Quantum technique for access control in cloud computing II: Encryption and key distribution

This is the second paper of the series of papers dealing with access control problems in cloud computing by adopting quantum techniques. In this paper we study the application of quantum encryption and quantum key distribution in the access control problem. We formalize our encryption scheme and pro...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of network and computer applications Jg. 103; S. 178 - 184
Hauptverfasser: Zhou, Lu, Wang, Quanlong, Sun, Xin, Kulicki, Piotr, Castiglione, Arcangelo
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Elsevier Ltd 01.02.2018
Schlagworte:
ISSN:1084-8045, 1095-8592
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract This is the second paper of the series of papers dealing with access control problems in cloud computing by adopting quantum techniques. In this paper we study the application of quantum encryption and quantum key distribution in the access control problem. We formalize our encryption scheme and protocol for key distribution in the setting of categorical quantum mechanics (CQM). The graphical language of CQM is used in this paper. The quantum scheme/protocol we propose possesses several advantages over existing schemes/protocols proposed in the state of the art for the same purpose. They are informationally secure and implementable by the current technology.
AbstractList This is the second paper of the series of papers dealing with access control problems in cloud computing by adopting quantum techniques. In this paper we study the application of quantum encryption and quantum key distribution in the access control problem. We formalize our encryption scheme and protocol for key distribution in the setting of categorical quantum mechanics (CQM). The graphical language of CQM is used in this paper. The quantum scheme/protocol we propose possesses several advantages over existing schemes/protocols proposed in the state of the art for the same purpose. They are informationally secure and implementable by the current technology.
Author Zhou, Lu
Castiglione, Arcangelo
Kulicki, Piotr
Sun, Xin
Wang, Quanlong
Author_xml – sequence: 1
  givenname: Lu
  surname: Zhou
  fullname: Zhou, Lu
  organization: University of Aizu, Japan
– sequence: 2
  givenname: Quanlong
  surname: Wang
  fullname: Wang, Quanlong
  organization: University of Oxford, UK
– sequence: 3
  givenname: Xin
  surname: Sun
  fullname: Sun, Xin
  email: xin.sun.logic@gmail.com
  organization: Sun Yat-sen University, China
– sequence: 4
  givenname: Piotr
  surname: Kulicki
  fullname: Kulicki, Piotr
  organization: The John Paul II Catholic University of Lublin, Poland
– sequence: 5
  givenname: Arcangelo
  surname: Castiglione
  fullname: Castiglione, Arcangelo
  organization: University of Salerno, Italy
BookMark eNp9kM9KAzEQh4NUsK2-gKe8wK7J_snuihcpVQsFEfTkIWQniWbdJjXJCn17d6knD2UOM_zgG2a-BZpZZxVC15SklFB206WdBZFmhFYppSmh2RmaU9KUSV022Wya6yKpSVFeoEUIHSGEFU0-R-8vg7Bx2OGo4NOa70Fh7TwWACoEDM5G73psLIbeDXIMdvshGvuBN5tbvLbgD_tonMXCSvylDliaEL1phym8ROda9EFd_fUlentYv66eku3z42Z1v00gZywmBStpRRmUTNBWNjUjQrJKaC2l1oIwqGShlKzbLKvGUlI2DSgpCtG2kJcyX6L6uBe8C8ErzcFEMV0QvTA9p4RPknjHJ0l8ksQp5aOkEc3-oXtvdsIfTkN3R0iNT_0Y5XkAo-x4k_EKIpfOnMJ_AfBjhac
CitedBy_id crossref_primary_10_1007_s40747_022_00829_z
crossref_primary_10_3390_axioms9010028
crossref_primary_10_1016_j_jnca_2025_104156
crossref_primary_10_3390_s20113108
crossref_primary_10_1007_s10773_018_3929_6
