keyword
https://read.qxmd.com/read/38693269/software-implementation-of-systematic-polar-encoding-based-pkc-spe-cryptosystem-for-quantum-cybersecurity
#1
JOURNAL ARTICLE
Ritu Redhu, Ekta Narwal, Shivani Gupta, Reena Hooda, Sonika Ahlawat, Rupali Khurana
The ever-growing threats in cybersecurity growing with the rapid development of quantum computing, necessitates the development of robust and quantum-resistant cryptographic systems. This paper introduces a novel cryptosystem, Public Key Cryptosystem based on Systematic Polar Encoding (PKC-SPE), based on the combination of systematic polar encoding and public-key cryptographic principles. The Systematic Polar Encoding (SPE), derived from the well-established field of polar codes, serves as the foundation for this proposed cryptographic scheme...
May 1, 2024: Scientific Reports
https://read.qxmd.com/read/38681681/thz-quantum-gap-exploring-potential-approaches-for-generating-and-detecting-non-classical-states-of-thz-light
#2
JOURNAL ARTICLE
Yanko Todorov, Sukhdeep Dhillon, Juliette Mangeney
Over the past few decades, THz technology has made considerable progress, evidenced by the performance of current THz sources and detectors, as well as the emergence of several THz applications. However, in the realm of quantum technologies, the THz spectral domain is still in its infancy, unlike neighboring spectral domains that have flourished in recent years. Notably, in the microwave domain, superconducting qubits currently serve as the core of quantum computers, while quantum cryptography protocols have been successfully demonstrated in the visible and telecommunications domains through satellite links...
April 2024: Nanophotonics
https://read.qxmd.com/read/38676342/time-controlled-authentication-strategies-for-molecular-information-transfer
#3
JOURNAL ARTICLE
Minghao Hu, Mengyao Yang, Xianzhi Cheng, Tongbo Wu
Modern cryptography based on computational complexity theory is mainly constructed with silicon-based circuits. As DNA nanotechnology penetrates the molecular domain, utilizing molecular cryptography for data access protection in the biomolecular domain becomes a unique approach to information security. However, building security devices and strategies with robust security and compatibility is still challenging. Here, this study reports a time-controlled molecular authentication strategy using DNAzyme and DNA strand displacement as the basic framework...
April 26, 2024: Small
https://read.qxmd.com/read/38664792/innbc-dapp-a-decentralized-application-to-permanently-store-biomedical-data-on-a-modern-proof-of-stake-pos-blockchain-such-as-bnb-smart-chain
#4
JOURNAL ARTICLE
Jonathan Fior
BACKGROUND: A blockchain can be described as a distributed ledger database where, under a consensus mechanism, data are permanently stored in records, called blocks, linked together with cryptography. Each block contains a cryptographic hash function of the previous block, a timestamp, and transaction data, which are permanently stored in thousands of nodes and never altered. This provides a potential real-world application for generating a permanent, decentralized record of scientific data, taking advantage of blockchain features such as timestamping and immutability...
April 25, 2024: BMC Medical Informatics and Decision Making
https://read.qxmd.com/read/38660173/a-secure-fingerprint-hiding-technique-based-on-dna-sequence-and-mathematical-function
#5
JOURNAL ARTICLE
Wala'a Essa Al-Ahmadi, Asia Othman Aljahdali, Fursan Thabit, Asmaa Munshi
DNA steganography is a technique for securely transmitting important data using DNA sequences. It involves encrypting and hiding messages within DNA sequences to prevent unauthorized access and decoding of sensitive information. Biometric systems, such as fingerprinting and iris scanning, are used for individual recognition. Since biometric information cannot be changed if compromised, it is essential to ensure its security. This research aims to develop a secure technique that combines steganography and cryptography to protect fingerprint images during communication while maintaining confidentiality...
2024: PeerJ. Computer Science
https://read.qxmd.com/read/38660167/password-authenticated-key-exchange-based-on-kyber-for-mobile-devices
#6
JOURNAL ARTICLE
Kübra Seyhan, Sedat Akleylek, Ahmet Faruk Dursun
