[HTML][HTML] Quantum oblivious transfer: a short review

MB Santos, P Mateus, AN Pinto - Entropy, 2022 - mdpi.com
Quantum cryptography is the field of cryptography that explores the quantum properties of
matter. Generally, it aims to develop primitives beyond the reach of classical cryptography …

Quantum technologies in the telecommunications industry

V Martin, JP Brito, C Escribano, M Menchetti… - EPJ Quantum …, 2021 - epjqt.epj.org
Quantum based technologies have been fundamental in our world. After producing the laser
and the transistor, the devices that have shaped our modern information society, the …

[PDF][PDF] Seepage analysis and optimization of reservoir earthen embankment with double textured HDPE geo-membrane barrier

KC Onyelowe, A Nimbalkar, NG Reddy, JA Baldovino… - Civil Eng J, 2023 - core.ac.uk
This research paper focuses on conducting a steady state seepage analysis along with the
downstream slope factor of safety using the Modified Bishops method in a poorly compacted …

Performance of Practical Quantum Oblivious Key Distribution

M Lemus, P Schiansky, M Goulão, M Bozzio… - arxiv preprint arxiv …, 2025 - arxiv.org
Motivated by the applications of secure multiparty computation as a privacy-protecting data
analysis tool, and identifying oblivious transfer as one of its main practical enablers, we …

Private computation of phylogenetic trees based on quantum technologies

MB Santos, AC Gomes, AN Pinto, P Mateus - IEEE Access, 2022 - ieeexplore.ieee.org
Individuals' privacy and legal regulations demand genomic data be handled and studied
with highly secure privacy-preserving techniques. In this work, we propose a feasible Secure …

Quantum and classical oblivious transfer: A comparative analysis

MB Santos, AN Pinto, P Mateus - IET Quantum Communication, 2021 - Wiley Online Library
Secure multiparty computation has the potential to be a disruptive technique in the realm of
data analysis and computation. It enables several parties to compute virtually any function …

6G CloudNet: towards a distributed, autonomous, and federated AI-enabled cloud and edge computing

IA Alimi, RK Patel, A Zaouga, NJ Muga… - 6G Mobile Wireless …, 2021 - Springer
The current 5G network deployment is anticipated to support a massive number of
connections and offer a very high-data-rate to ensure enhanced mobile broadband with ultra …

Quantum cryptography beyond key distribution: theory and experiment

M Bozzio, C Crépeau, P Wallden, P Walther - arxiv preprint arxiv …, 2024 - arxiv.org
Due to its fundamental principles, quantum theory holds the promise to enhance the security
of modern cryptography, from message encryption to anonymous communication, digital …

Will Central Bank Digital Currencies (CBDC) and Blockchain Cryptocurrencies Coexist in the Post Quantum Era?

AI Weinberg, P Petratos, A Faccia - arxiv preprint arxiv:2411.06362, 2024 - arxiv.org
This paper explores the coexistence possibilities of Central Bank Digital Currencies
(CBDCs) and blockchain-based cryptocurrencies within a post-quantum computing …

Quantum privacy‐preserving service for secure lane change in vehicular networks

Z Rahmani, LS Barbosa… - IET Quantum …, 2023 - Wiley Online Library
Abstract Secure Multiparty Computation (SMC) enables multiple parties to cooperate
securely without compromising their privacy. SMC has the potential to offer solutions for …