Quantum technique for access control in cloud computing II: Encryption and key distribution
This is the second paper of the series of papers dealing with access control problems in cloud computing by adopting quantum techniques. In this paper we study the application of quantum encryption and quantum key distribution in the access control problem. We formalize our encryption scheme and pro...
Gespeichert in:
| Veröffentlicht in: | Journal of network and computer applications Jg. 103; S. 178 - 184 |
|---|---|
| Hauptverfasser: | , , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Elsevier Ltd
01.02.2018
|
| Schlagworte: | |
| ISSN: | 1084-8045, 1095-8592 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | This is the second paper of the series of papers dealing with access control problems in cloud computing by adopting quantum techniques. In this paper we study the application of quantum encryption and quantum key distribution in the access control problem. We formalize our encryption scheme and protocol for key distribution in the setting of categorical quantum mechanics (CQM). The graphical language of CQM is used in this paper. The quantum scheme/protocol we propose possesses several advantages over existing schemes/protocols proposed in the state of the art for the same purpose. They are informationally secure and implementable by the current technology. |
|---|---|
| AbstractList | This is the second paper of the series of papers dealing with access control problems in cloud computing by adopting quantum techniques. In this paper we study the application of quantum encryption and quantum key distribution in the access control problem. We formalize our encryption scheme and protocol for key distribution in the setting of categorical quantum mechanics (CQM). The graphical language of CQM is used in this paper. The quantum scheme/protocol we propose possesses several advantages over existing schemes/protocols proposed in the state of the art for the same purpose. They are informationally secure and implementable by the current technology. |
| Author | Zhou, Lu Castiglione, Arcangelo Kulicki, Piotr Sun, Xin Wang, Quanlong |
| Author_xml | – sequence: 1 givenname: Lu surname: Zhou fullname: Zhou, Lu organization: University of Aizu, Japan – sequence: 2 givenname: Quanlong surname: Wang fullname: Wang, Quanlong organization: University of Oxford, UK – sequence: 3 givenname: Xin surname: Sun fullname: Sun, Xin email: xin.sun.logic@gmail.com organization: Sun Yat-sen University, China – sequence: 4 givenname: Piotr surname: Kulicki fullname: Kulicki, Piotr organization: The John Paul II Catholic University of Lublin, Poland – sequence: 5 givenname: Arcangelo surname: Castiglione fullname: Castiglione, Arcangelo organization: University of Salerno, Italy |
| BookMark | eNp9kM9KAzEQh4NUsK2-gKe8wK7J_snuihcpVQsFEfTkIWQniWbdJjXJCn17d6knD2UOM_zgG2a-BZpZZxVC15SklFB206WdBZFmhFYppSmh2RmaU9KUSV022Wya6yKpSVFeoEUIHSGEFU0-R-8vg7Bx2OGo4NOa70Fh7TwWACoEDM5G73psLIbeDXIMdvshGvuBN5tbvLbgD_tonMXCSvylDliaEL1phym8ROda9EFd_fUlentYv66eku3z42Z1v00gZywmBStpRRmUTNBWNjUjQrJKaC2l1oIwqGShlKzbLKvGUlI2DSgpCtG2kJcyX6L6uBe8C8ErzcFEMV0QvTA9p4RPknjHJ0l8ksQp5aOkEc3-oXtvdsIfTkN3R0iNT_0Y5XkAo-x4k_EKIpfOnMJ_AfBjhac |
