[HTML][HTML] Quantum oblivious transfer: a short review
Quantum cryptography is the field of cryptography that explores the quantum properties of
matter. Generally, it aims to develop primitives beyond the reach of classical cryptography …
matter. Generally, it aims to develop primitives beyond the reach of classical cryptography …
Quantum technologies in the telecommunications industry
Quantum based technologies have been fundamental in our world. After producing the laser
and the transistor, the devices that have shaped our modern information society, the …
and the transistor, the devices that have shaped our modern information society, the …
[PDF][PDF] Seepage analysis and optimization of reservoir earthen embankment with double textured HDPE geo-membrane barrier
This research paper focuses on conducting a steady state seepage analysis along with the
downstream slope factor of safety using the Modified Bishops method in a poorly compacted …
downstream slope factor of safety using the Modified Bishops method in a poorly compacted …
Performance of Practical Quantum Oblivious Key Distribution
Motivated by the applications of secure multiparty computation as a privacy-protecting data
analysis tool, and identifying oblivious transfer as one of its main practical enablers, we …
analysis tool, and identifying oblivious transfer as one of its main practical enablers, we …
Private computation of phylogenetic trees based on quantum technologies
Individuals' privacy and legal regulations demand genomic data be handled and studied
with highly secure privacy-preserving techniques. In this work, we propose a feasible Secure …
with highly secure privacy-preserving techniques. In this work, we propose a feasible Secure …
Quantum and classical oblivious transfer: A comparative analysis
Secure multiparty computation has the potential to be a disruptive technique in the realm of
data analysis and computation. It enables several parties to compute virtually any function …
data analysis and computation. It enables several parties to compute virtually any function …
6G CloudNet: towards a distributed, autonomous, and federated AI-enabled cloud and edge computing
The current 5G network deployment is anticipated to support a massive number of
connections and offer a very high-data-rate to ensure enhanced mobile broadband with ultra …
connections and offer a very high-data-rate to ensure enhanced mobile broadband with ultra …
Quantum cryptography beyond key distribution: theory and experiment
Due to its fundamental principles, quantum theory holds the promise to enhance the security
of modern cryptography, from message encryption to anonymous communication, digital …
of modern cryptography, from message encryption to anonymous communication, digital …
Will Central Bank Digital Currencies (CBDC) and Blockchain Cryptocurrencies Coexist in the Post Quantum Era?
This paper explores the coexistence possibilities of Central Bank Digital Currencies
(CBDCs) and blockchain-based cryptocurrencies within a post-quantum computing …
(CBDCs) and blockchain-based cryptocurrencies within a post-quantum computing …
Quantum privacy‐preserving service for secure lane change in vehicular networks
Abstract Secure Multiparty Computation (SMC) enables multiple parties to cooperate
securely without compromising their privacy. SMC has the potential to offer solutions for …
securely without compromising their privacy. SMC has the potential to offer solutions for …