Sensors,
Год журнала:
2024,
Номер
24(24), С. 7990 - 7990
Опубликована: Дек. 14, 2024
As
Internet
of
Things
(IoT)
technology
continues
to
advance,
there
is
a
growing
awareness
IoT
security
within
the
industry.
Quantum
communication
can
potentially
significantly
improve
devices.
Based
on
semi-quantum
cryptography
and
utilizing
single
photons,
this
paper
introduces
two
secure
direct
(SQSDC)
protocols
for
use
in
smart
door
locks.
Protocol
1
more
efficient,
efficiency
analysis
shows
that
as
high
28.57%.
Security
demonstrates
asymptotic
protocols,
effectively
resisting
intercept–measure–resend
attacks
entangle–measure
from
potential
eavesdroppers.
The
extended
SQSDC
protocol
(protocol
2)
builds
upon
by
enabling
qubit
transmit
bits
information,
resulting
double
outcome.
Scientific Reports,
Год журнала:
2025,
Номер
15(1)
Опубликована: Май 24, 2025
In
the
field
of
smart
healthcare,
video
consultation
has
become
a
key
way
to
provide
medical
services
for
remote
patients.
this
process,
it
is
essential
ensure
legal
identity
both
parties
communication
and
protect
patient
privacy
data
from
unlawful
interception
tampering.
Therefore,
controlled
quantum
authentication
confidential
protocol
proposed
by
using
entanglement
exchange
ability
measurement
correlation
Bell
states.
With
assistance
trusted
third
party,
first
achieves
mutual
parties,
so
as
prevent
malicious
users
communicating
pretending
be
specialists
or
The
party
then
further
assists
in
generating
two
implicit
shared
keys,
which
they
use
encrypt
message
its
digest,
ensuring
that
patient's
sensitive
not
intercepted
tampered
with.
addition,
sequences
are
transmitted
only
once
channel,
reducing
loss
noise
effects
caused
multiple
transmissions.
Security
analysis
shows
can
effectively
resist
participant
attacks
outside
attacks.
performance
provides
computation
terms
qubit
efficiency
experimental
simulation
results
protocol.
Physica Scripta,
Год журнала:
2024,
Номер
99(9), С. 095127 - 095127
Опубликована: Авг. 5, 2024
Abstract
Hierarchical
quantum
state
sharing
(HQSTS)
provides
a
way
for
the
from
one
party
to
another
among
multiple
parties
asymmetrically.
In
process,
it
is
necessary
ensure
legitimacy
and
authenticity
of
participants
defend
against
attacks
caused
by
neglecting
authentication.
Hence,
we
propose
three-phase
probabilistic
HQSTS
protocol
with
identity
Firstly,
verified
in
authentication
phase,
which
effectively
prevents
impersonation
deception.
Secondly,
sender
Alice
sends
target
three
agents
asymmetrically,
implies
that
there
hierarchy
regarding
their
ability
recover
secret
state.
The
high
authority
agent
can
without
cooperation
all
agents,
while
low
has
agents.
Thirdly,
based
on
non-maximally
entangled
cluster
states,
arbitrary
three-qubit
states
realized,
increases
amount
information
transmitted.
Using
Qiskit
framework,
circuit
simulation
results
particular
case
are
given
verify
feasibility
correctness
our
protocol.
Moreover,
security
analyzed
perspective
both
internal
external
attacks.
Physica Scripta,
Год журнала:
2024,
Номер
99(9), С. 095110 - 095110
Опубликована: Июль 30, 2024
Abstract
Based
on
semi-quantum
cryptography
and
utilizing
W-state,
this
paper
introduces
two
secure
direct
communication
(SQSDC)
protocols.
SQSDC1
establishes
a
secret
two-way
channel
between
quantum
participant
classical
participants.
SQSDC2
achieves
efficient
one-way
from
user
to
users.
Security
analysis
demonstrates
the
asymptotic
security
of
protocols,
effectively
resisting
intercept-measure-resend
attacks
entangle-measure
potential
eavesdroppers.
The
efficiency
indicates
high
efficiency,
with
achieving
efficiencies
20%,
while
33.33%.
Sensors,
Год журнала:
2024,
Номер
24(24), С. 7990 - 7990
Опубликована: Дек. 14, 2024
As
Internet
of
Things
(IoT)
technology
continues
to
advance,
there
is
a
growing
awareness
IoT
security
within
the
industry.
Quantum
communication
can
potentially
significantly
improve
devices.
Based
on
semi-quantum
cryptography
and
utilizing
single
photons,
this
paper
introduces
two
secure
direct
(SQSDC)
protocols
for
use
in
smart
door
locks.
Protocol
1
more
efficient,
efficiency
analysis
shows
that
as
high
28.57%.
Security
demonstrates
asymptotic
protocols,
effectively
resisting
intercept–measure–resend
attacks
entangle–measure
from
potential
eavesdroppers.
The
extended
SQSDC
protocol
(protocol
2)
builds
upon
by
enabling
qubit
transmit
bits
information,
resulting
double
outcome.