| CitedBy_id | crossref_primary_10_1007_s40747_022_00829_z crossref_primary_10_3390_axioms9010028 crossref_primary_10_1016_j_jnca_2025_104156 crossref_primary_10_3390_s20113108 crossref_primary_10_1007_s10773_018_3929_6 crossref_primary_10_1016_j_jnca_2020_102810 crossref_primary_10_1007_s11277_023_10354_y crossref_primary_10_1088_1757_899X_993_1_012093 crossref_primary_10_1109_COMST_2022_3144219 crossref_primary_10_1016_j_jnca_2018_03_016 crossref_primary_10_1109_ACCESS_2019_2926354 crossref_primary_10_1007_s12083_021_01150_1 crossref_primary_10_1002_spe_3039 crossref_primary_10_1007_s11831_022_09809_5 |
| Cites_doi | 10.1587/transfun.E98.A.391 10.1103/PhysRevA.67.042317 10.1016/j.ins.2016.08.093 10.1109/5.4440 10.1145/2967103 10.1007/s11225-006-7202-2 10.1007/s11225-007-9079-0 10.1109/TIFS.2015.2512533 10.1007/978-3-642-38164-5_3 10.1145/357369.357372 10.1016/j.entcs.2011.01.034 10.1007/3-540-58691-1_68 10.1007/978-3-642-15205-4_20 10.1109/TIFS.2016.2581147 10.1023/B:IJTP.0000048821.56239.cb 10.1007/s10773-010-0368-4 10.1007/978-3-642-12821-9_3 10.1109/LICS.2004.1319636 10.1016/j.entcs.2006.12.018 10.1007/s11128-014-0837-4 |
| ContentType | Journal Article |
| Copyright | 2017 Elsevier Ltd |
| Copyright_xml | – notice: 2017 Elsevier Ltd |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.jnca.2017.11.012 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1095-8592 |
| EndPage | 184 |
| ExternalDocumentID | 10_1016_j_jnca_2017_11_012 S1084804517303922 |
| GroupedDBID | --K --M -~X .~1 0R~ 1B1 1~. 1~5 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO AAYFN ABBOA ABJNI ABMAC ABYKQ ACDAQ ACGFS ACRLP ACZNC ADBBV ADEZE ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD AXJTR BJAXD BKOJK BLXMC CS3 DM4 DU5 EBS EFBJH EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HVGLF IHE J1W JJJVA KOM M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 RIG ROL RPZ SDF SDG SDP SES SPC SPCBC SST SSV SSZ T5K WH7 ZU3 ~G- 29L 9DU AAQXK AATTM AAXKI AAYWO AAYXX ABFNM ABWVN ABXDB ACLOT ACNNM ACRPL ACVFH ADCNI ADFGL ADJOM ADMUD ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP ASPBG AVWKF AZFZN CAG CITATION COF EFKBS FGOYB HZ~ R2- SEW UHS XPP ZMT ~HD |
| ID | FETCH-LOGICAL-c366t-4651716c56a1bd9860ad67affddffa06c7d4eed8b227272edd99ceda4abbc35d3 |
| ISICitedReferencesCount | 18 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000424726600012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1084-8045 |
| IngestDate | Sat Nov 29 07:10:09 EST 2025 Tue Nov 18 22:27:33 EST 2025 Fri Feb 23 02:12:48 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Access control Quantum encryption Categorical quantum mechanics Quantum key distribution |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c366t-4651716c56a1bd9860ad67affddffa06c7d4eed8b227272edd99ceda4abbc35d3 |
| PageCount | 7 |
| ParticipantIDs | crossref_citationtrail_10_1016_j_jnca_2017_11_012 crossref_primary_10_1016_j_jnca_2017_11_012 elsevier_sciencedirect_doi_10_1016_j_jnca_2017_11_012 |
| PublicationCentury | 2000 |
| PublicationDate | 2018-02-01 2018-02-00 |
| PublicationDateYYYYMMDD | 2018-02-01 |
| PublicationDate_xml | – month: 02 year: 2018 text: 2018-02-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationTitle | Journal of network and computer applications |
| PublicationYear | 2018 |
| Publisher | Elsevier Ltd |
| Publisher_xml | – name: Elsevier Ltd |
