2020
DOI: 10.1007/s11063-020-10272-1
|View full text |Cite
|
Sign up to set email alerts
|

Securing Blockchain Transactions Using Quantum Teleportation and Quantum Digital Signature

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…Due to its greatest significance, key agreement protocols have been employed to generate encryption keys in today's IT applications such as IoT applications [1], healthcare systems [2], vehicular communications [3], smart networks [4], satellite communications [5], cloud applications [6], and others. To resist quantum attacks, several security protocols have been proposed based on the principles of quantum physics for addressing various security problems [7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26].…”
Section: Introductionmentioning
confidence: 99%
“…Due to its greatest significance, key agreement protocols have been employed to generate encryption keys in today's IT applications such as IoT applications [1], healthcare systems [2], vehicular communications [3], smart networks [4], satellite communications [5], cloud applications [6], and others. To resist quantum attacks, several security protocols have been proposed based on the principles of quantum physics for addressing various security problems [7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26].…”
Section: Introductionmentioning
confidence: 99%
“…In other words, a quantum channel is just a quantum operation considered as a pipeline meant to transmit quantum information rather than simply the reduced dynamics of a system. Some solutions, as discussed in [18], [65] are based on quantum channels.…”
Section: ) Quantum Propertiesmentioning
confidence: 99%
“…Network Layer [37], [38], [47], [39]- [46] 4 Data Layer [48], [49], [58]- [65], [50] Quantum Properties [18], [21], [89], [26], [28], [31], [41], [44], [46], [70], [88] 2 Hash Based Signature [24], [25], [50], [56], [58], [59], [71] 3 Code-Based Cryptography [22] 4 Lattice Based Cryptography [20], [23], [53], [54], [57], [62], [63], [90], [38]- [40], [43], [45], [49], [51], [52] 5 Multivariate Cryptography [37], [55], [64] 6 Directed Acyclic Graph [66], [67] 7 Quantum Blind Signature…”
Section: Data Extractionmentioning
confidence: 99%
“…However, the use of personal medical data and records is a concern of data security and data sharing policy. Blockchain [41] provides a solution to deal with privacy and transparency of data. The typical IoT blockchain platform for smart healthcare is illustrated in Fig 10.…”
Section: Case Study Of Smart Iot Based Healthcare Systemmentioning
confidence: 99%