In this article, a password-authenticated key exchange (PAKE) version of the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC) public-key encryption and key-establishment standard is constructed. We mainly focused on how the PAKE version of PQC standard Kyber with mobile compatibility can be obtained by using simple structured password components. In the design process, the conventional password-based authenticated key exchange (PAK) approach is updated under the module learning with errors (MLWE) assumptions to add password-based authentication...
2024: PeerJ. Computer Science
https://read.qxmd.com/read/38651359/four-dimensional-physical-unclonable-functions-and-cryptographic-applications-based-on-time-varying-chaotic-phosphorescent-patterns
#7
JOURNAL ARTICLE
Healin Im, Jinsik Yoon, Byungjun So, Jinho Choi, Dong Hyuk Park, Sunkook Kim, Wook Park
Physical unclonable functions (PUFs) have attracted interest in demonstrating authentication and cryptographic processes for Internet of Things (IoT) devices. We demonstrated four-dimensional PUFs (4D PUFs) to realize time-varying chaotic phosphorescent randomness on MoS2 atomic seeds. By forming hybrid states involving more than one emitter with distinct lifetimes in 4D PUFs, irregular lifetime distribution throughout patterns functions as a time-varying disorder that is impossible to replicate. Moreover, we established a bit extraction process incorporating multiple 64 bit-stream challenges and experimentally obtained physical features of 4D PUFs, producing countless random 896 bit-stream responses...
April 23, 2024: ACS Nano
https://read.qxmd.com/read/38607777/iot-based-external-attacks-aware-secure-healthcare-framework-using-blockchain-and-sb-rnn-nvs-fu-techniques
#8
JOURNAL ARTICLE
Ramesh Kuppusamy, Anbarasan Murugesan
BACKGROUND: In recent times, there has been widespread deployment of Internet of Things (IoT) applications, particularly in the healthcare sector, where computations involving user-specific data are carried out on cloud servers. However, the network nodes in IoT healthcare are vulnerable to an increased level of security threats. OBJECTIVE: This paper introduces a secure Electronic Health Record (EHR) framework with a focus on IoT. METHODS: Initially, the IoT sensor nodes are designated as registered patients and undergo initialization...
April 5, 2024: Technology and Health Care: Official Journal of the European Society for Engineering and Medicine
https://read.qxmd.com/read/38607776/enhancing-security-in-wireless-body-area-networks-wbans-with-ecc-based-diffie-hellman-key-exchange-algorithm-ecdh
#9
JOURNAL ARTICLE
Akilan S S, Kayathri Devi Devprasad, Raja Sekar J
BACKGROUND: Wireless Body Area Networks (WBANs) are integral to modern healthcare systems, providing continuous health monitoring and real-time data transmission. The sensitivity of medical data being transmitted makes security a significant concern in WBANs. OBJECTIVE: This study explores the application of the Elliptic Curve Cryptography (ECC)-based Diffie-Hellman Key Exchange (ECDH) algorithm to enhance security within WBANs. METHOD: The study investigates the suitability of ECC for this context and evaluates the performance and security implications of implementing ECDH in WBANs...
March 28, 2024: Technology and Health Care: Official Journal of the European Society for Engineering and Medicine
https://read.qxmd.com/read/38605103/design-of-efficient-binary-multiplier-architecture-using-hybrid-compressor-with-fpga-implementation
#10
JOURNAL ARTICLE
V Thamizharasan, V Parthipan
In signal processing applications, the multipliers are essential component of arithmetic functional units in many applications, like digital signal processors, image/video processing, Machine Learning, Cryptography and Arithmetic & Logical units (ALU). In recent years, Profuse multipliers are there. In that, Vedic multiplier is one of the high-performance multiplications and it is used to signal/image processing applications. In order to ameliorate the performance of this multiplier further, by proposed a novel multiplier using hybrid compressor...
April 11, 2024: Scientific Reports
https://read.qxmd.com/read/38580696/chemical-unclonable-functions-based-on-operable-random-dna-pools
#11
JOURNAL ARTICLE
Anne M Luescher, Andreas L Gimpel, Wendelin J Stark, Reinhard Heckel, Robert N Grass
