QHB-DA: A Quantum Hybrid Blockchain-based Data Authenticity Framework for Supply Chain in Industry 4.0
In the landscape of Industry 4.0, enhancing data traceability across the supply chain is
imperative. With the development of quantum computers, blockchains traditionally used for …
imperative. With the development of quantum computers, blockchains traditionally used for …
QBIoT: A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a Public-Key Quantum Signature.
A Liu, Q Zhang, S Xu, H Feng… - … , Materials & Continua, 2024 - search.ebscohost.com
Abstract The Internet of Things (IoT) is a network system that connects physical devices
through the Internet, allowing them to interact. Nowadays, IoT has become an integral part of …
through the Internet, allowing them to interact. Nowadays, IoT has become an integral part of …
QBIoV: a secure data sharing scheme for the Internet of vehicles based on quantum-enabled blockchain
A Liu, X Chen, G Xu, Z Wang, Y Sun, Y Wang… - Quantum Information …, 2024 - Springer
Internet of vehicles (IoV) technology connects various types of vehicles through the Internet
of Things to achieve mutual communication and data sharing, thereby promoting the …
of Things to achieve mutual communication and data sharing, thereby promoting the …
A Stable Hash Function Based on Parity-dependent Quantum Walks with Memory (August 2023)
Q Zhou, X Tang, S Lu, H Yang - IEEE Transactions on Quantum …, 2024 - ieeexplore.ieee.org
In this article, we develop a generic controlled alternate quantum walk model by combining
parity-dependent quantum walks with distinct arbitrary memory lengths and propose a hash …
parity-dependent quantum walks with distinct arbitrary memory lengths and propose a hash …
A Secure Mechanism for Password Hash Value Generator with the Security Analysis of Various Hashing Algorithms
A Sharma, S Thapliyal, M Wazid… - … Control & Information …, 2024 - ieeexplore.ieee.org
Making the passwords and evaluating it further can be done by different means as well as
based on various attributes but all techniques are not secure and cannot be trusted. This …
based on various attributes but all techniques are not secure and cannot be trusted. This …
A Quantum-Resistant Photonic Hash Function
We propose a quantum hash function based on Gaussian boson sampling on a photonic
quantum computer, aiming to provide quantum-resistant security. Extensive simulations …
quantum computer, aiming to provide quantum-resistant security. Extensive simulations …
Quantum One-Way Function
T Shang - Quantum Nonlinear Function Obfuscation Theory and …, 2024 - Springer
One-way functions are fundamental tools for cryptography. Until now, quantum one-way
functions have several input-output categories such as 'classical-to-classical','classical-to …
functions have several input-output categories such as 'classical-to-classical','classical-to …
[BOOK][B] Innovative Quantum Computing
This book presents new and prospective approaches to quantum computing. It introduces
the many possibilities to further develop the mathematical methods of quantum computation …
the many possibilities to further develop the mathematical methods of quantum computation …
Full Quantum One-way Function Based on Quantum Hypergraph State
T Shang, Y Tang, J Liu - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Quantum one-way function (QOWF) was proposed for quantum cryptography, which was
computable but almost irreversible in quantum polynomial time. Full quantum one-way …
computable but almost irreversible in quantum polynomial time. Full quantum one-way …
Hash Function Based on Quantum Walks with Two-Step Memory
Q Zhou, S Lu, H Yang - Proceedings of the International Conference on …, 2024 - dl.acm.org
We propose a new quantum-walk-based hash function QHF2M by combining two types of
quantum walks with two-step memory and numerically test its statistical performance. The …
quantum walks with two-step memory and numerically test its statistical performance. The …