crossref_primary_10_1016_j_jnca_2020_102810
crossref_primary_10_1007_s11277_023_10354_y
crossref_primary_10_1088_1757_899X_993_1_012093
crossref_primary_10_1109_COMST_2022_3144219
crossref_primary_10_1016_j_jnca_2018_03_016
crossref_primary_10_1109_ACCESS_2019_2926354
crossref_primary_10_1007_s12083_021_01150_1
crossref_primary_10_1002_spe_3039
crossref_primary_10_1007_s11831_022_09809_5
Cites_doi 10.1587/transfun.E98.A.391
10.1103/PhysRevA.67.042317
10.1016/j.ins.2016.08.093
10.1109/5.4440
10.1145/2967103
10.1007/s11225-006-7202-2
10.1007/s11225-007-9079-0
10.1109/TIFS.2015.2512533
10.1007/978-3-642-38164-5_3
10.1145/357369.357372
10.1016/j.entcs.2011.01.034
10.1007/3-540-58691-1_68
10.1007/978-3-642-15205-4_20
10.1109/TIFS.2016.2581147
10.1023/B:IJTP.0000048821.56239.cb
10.1007/s10773-010-0368-4
10.1007/978-3-642-12821-9_3
10.1109/LICS.2004.1319636
10.1016/j.entcs.2006.12.018
10.1007/s11128-014-0837-4
ContentType Journal Article
Copyright 2017 Elsevier Ltd
Copyright_xml – notice: 2017 Elsevier Ltd
DBID AAYXX
CITATION
DOI 10.1016/j.jnca.2017.11.012
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1095-8592
EndPage 184
ExternalDocumentID 10_1016_j_jnca_2017_11_012
S1084804517303922
GroupedDBID --K
--M
-~X
.~1
0R~
1B1
1~.
1~5
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXUO
AAYFN
ABBOA
ABJNI
ABMAC
ABYKQ
ACDAQ
ACGFS
ACRLP
ACZNC
ADBBV
ADEZE
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
AXJTR
BJAXD
BKOJK
BLXMC
CS3
DM4
DU5
EBS
EFBJH
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HVGLF
IHE
J1W
JJJVA
KOM
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
RIG
ROL
RPZ
SDF
SDG
SDP
SES
SPC
SPCBC
SST
SSV
SSZ
T5K
WH7
ZU3
~G-
29L
9DU
AAQXK
AATTM
AAXKI
AAYWO
AAYXX
ABFNM
ABWVN
ABXDB
ACLOT
ACNNM
ACRPL
ACVFH
ADCNI
ADFGL
ADJOM
ADMUD
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
ASPBG
AVWKF
AZFZN
CAG
CITATION
COF
EFKBS
FGOYB
HZ~
R2-
SEW
UHS
XPP
ZMT
~HD
ID FETCH-LOGICAL-c366t-4651716c56a1bd9860ad67affddffa06c7d4eed8b227272edd99ceda4abbc35d3
ISICitedReferencesCount 18
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000424726600012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1084-8045
IngestDate Sat Nov 29 07:10:09 EST 2025
Tue Nov 18 22:27:33 EST 2025
Fri Feb 23 02:12:48 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Access control
Quantum encryption
Categorical quantum mechanics
Quantum key distribution
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c366t-4651716c56a1bd9860ad67affddffa06c7d4eed8b227272edd99ceda4abbc35d3
PageCount 7
ParticipantIDs crossref_citationtrail_10_1016_j_jnca_2017_11_012
crossref_primary_10_1016_j_jnca_2017_11_012
elsevier_sciencedirect_doi_10_1016_j_jnca_2017_11_012
PublicationCentury 2000
PublicationDate 2018-02-01
2018-02-00
PublicationDateYYYYMMDD 2018-02-01
PublicationDate_xml – month: 02
  year: 2018
  text: 2018-02-01
  day: 01
PublicationDecade 2010
PublicationTitle Journal of network and computer applications
PublicationYear 2018
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Bian, Wang (bib4) 2015; 98-A
Akl, Taylor (bib2) 1983; 1
Coecke, Kissinger (bib14) 2017
Castiglione, Santis, Masucci, Palmieri, Castiglione, Li, Huang (bib7) 2016; 11
Ledda, Sergioli (bib22) 2010; 49
Boykin, Roychowdhury (bib5) 2003; 67
Yanofsky, Mannucci (bib31) 2008
Kanamori, Yoo (bib19) 2009; 1
Ledda, Konig, Paoli, Giuntini (bib21) 2006; 82
Coecke, Wang, Wang, Wang, Zhang (bib17) 2011; 270
Bennetta C., GillesBrassard., 1984. Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing. p. 175-179.
