A novel continuous-variable quantum passive optical network is proposed in which a user can increase their key rate by trusting other users.This is because the keys,which would be discarded to remove correlations with...
In the Turkish Economy,with the policies of opening up to the outside world and transition to a free market economy in the 1980s,there have been radical changes in the structure of the economy and the prices of all go...
supported by National Natural Science Foundation of China(Grant No.U22A2001,62301608);National Key Research and Development Program of China(Grant Nos.2022YFB2902202,2022YFB2902205)。
This paper proposes a novel modulated symbols-based one-time pad(SOTP)secure transmission scheme using physical layer keys.Unlike classical physical layer key generation and exclusive OR(XOR)encryption in the discrete...
supported by the government of the Basque Country for the ELKARTEK21/10 KK-2021/00014 and ELKARTEK22/85 Research Programs,respectively。
This paper proposes a cryptographic technique on images based on the Sudoku solution.Sudoku is a number puzzle,which needs applying defined protocols and filling the empty boxes with numbers.Given a small size of numb...
Polysurfacic tori or kideas are three-dimensional objects formed by rotating a regular polygon around a central axis. These toric shapes are referred to as “polysurfacic” because their characteristics, such as the n...
supported by National Key R&D Program of China(2019YFB2101700);National Key Research and Development Program of China(2018YFA0704703);National Natural Science Foundation of China(61902276).
By allowing intermediate nodes to combine multiple packets before forwarding them,the concept of network coding in multi-cast networks can provide maximum possible information flow.However,this also means traditional ...
supported by the National Natural Science Founds of China (62072368, U20B2050);Key Research and Development Program of Shaanxi Province (2020GY-039, 2021ZDLGY05-09, 2022GY040)
Biometric key is generated from the user’s unique biometric features,and can effectively solve the security problems in cryptography.However,the current prevailing biometric key generation techniques such as fingerpr...