| References | Bian, Wang (bib4) 2015; 98-A Akl, Taylor (bib2) 1983; 1 Coecke, Kissinger (bib14) 2017 Castiglione, Santis, Masucci, Palmieri, Castiglione, Li, Huang (bib7) 2016; 11 Ledda, Sergioli (bib22) 2010; 49 Boykin, Roychowdhury (bib5) 2003; 67 Yanofsky, Mannucci (bib31) 2008 Kanamori, Yoo (bib19) 2009; 1 Ledda, Konig, Paoli, Giuntini (bib21) 2006; 82 Coecke, Wang, Wang, Wang, Zhang (bib17) 2011; 270 Bennetta C., GillesBrassard., 1984. Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing. p. 175-179. Massey (bib25) 1988; 76 Coecke, Heunen, Kissinger (bib13) 2016; 15 Cattaneo, Chiara, Giuntini, Leporini (bib9) 2004; 43 Shor P.W., 1994. Polynominal time algorithms for discrete logarithms and factoring on a quantum computer. In: Adleman L.M., Huang M.A. (eds.), Algorithmic Number Theory, Proceedings of the First International Symposium, ANTS-I, Ithaca, NY, USA, May 6-9, 1994, Proceedings. Springer; volume 877 of Lecture Notes in Computer Science. p. 289. Castiglione, Santis, Masucci, Palmieri, Huang, Castiglione (bib8) 2017; 387 Liu, Huang, Hu, Khan, Seo, Zhou (bib23) 2017; 14 Nielsen, Chuang (bib26) 2011 Coecke, B., Paquette, É. Categories for the Practising Physicist; Berlin, Heidelberg: Springer Berlin Heidelberg. p. 173–286. Liu, Weng, Hu, Seo (bib24) 2017; 16 Selinger (bib28) 2007; 170 Castiglione, Santis, Masucci, Palmieri, Castiglione, Huang (bib6) 2016; 11 Coecke, Perdrix (bib16) 2010; 8 Abramsky S., Coecke B., 2004. A categorical semantics of quantum protocols. In: Proceedings of the 19th IEEE Symposium on Logic in Computer Science (LICS 2004), 14-17 July 2004, Turku, Finland, Proceedings. IEEE Computer Society. p. 415-425. . Coecke, Duncan (bib11) 2011; 13 Giuntini, Ledda, Paoli (bib18) 2007; 87 Sun, Wang, Kulicki, Zhao (bib30) 2017 Coecke B., Heunen C., Kissinger A., 2013. Compositional quantum logic. In: Coecke B., Ong L., Panangaden P., (eds.), Computation, Logic, Games, and Quantum Foundations. The Many Facets of Samson Abramsky - Essays Dedicated to Samson Abramsky on the Occasion of His 60th Birthday. Springer; volume 7860 of Lecture Notes in Computer Science; 2013. p. 21–36. Lane (bib20) 1998 Qiu, Sun, Xu (bib27) 2017 Chiara, Giuntini, Sergioli, Leporini (bib10) 2016 Chiara (10.1016/j.jnca.2017.11.012_bib10) 2016 Castiglione (10.1016/j.jnca.2017.11.012_bib8) 2017; 387 Ledda (10.1016/j.jnca.2017.11.012_bib21) 2006; 82 Cattaneo (10.1016/j.jnca.2017.11.012_bib9) 2004; 43 Coecke (10.1016/j.jnca.2017.11.012_bib11) 2011; 13 10.1016/j.jnca.2017.11.012_bib3 10.1016/j.jnca.2017.11.012_bib1 Castiglione (10.1016/j.jnca.2017.11.012_bib7) 2016; 11 Coecke (10.1016/j.jnca.2017.11.012_bib17) 2011; 270 10.1016/j.jnca.2017.11.012_bib29 Coecke (10.1016/j.jnca.2017.11.012_bib14) 2017 Giuntini (10.1016/j.jnca.2017.11.012_bib18) 2007; 87 Sun (10.1016/j.jnca.2017.11.012_bib30) 2017 10.1016/j.jnca.2017.11.012_bib12 Liu (10.1016/j.jnca.2017.11.012_bib23) 2017; 14 Massey (10.1016/j.jnca.2017.11.012_bib25) 1988; 76 Coecke (10.1016/j.jnca.2017.11.012_bib13) 2016; 15 Coecke (10.1016/j.jnca.2017.11.012_bib16) 2010; 8 Qiu (10.1016/j.jnca.2017.11.012_bib27) 2017 Kanamori (10.1016/j.jnca.2017.11.012_bib19) 2009; 1 10.1016/j.jnca.2017.11.012_bib15 Ledda (10.1016/j.jnca.2017.11.012_bib22) 2010; 49 Castiglione (10.1016/j.jnca.2017.11.012_bib6) 2016; 11 Lane (10.1016/j.jnca.2017.11.012_bib20) 1998 Akl (10.1016/j.jnca.2017.11.012_bib2) 1983; 1 Nielsen (10.1016/j.jnca.2017.11.012_bib26) 2011 Liu (10.1016/j.jnca.2017.11.012_bib24) 2017; 16 Selinger (10.1016/j.jnca.2017.11.012_bib28) 2007; 170 Boykin (10.1016/j.jnca.2017.11.012_bib5) 2003; 67 Bian (10.1016/j.jnca.2017.11.012_bib4) 2015; 98-A Yanofsky (10.1016/j.jnca.2017.11.012_bib31) 2008 |
