The authentication bugs of SIM cards in Global System for Mobile (GSM) have led us to write the new protocols for these networks using the principles of quantum cryptography. We provide two protocols for detecting and removing a copied SIM card. The first protocol uses the three-particle entangled source and the quantum channel when the original SIM card and its copy login into the mobile network. The second protocol uses quantum memory embedded in the SIM. These two protocols can help us to authenticate the duplicated SIMs in the next generation of mobile networks
© 2016 Chinese Physical Society and IOP Publishing Ltd. The security of quantum broadcast communicat...
Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing...
Secure data transmissions are crucial part of modern cloud services and data infrastructures. Securi...
The quantum communication technology is an evolving design which connects multiple quantum enabled d...
Abstract. After 20 years of basic research, quantum cryptography has meanwhile led to first commerci...
To guarantee information security in communication, quantum identity authentication plays a key role...
Problem statement: In previous researches, we investigated the security of communication channels, w...
Every attempt to access to the Internet through a web browser, email sent, VPN connection, VoIP call...
A successful implementation of any secure communication protocols requires the identity authenticati...
Cryptography is the science of securing information by transforming it into a form that cannot be ea...
[[abstract]]In this paper, we propose a communication protocol called Controlled Bidirectional Quant...
Abstract: In this paper we provide a quantum authentication protocol. The two parties share a sequen...
This is the software related to an article that integrates two cryptographic schemes for quantum dat...
The today\u2019s technology allows us to design simple quantum cryptography circuits embeddable in m...
Specific to security issues concerning identity authentication of mobile applications, a quantum ide...
© 2016 Chinese Physical Society and IOP Publishing Ltd. The security of quantum broadcast communicat...
Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing...
Secure data transmissions are crucial part of modern cloud services and data infrastructures. Securi...
The quantum communication technology is an evolving design which connects multiple quantum enabled d...
Abstract. After 20 years of basic research, quantum cryptography has meanwhile led to first commerci...
To guarantee information security in communication, quantum identity authentication plays a key role...
Problem statement: In previous researches, we investigated the security of communication channels, w...
Every attempt to access to the Internet through a web browser, email sent, VPN connection, VoIP call...
A successful implementation of any secure communication protocols requires the identity authenticati...
Cryptography is the science of securing information by transforming it into a form that cannot be ea...
[[abstract]]In this paper, we propose a communication protocol called Controlled Bidirectional Quant...
Abstract: In this paper we provide a quantum authentication protocol. The two parties share a sequen...
This is the software related to an article that integrates two cryptographic schemes for quantum dat...
The today\u2019s technology allows us to design simple quantum cryptography circuits embeddable in m...
Specific to security issues concerning identity authentication of mobile applications, a quantum ide...
© 2016 Chinese Physical Society and IOP Publishing Ltd. The security of quantum broadcast communicat...
Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing...
Secure data transmissions are crucial part of modern cloud services and data infrastructures. Securi...