2022
DOI: 10.3390/s22218151
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy

Abstract: The Internet of Things (IoT) strongly influences the world economy; this emphasizes the importance of securing all four aspects of the IoT model: sensors, networks, cloud, and applications. Considering the significant value of public-key cryptography threats on IoT system confidentiality, it is vital to secure it. One of the potential candidates to assist in securing public key cryptography in IoT is quantum computing. Although the notion of IoT and quantum computing convergence is not new, it has been referen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 40 publications
0
3
0
Order By: Relevance
“…This process enables the user U 1 to verify that U 2 has the same OTP key, which can be utilized by U 2 in the same way. It should be noted that this concept is not novel and has been applied in a different context, such as IoT with a quantum security layer, as illustrated in [21]. Observe also that the final steps in the KeyGen-security validation might seem unnecessary, since comparing the hash of the entire key should suffice, which is indeed the case.…”
Section: Error Correction and Privacy Amplificationmentioning
confidence: 99%
“…This process enables the user U 1 to verify that U 2 has the same OTP key, which can be utilized by U 2 in the same way. It should be noted that this concept is not novel and has been applied in a different context, such as IoT with a quantum security layer, as illustrated in [21]. Observe also that the final steps in the KeyGen-security validation might seem unnecessary, since comparing the hash of the entire key should suffice, which is indeed the case.…”
Section: Error Correction and Privacy Amplificationmentioning
confidence: 99%
“…It relies on the QKD (Quantum Key Distribution) method, which allows two parties to exchange a secret, shared random key for encrypting and decrypting their messages. The BB84 protocol is a well-known example of the QKD methods [33].…”
Section: Optimising Quantum Key Distribution (Qkd)mentioning
confidence: 99%
“…Therefore, it makes this scheme less suitable for sensor devices. Nevertheless, some research based on Electric Curves Cryptography (ECC), [20] or more recently based on Quantum Cryptography [21], have reduced the computational costs, but require highly specialized hardware. On the other hand, private key ciphers ensure confidentiality, integrity, and authenticity.…”
Section: Foundationsmentioning
confidence: 99%