| References_xml | – volume: 13 start-page: 1 year: 2011 end-page: 85 ident: bib11 article-title: Interacting quantum observables: categorical algebra and diagrammatics publication-title: New J. Phys. – year: 2011 ident: bib26 article-title: Quantum Computation and Quantum Information – volume: 82 start-page: 245 year: 2006 end-page: 270 ident: bib21 article-title: Mv-algebras and quantum computation publication-title: Stud. Log. – reference: Coecke B., Heunen C., Kissinger A., 2013. Compositional quantum logic. In: Coecke B., Ong L., Panangaden P., (eds.), Computation, Logic, Games, and Quantum Foundations. The Many Facets of Samson Abramsky - Essays Dedicated to Samson Abramsky on the Occasion of His 60th Birthday. Springer; volume 7860 of Lecture Notes in Computer Science; 2013. p. 21–36. 〈 – year: 2008 ident: bib31 article-title: Quantum Computing for Computer Scientists – volume: 14 start-page: 237 year: 2017 end-page: 248 ident: bib23 article-title: On emerging family of elliptic curves to secure internet of things: ECC comes of age publication-title: IEEE Trans. Dependable Sec Comput. – volume: 170 start-page: 139 year: 2007 end-page: 163 ident: bib28 article-title: Dagger compact closed categories and completely positive maps: (extended abstract) publication-title: Electr. Notes Theor. Comput. Sci. – year: 2017 ident: bib30 article-title: Quantum technique for access control in cloud computing I: quantum imperative logic publication-title: Stud. Log. – volume: 11 start-page: 850 year: 2016 end-page: 865 ident: bib7 article-title: Hierarchical and shared access control publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 8 year: 2010 ident: bib16 article-title: Environment and classical channels in categorical quantum mechanics publication-title: Log. Methods Comput. Sci. – volume: 67 start-page: 645 year: 2003 end-page: 648 ident: bib5 article-title: Optimal encryption of quantum bits publication-title: Phys. Rev. A – volume: 15 start-page: 5179 year: 2016 end-page: 5209 ident: bib13 article-title: Categories of quantum and classical channels publication-title: Quantum Inf. Process. – volume: 1 start-page: 64 year: 2009 end-page: 70 ident: bib19 article-title: Quantum three-pass protocol: key distribution using quantum superposition states publication-title: Int. J. Netw. Secur. Appl. – year: 2017 ident: bib14 article-title: Picturing Quantum Processes: A First Course in Quantum Theory and Diagrammatic Reasoning – year: 1998 ident: bib20 article-title: Categories for the Working Mathematician – volume: 43 start-page: 1803 year: 2004 end-page: 1817 ident: bib9 article-title: An unsharp logic from quantum computation publication-title: Int. J. Theor. Phys. – reference: 〉. – volume: 87 start-page: 99 year: 2007 end-page: 128 ident: bib18 article-title: Expanding quasi-mv algebras by a quantum operator publication-title: Stud. Log. – year: 2017 ident: bib27 article-title: Categorical quantum cryptography for access control in cloud computing publication-title: Soft Comput. – volume: 1 start-page: 239 year: 1983 end-page: 248 ident: bib2 article-title: Cryptographic solution to a problem of access control in a hierarchy publication-title: ACM Trans. Comput. Syst. – reference: Coecke, B., Paquette, É. Categories for the Practising Physicist; Berlin, Heidelberg: Springer Berlin Heidelberg. p. 173–286. 