Cai et al., 2020 - Google Patents
Implementation of an E-payment security evaluation system based on quantum blind computingCai et al., 2020
View PDF- Document ID
- 5865943225917118572
- Author
- Cai D
- Chen X
- Han Y
- Yi X
- Jia J
- Cao C
- Fan L
- Publication year
- Publication venue
- International Journal of Theoretical Physics
External Links
Snippet
E-payment has gradually become the mainstream globally in recent years. However, the security and anonymity of the traditional E-payment system are not perfectly guaranteed with the emergence of the quantum computer. In this paper, an E-payment security evaluation …
- 238000011156 evaluation 0 title abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Abulkasim et al. | Secure dynamic multiparty quantum private comparison | |
TWI725124B (en) | Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys | |
Song et al. | Efficient Attribute‐Based Encryption with Privacy‐Preserving Key Generation and Its Application in Industrial Cloud | |
Sun et al. | Quantum private comparison with a malicious third party | |
Zhang et al. | Quantum private comparison protocol with W states | |
Liu et al. | Multi-party quantum key agreement with four-qubit cluster states | |
Geng et al. | Single-state semiquantum private comparison based on Bell states | |
Cai et al. | Implementation of an E-payment security evaluation system based on quantum blind computing | |
Zheng et al. | A practical quantum designated verifier signature scheme for E-voting applications | |
Liu et al. | A novel quantum group proxy blind signature scheme based on five-qubit entangled state | |
Zhu et al. | Two novel semi-quantum-reflection protocols applied in connected vehicle systems with blockchain | |
Zha et al. | Quantum private comparison protocol with five-particle cluster states | |
He et al. | Mutual authentication quantum key agreement protocol based on Bell states | |
Shi et al. | Quantum blind signature scheme with cluster states based on quantum walk cryptosystem | |
Liu et al. | Quantum private comparison protocol based on 4D GHZ-like states | |
Liu et al. | Quantum protocol for millionaire problem | |
Huang et al. | An improved efficient identity-based quantum signature scheme | |
Wang et al. | Memory-free quantum secret sharing protocol with collective detection | |
Zhou et al. | Two-party quantum key agreement against collective noisy channel | |
Gou et al. | A novel quantum E-payment protocol based on blockchain | |
Li et al. | Private comparison protocol for multiple semi-quantum users based on bell states | |
Chen et al. | Quantum and semi-quantum blind signature schemes based on entanglement swapping | |
Guo et al. | A novel quantum proxy blind signature scheme | |
Zhang et al. | Cryptanalysis of the quantum group signature protocols | |
Shi et al. | Verifiable quantum key exchange with authentication |