Physical unclonable functions (PUFs) based on unique tokens generated by random manufacturing processes have been proposed as an alternative to mathematical one-way algorithms. However, these tokens are not distributable, which is a disadvantage for decentralized applications. Finding unclonable, yet distributable functions would help bridge this gap and expand the applications of object-bound cryptography. Here we show that large random DNA pools with a segmented structure of alternating constant and randomly generated portions are able to calculate distinct outputs from millions of inputs in a specific and reproducible manner, in analogy to physical unclonable functions...
April 5, 2024: Nature Communications
https://read.qxmd.com/read/38557695/e2ee-enhanced-patient-centric-blockchain-based-system-for-ehr-management
#12
JOURNAL ARTICLE
Alaa Haddad, Mohamed Hadi Habaebi, Elfatih A A Elsheikh, Md Rafiqul Islam, Suriza Ahmad Zabidi, Fakher Eldin M Suliman
To secure sensitive medical records in the healthcare clouds, this paper proposes an End-to-End Encryption (E2EE) to enhance a patient-centric blockchain-based system for electronic health record (EHR) management. The suggested system with a focus on the patient enables individuals to oversee their medical records within various involved parties by authorizing or withdrawing permission for access to their records. Utilizing the inter-planetary file system (IPFS) for record storage is chosen due to its decentralized nature and its ability to guarantee the unchangeability of records...
2024: PloS One
https://read.qxmd.com/read/38549348/secure-multimedia-communication-advanced-asymmetric-key-authentication-with-grayscale-visual-cryptography
#13
JOURNAL ARTICLE
Tao Liu, Shubhangi Vairagar, Sushadevi Adagale, T Karthick, Catherine Esther Karunya, John Blesswin A, Selva Mary G
The secure authentication of user data is crucial in various sectors, including digital banking, medical applications and e-governance, especially for images. Secure communication protects against data tampering and forgery, thereby bolstering the foundation for informed decision-making, whether managing traffic, enhancing public safety, or monitoring environmental conditions. Conventional visual cryptographic protocols offer solutions, particularly for color images, though they grapple with challenges such as high computational demands and reliance on multiple cover images...
February 29, 2024: Mathematical Biosciences and Engineering: MBE
https://read.qxmd.com/read/38527996/efficient-quantum-algorithms-for-set-operations
#14
JOURNAL ARTICLE
Rehab Elgendy, Ahmed Younes, H M Abu-Donia, R M Farouk
Analyzing the relations between Boolean functions has many applications in many fields, such as database systems, cryptography, and collision problems. This paper proposes four quantum algorithms that use amplitude amplification techniques to perform set operations, including Intersection, Difference, and Union, on two Boolean functions in <mml:math xmlns:mml="https://www.w3.org/1998/Math/MathML"><mml:mrow><mml:mi>O</mml:mi> <mml:mo>(</mml:mo> <mml:msqrt><mml:mi>N</mml:mi></mml:msqrt> <mml:mo>)</mml:mo></mml:mrow> </mml:math> time complexity...
March 25, 2024: Scientific Reports
https://read.qxmd.com/read/38516871/encrypted-image-classification-with-low-memory-footprint-using-fully-homomorphic-encryption
#15
JOURNAL ARTICLE
Lorenzo Rovida, Alberto Leporati
Classifying images has become a straightforward and accessible task, thanks to the advent of Deep Neural Networks. Nevertheless, not much attention is given to the privacy concerns associated with sensitive data contained in images. In this study, we propose a solution to this issue by exploring an intersection between Machine Learning and cryptography. In particular, Fully Homomorphic Encryption (FHE) emerges as a promising solution, as it enables computations to be performed on encrypted data. We therefore propose a Residual Network implementation based on FHE which allows the classification of encrypted images, ensuring that only the user can see the result...
March 22, 2024: International Journal of Neural Systems
https://read.qxmd.com/read/38480860/super-resolution-deep-neural-network-srdnn-based-multi-image-steganography-for-highly-secured-lossless-image-transmission
#16
JOURNAL ARTICLE
S Priya, S P Abirami, B Arunkumar, B Mishachandar
Information exchange and communication through the Internet are one of the most crucial aspects of today's information technology world. The security of information transmitted online has grown to be a critical concern, particularly in the transfer of medical data. To overcome this, the data must be delivered securely without being altered or lost. This can be possibly done by combining the principles of cryptography and steganography. In the recent past, steganography is used with simpler methods like the least significant bit manipulation technique, in order to encode a lower-resolution image into a higher-resolution image...
