6] Cho et al. [63] Vermadel et al's OffPAD [22] Aman et al. [49] Nyangaresi and Yenurkar [61] Saqib et al. [64] Han et al. [53] Proposed Model: SMFA This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and content may change prior to final publication. ...
August 2023
Journal of King Saud University - Computer and Information Sciences
... The proposed protocol adopts this definition. In the same year, Liu et al. [37] followed this definition to design a three-party lightweight QKD protocol. Notably, the current research on lightweight semi-quantum or lightweight quantum environment concepts proposed by Hwang et al. predominantly focus on three-party systems [23,25,27,[36][37][38]. ...
August 2023
Quantum Information Processing
... Subsequent semi-quantum research based on these unitary operations introduced the concept of lightweight semi-quantum [33][34][35], further reducing the quantum capabilities required by classical users. In 2023, Hwang et al. [36] defined the environmental settings for lightweight quantum protocols, indicating that lightweight quantum operations include: (1) reflecting photons without disturbance, (2) performing unitary operations on single photons, (3) measuring photons in a Z-basis, and (4) preparing photons in a Z-basis. In lightweight quantum protocols, at least one user can use only two of these four lightweight quantum operations. ...
June 2023
Optik
... : The adversary sends an oracle. Because the proposed protocol does not have a collision of the hash function (as shown in Section III-C) [45], the relationship, according to the birthday paradox, is as follows. ...
January 2022
IEEE Sensors Journal
... The revocation algorithm employs ABE to encrypt and decrypt parameters related to revocation, ensuring both forward and backward secrecy [22]. The algorithm mentioned earlier utilizes the "Action_list" to carry out either partial or complete revocation. ...
October 2022
... In 2023, Shi [32] proposed an SQD that utilizes the properties of hyperentangled Bell states to communicate. Also, in 2023, Shi [33] found that the scheme in [31] could not resist the double CNOT attack [5,[33][34][35][36][37][38][39][40][41] and proposed a corresponding improvement method to effectively improve the security of the original protocol. ...
August 2022
... The environment for SQKD protocols, based on the capabilities of classical users, can be divided into three types: measure-resend [17][18][19][20][21][22][23][24][25][26][27][28], randomization-based [17,18,21,24], and measurement-free [29]. That is, the classical users possess the capabilities (1), (2), and (4); (1), (3), and (4); and (2), (3), and (4) for the measure-resend, randomization-based, and measurement-free environments, respectively. ...
August 2021
Quantum Information Processing
... Step 1: Alice and Bob share one secret key K AB = k ab 1 , k ab 2 , . . . , k ab n through the mediated SQKD protocol [46][47][48][49][50][51][52][53][54]. ...
August 2020
Annalen der Physik
... Bidirectional controlled quantum teleportation may be employed to transport quantum states in a quantum network. Communication in quantum network, indispensably, necessitates the diverse kind of exchange of quantum Page 3 of 14 118 states possessed by parties such as asymmetric bidirectional quantum teleportation [30][31][32] cyclic quantum teleportation [33,34], cyclic controlled quantum teleportation [35][36][37], multidirectional quantum teleportation in DV-regime [38,39]. ...
January 2020
International Journal of Theoretical Physics
... TP is generally assumed to be semi-honest; that is, she may be curious about the 'classical' users' private data and may attempt to eavesdrop, but she will not collude with any 'classical' user. In recent years, SQPC has gradually gained attention from researchers and many works have been proposed [14][15][16][17][18][19][20][21][22][23][24][25][26][27][28]. ...
May 2019
Quantum Information Processing