〈 – volume: 49 start-page: 3158 year: 2010 end-page: 3165 ident: bib22 article-title: Towards quantum computational logics publication-title: Int. J. Theor. Phys. – volume: 98-A start-page: 391 year: 2015 end-page: 399 ident: bib4 article-title: Graphical calculus for qutrit systems publication-title: IEICE Trans. – volume: 11 start-page: 2349 year: 2016 end-page: 2364 ident: bib6 article-title: Cryptographic hierarchical access control for dynamic structures publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 16 start-page: 53:1 year: 2017 end-page: 53:18 ident: bib24 article-title: Efficient elliptic curve cryptography for embedded devices publication-title: ACM Trans. Embed. Comput. Syst. – reference: Bennetta C., GillesBrassard., 1984. Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing. p. 175-179. – volume: 387 start-page: 56 year: 2017 end-page: 74 ident: bib8 article-title: Supporting dynamic updates in storage clouds with the akl-taylor scheme publication-title: Inf. Sci. – volume: 270 start-page: 231 year: 2011 end-page: 249 ident: bib17 article-title: Graphical calculus for quantum key distribution (extended abstract) publication-title: Electr. Notes Theor. Comput. Sci. – reference: Shor P.W., 1994. Polynominal time algorithms for discrete logarithms and factoring on a quantum computer. In: Adleman L.M., Huang M.A. (eds.), Algorithmic Number Theory, Proceedings of the First International Symposium, ANTS-I, Ithaca, NY, USA, May 6-9, 1994, Proceedings. Springer; volume 877 of Lecture Notes in Computer Science. p. 289. 〈 – volume: 76 start-page: 533 year: 1988 end-page: 549 ident: bib25 article-title: An introduction to contemporary cryptology publication-title: Proc. IEEE – reference: Abramsky S., Coecke B., 2004. A categorical semantics of quantum protocols. In: Proceedings of the 19th IEEE Symposium on Logic in Computer Science (LICS 2004), 14-17 July 2004, Turku, Finland, Proceedings. IEEE Computer Society. p. 415-425. 〈 – year: 2016 ident: bib10 article-title: A many-valued approach to quantum computational logics publication-title: Fuzzy Sets Syst. – volume: 98-A start-page: 391 issue: 1 year: 2015 ident: 10.1016/j.jnca.2017.11.012_bib4 article-title: Graphical calculus for qutrit systems publication-title: IEICE Trans. doi: 10.1587/transfun.E98.A.391 – year: 2016 ident: 10.1016/j.jnca.2017.11.012_bib10 article-title: A many-valued approach to quantum computational logics publication-title: Fuzzy Sets Syst. – volume: 67 start-page: 645 year: 2003 ident: 10.1016/j.jnca.2017.11.012_bib5 article-title: Optimal encryption of quantum bits publication-title: Phys. Rev. A doi: 10.1103/PhysRevA.67.042317 – volume: 387 start-page: 56 year: 2017 ident: 10.1016/j.jnca.2017.11.012_bib8 article-title: Supporting dynamic updates in storage clouds with the akl-taylor scheme publication-title: Inf. Sci. doi: 10.1016/j.ins.2016.08.093 – volume: 76 start-page: 533 year: 1988 ident: 10.1016/j.jnca.2017.11.012_bib25 article-title: An introduction to contemporary cryptology publication-title: