[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Cai et al., 2020 - Google Patents

Implementation of an E-payment security evaluation system based on quantum blind computing

Cai et al., 2020

View PDF
Document ID
5865943225917118572
Author
Cai D
Chen X
Han Y
Yi X
Jia J
Cao C
Fan L
Publication year
Publication venue
International Journal of Theoretical Physics

External Links

Snippet

E-payment has gradually become the mainstream globally in recent years. However, the security and anonymity of the traditional E-payment system are not perfectly guaranteed with the emergence of the quantum computer. In this paper, an E-payment security evaluation …
Continue reading at drive.google.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled

Similar Documents

Publication Publication Date Title
Abulkasim et al. Secure dynamic multiparty quantum private comparison
TWI725124B (en) Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys
Song et al. Efficient Attribute‐Based Encryption with Privacy‐Preserving Key Generation and Its Application in Industrial Cloud
Sun et al. Quantum private comparison with a malicious third party
Zhang et al. Quantum private comparison protocol with W states
Liu et al. Multi-party quantum key agreement with four-qubit cluster states
Geng et al. Single-state semiquantum private comparison based on Bell states
Cai et al. Implementation of an E-payment security evaluation system based on quantum blind computing
Zheng et al. A practical quantum designated verifier signature scheme for E-voting applications
Liu et al. A novel quantum group proxy blind signature scheme based on five-qubit entangled state
Zhu et al. Two novel semi-quantum-reflection protocols applied in connected vehicle systems with blockchain
Zha et al. Quantum private comparison protocol with five-particle cluster states
He et al. Mutual authentication quantum key agreement protocol based on Bell states
Shi et al. Quantum blind signature scheme with cluster states based on quantum walk cryptosystem
Liu et al. Quantum private comparison protocol based on 4D GHZ-like states
Liu et al. Quantum protocol for millionaire problem
Huang et al. An improved efficient identity-based quantum signature scheme
Wang et al. Memory-free quantum secret sharing protocol with collective detection
Zhou et al. Two-party quantum key agreement against collective noisy channel
Gou et al. A novel quantum E-payment protocol based on blockchain
Li et al. Private comparison protocol for multiple semi-quantum users based on bell states
Chen et al. Quantum and semi-quantum blind signature schemes based on entanglement swapping
Guo et al. A novel quantum proxy blind signature scheme
Zhang et al. Cryptanalysis of the quantum group signature protocols
Shi et al. Verifiable quantum key exchange with authentication