March 13, 2024: Scientific Reports
https://read.qxmd.com/read/38475211/bec-defender-qr-code-based-methodology-for-prevention-of-business-email-compromise-bec-attacks
#17
JOURNAL ARTICLE
Anastasios Papathanasiou, George Liontos, Georgios Paparis, Vasiliki Liagkou, Euripides Glavas
In an era of ever-evolving and increasingly sophisticated cyber threats, protecting sensitive information from cyberattacks such as business email compromise (BEC) attacks has become a top priority for individuals and enterprises. Existing methods used to counteract the risks linked to BEC attacks frequently prove ineffective because of the continuous development and evolution of these malicious schemes. This research introduces a novel methodology for safeguarding against BEC attacks called the BEC Defender...
March 5, 2024: Sensors
https://read.qxmd.com/read/38475091/preliminary-study-of-novel-bio-crypto-key-generation-using-clustering-based-binarization-of-ecg-features
#18
JOURNAL ARTICLE
Ho Bin Hwang, Jeyeon Lee, Hyeokchan Kwon, Byungho Chung, Jongshill Lee, In Young Kim
In modern society, the popularity of wearable devices has highlighted the need for data security. Bio-crypto keys (bio-keys), especially in the context of wearable devices, are gaining attention as a next-generation security method. Despite the theoretical advantages of bio-keys, implementing such systems poses practical challenges due to their need for flexibility and convenience. Electrocardiograms (ECGs) have emerged as a potential solution to these issues but face hurdles due to intra-individual variability...
February 28, 2024: Sensors
https://read.qxmd.com/read/38467643/systematic-review-and-meta-analysis-for-a-global-patient-co-owned-cloud-gpoc
#19
JOURNAL ARTICLE
Niklas Lidströmer, Joe Davids, Mohamed ElSharkawy, Hutan Ashrafian, Eric Herlenius
Cloud-based personal health records increase globally. The GPOC series introduces the concept of a Global Patient co-Owned Cloud (GPOC) of personal health records. Here, we present the GPOC series' Prospective Register of Systematic Reviews (PROSPERO) registered and Preferred Reporting Items Systematic and Meta-Analyses (PRISMA)-guided systematic review and meta-analysis. It examines cloud-based personal health records and factors such as data security, efficiency, privacy and cost-based measures. It is a meta-analysis of twelve relevant axes encompassing performance, cryptography and parameters based on efficiency (runtimes, key generation times), security (access policies, encryption, decryption) and cost (gas)...
March 11, 2024: Nature Communications
https://read.qxmd.com/read/38457732/randomness-certification-from-multipartite-quantum-steering-for-arbitrary-dimensional-systems
#20
JOURNAL ARTICLE
Yi Li, Yu Xiang, Xiao-Dong Yu, H Chau Nguyen, Otfried Gühne, Qiongyi He
Entanglement in bipartite systems has been applied to generate secure random numbers, which are playing an important role in cryptography or scientific numerical simulations. Here, we propose to use multipartite entanglement distributed between trusted and untrusted parties for generating randomness of arbitrary dimensional systems. We show that the distributed structure of several parties leads to additional protection against possible attacks by an eavesdropper, resulting in more secure randomness generated than in the corresponding bipartite scenario...
February 23, 2024: Physical Review Letters
keyword
keyword
168420
1
2
Fetch more papers »
Fetching more papers... Fetching...
Remove bar
Read by QxMD icon Read
×

Save your favorite articles in one place with a free QxMD account.

×

Search Tips

Use Boolean operators: AND/OR

diabetic AND foot
diabetes OR diabetic

Exclude a word using the 'minus' sign

Virchow -triad

Use Parentheses

water AND (cup OR glass)

Add an asterisk (*) at end of a word to include word stems

Neuro* will search for Neurology, Neuroscientist, Neurological, and so on

Use quotes to search for an exact phrase

"primary prevention of cancer"
(heart or cardiac or cardio*) AND arrest -"American Heart Association"

We want to hear from doctors like you!

Take a second to answer a survey question.