Proc. IEEE doi: 10.1109/5.4440 – volume: 1 start-page: 64 issue: 2 year: 2009 ident: 10.1016/j.jnca.2017.11.012_bib19 article-title: Quantum three-pass protocol: key distribution using quantum superposition states publication-title: Int. J. Netw. Secur. Appl. – volume: 16 start-page: 53:1 issue: 2 year: 2017 ident: 10.1016/j.jnca.2017.11.012_bib24 article-title: Efficient elliptic curve cryptography for embedded devices publication-title: ACM Trans. Embed. Comput. Syst. doi: 10.1145/2967103 – volume: 82 start-page: 245 issue: 2 year: 2006 ident: 10.1016/j.jnca.2017.11.012_bib21 article-title: Mv-algebras and quantum computation publication-title: Stud. Log. doi: 10.1007/s11225-006-7202-2 – volume: 87 start-page: 99 issue: 1 year: 2007 ident: 10.1016/j.jnca.2017.11.012_bib18 article-title: Expanding quasi-mv algebras by a quantum operator publication-title: Stud. Log. doi: 10.1007/s11225-007-9079-0 – volume: 11 start-page: 850 issue: 4 year: 2016 ident: 10.1016/j.jnca.2017.11.012_bib7 article-title: Hierarchical and shared access control publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2015.2512533 – ident: 10.1016/j.jnca.2017.11.012_bib3 – ident: 10.1016/j.jnca.2017.11.012_bib12 doi: 10.1007/978-3-642-38164-5_3 – year: 1998 ident: 10.1016/j.jnca.2017.11.012_bib20 – volume: 1 start-page: 239 issue: 3 year: 1983 ident: 10.1016/j.jnca.2017.11.012_bib2 article-title: Cryptographic solution to a problem of access control in a hierarchy publication-title: ACM Trans. Comput. Syst. doi: 10.1145/357369.357372 – volume: 270 start-page: 231 issue: 2 year: 2011 ident: 10.1016/j.jnca.2017.11.012_bib17 article-title: Graphical calculus for quantum key distribution (extended abstract) publication-title: Electr. Notes Theor. Comput. Sci. doi: 10.1016/j.entcs.2011.01.034 – ident: 10.1016/j.jnca.2017.11.012_bib29 doi: 10.1007/3-540-58691-1_68 – volume: 13 start-page: 1 issue: 043016 year: 2011 ident: 10.1016/j.jnca.2017.11.012_bib11 article-title: Interacting quantum observables: categorical algebra and diagrammatics publication-title: New J. Phys. – volume: 8 issue: 4 year: 2010 ident: 10.1016/j.jnca.2017.11.012_bib16 article-title: Environment and classical channels in categorical quantum mechanics publication-title: Log. Methods Comput. Sci. doi: 10.1007/978-3-642-15205-4_20 – volume: 11 start-page: 2349 issue: 10 year: 2016 ident: 10.1016/j.jnca.2017.11.012_bib6 article-title: Cryptographic hierarchical access control for dynamic structures publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2016.2581147 – volume: 43 start-page: 1803 issue: 7 year: 2004 ident: 10.1016/j.jnca.2017.11.012_bib9 article-title: An unsharp logic from quantum computation publication-title: Int. J. Theor. Phys. doi: 10.1023/B:IJTP.0000048821.56239.cb – volume: 49 start-page: 3158 issue: 12 year: 2010 ident: 10.1016/j.jnca.2017.11.012_bib22 article-title: Towards quantum computational logics publication-title: Int. J. Theor. Phys. doi: 10.1007/s10773-010-0368-4 – year: 2011 ident: 10.1016/j.jnca.2017.11.012_bib26 – year: 2017 ident: 10.1016/j.jnca.2017.11.012_bib27 article-title: Categorical quantum cryptography for access control in cloud computing publication-title: Soft Comput. – year: 2008 ident: 10.1016/j.jnca.2017.11.012_bib31 – ident: 10.1016/j.jnca.2017.11.012_bib15 doi: 10.1007/978-3-642-12821-9_3 – volume: 14 start-page: 237 issue: 3 year: 2017 ident: 10.1016/j.jnca.2017.11.012_bib23 article-title: On emerging family of elliptic curves to secure internet of things: ECC comes of age publication-title: IEEE Trans. Dependable Sec Comput. – year: 2017 ident: 10.1016/j.jnca.2017.11.012_bib30 article-title: Quantum technique for access control in cloud computing I: quantum imperative logic publication-title: Stud. Log. – ident: 10.1016/j.jnca.2017.11.012_bib1 doi: 10.1109/LICS.2004.1319636 – volume: 170 start-page: 139 year: 2007 ident: 10.1016/j.jnca.2017.11.012_bib28 article-title: Dagger compact closed categories and completely positive maps: (extended abstract) publication-title: Electr. Notes Theor. Comput. Sci. doi: 10.1016/j.entcs.2006.12.018 – volume: 15 start-page: 5179 issue: 12 year: 2016 ident: 10.1016/j.jnca.2017.11.012_bib13 article-title: Categories of quantum and classical channels publication-title: Quantum Inf. Process. doi: 10.1007/s11128-014-0837-4 – year: 2017 ident: 10.1016/j.jnca.2017.11.012_bib14 |
| SSID | ssj0006493 |
| Score | 2.3145084 |
| Snippet | This is the second paper of the series of papers dealing with access control problems in cloud computing by adopting quantum techniques. In this paper we study... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 178 |
| SubjectTerms | Access control Categorical quantum mechanics Quantum encryption Quantum key distribution |
| Title | Quantum technique for access control in cloud computing II: Encryption and key distribution |
| URI | https://dx.doi.org/10.1016/j.jnca.2017.11.012 |
| Volume | 103 |
| WOSCitedRecordID | wos000424726600012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1095-8592 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0006493 issn: 1084-8045 databaseCode: AIEXJ dateStart: 19960101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1La9wwEBZL0kN76CNtSfpCh94WB3lty1JvoWypewgppLDQg5ElGXbZ2st2HZJ_kZ_c0cOymzahOfRilmUtezWfR-PRN_Mh9L7mTJNKV1HCMhmlCt5ZWVyLqK5IIiBcyGgtrdhEfnrKFgt-Nplc97UwF-u8adjlJd_8V1PDd2BsUzp7D3OHQeEL-AxGhyOYHY7_ZPivHUxW92M6dGe1REkrjBiY6YZ9vm47W9K26Sz1uShMdmDeyO2VcyMmpQ6PuNnDCbJYt8SyjSOT90VyVidiOt4bH_LTbWdTAd2QyXfextz2uvXrqN2lsv5wsRxoAh0M51S2z5btbjtOWMSs5zgHH0tYCguj6yIZnDBJRm40drI-fkWOnYjcH87e5R1WxyuT_IEr5cemH6tnZf_WWfvGihd4iD3FbVWaMUozBrwSlcTIVu_P8oyDq98_KeaLL2F1pyn3RRvuT_hCLMcZvHknfw92RgHM-VP02FsLnzjEPEMT3RygJ72qB_ZO_gA9GrWofI6-ezjhACcMcMIOTtjDCS8bbOGEA5xwUXzAA5gwIAMDmPAYTC_Qt0_z84-fIy_IEcmE0l2U0sx0V5IZFXGlOKNEKJqLulaqrgWhMlcpxFysms3M_r5WinOplUhFVckkU8lLtNe0jT5EOJUiloQnuoYZhRBe0CTWxCTXcgnTSo9Q3M9cKX23eiOasi5vt9kRmoZzNq5Xy52_znqDlD7adFFkCfi647xX97rKa_RweAbeoL3dttNv0QN5sVv-3L7z4PoFbmGkXQ |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Quantum+technique+for+access+control+in+cloud+computing+II%3A+Encryption+and+key+distribution&rft.jtitle=Journal+of+network+and+computer+applications&rft.au=Zhou%2C+Lu&rft.au=Wang%2C+Quanlong&rft.au=Sun%2C+Xin&rft.au=Kulicki%2C+Piotr&rft.date=2018-02-01&rft.issn=1084-8045&rft.volume=103&rft.spage=178&rft.epage=184&rft_id=info:doi/10.1016%2Fj.jnca.2017.11.012&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_jnca_2017_11_012 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1084-8045&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1084-8045&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1084-8045&client=summon |