Massey (bib25) 1988; 76
Coecke, Heunen, Kissinger (bib13) 2016; 15
Cattaneo, Chiara, Giuntini, Leporini (bib9) 2004; 43
Shor P.W., 1994. Polynominal time algorithms for discrete logarithms and factoring on a quantum computer. In: Adleman L.M., Huang M.A. (eds.), Algorithmic Number Theory, Proceedings of the First International Symposium, ANTS-I, Ithaca, NY, USA, May 6-9, 1994, Proceedings. Springer; volume 877 of Lecture Notes in Computer Science. p. 289.
Castiglione, Santis, Masucci, Palmieri, Huang, Castiglione (bib8) 2017; 387
Liu, Huang, Hu, Khan, Seo, Zhou (bib23) 2017; 14
Nielsen, Chuang (bib26) 2011
Coecke, B., Paquette, É. Categories for the Practising Physicist; Berlin, Heidelberg: Springer Berlin Heidelberg. p. 173–286.
Liu, Weng, Hu, Seo (bib24) 2017; 16
Selinger (bib28) 2007; 170
Castiglione, Santis, Masucci, Palmieri, Castiglione, Huang (bib6) 2016; 11
Coecke, Perdrix (bib16) 2010; 8
Abramsky S., Coecke B., 2004. A categorical semantics of quantum protocols. In: Proceedings of the 19th IEEE Symposium on Logic in Computer Science (LICS 2004), 14-17 July 2004, Turku, Finland, Proceedings. IEEE Computer Society. p. 415-425.
.
Coecke, Duncan (bib11) 2011; 13
Giuntini, Ledda, Paoli (bib18) 2007; 87
Sun, Wang, Kulicki, Zhao (bib30) 2017
Coecke B., Heunen C., Kissinger A., 2013. Compositional quantum logic. In: Coecke B., Ong L., Panangaden P., (eds.), Computation, Logic, Games, and Quantum Foundations. The Many Facets of Samson Abramsky - Essays Dedicated to Samson Abramsky on the Occasion of His 60th Birthday. Springer; volume 7860 of Lecture Notes in Computer Science; 2013. p. 21–36.
Lane (bib20) 1998
Qiu, Sun, Xu (bib27) 2017
Chiara, Giuntini, Sergioli, Leporini (bib10) 2016
Chiara (10.1016/j.jnca.2017.11.012_bib10) 2016
Castiglione (10.1016/j.jnca.2017.11.012_bib8) 2017; 387
Ledda (10.1016/j.jnca.2017.11.012_bib21) 2006; 82
Cattaneo (10.1016/j.jnca.2017.11.012_bib9) 2004; 43
Coecke (10.1016/j.jnca.2017.11.012_bib11) 2011; 13
10.1016/j.jnca.2017.11.012_bib3
10.1016/j.jnca.2017.11.012_bib1
Castiglione (10.1016/j.jnca.2017.11.012_bib7) 2016; 11
Coecke (10.1016/j.jnca.2017.11.012_bib17) 2011; 270
10.1016/j.jnca.2017.11.012_bib29
Coecke (10.1016/j.jnca.2017.11.012_bib14) 2017
Giuntini (10.1016/j.jnca.2017.11.012_bib18) 2007; 87
Sun (10.1016/j.jnca.2017.11.012_bib30) 2017
10.1016/j.jnca.2017.11.012_bib12
Liu (10.1016/j.jnca.2017.11.012_bib23) 2017; 14
Massey (10.1016/j.jnca.2017.11.012_bib25) 1988; 76
Coecke (10.1016/j.jnca.2017.11.012_bib13) 2016; 15
Coecke (10.1016/j.jnca.2017.11.012_bib16) 2010; 8
Qiu (10.1016/j.jnca.2017.11.012_bib27) 2017
Kanamori (10.1016/j.jnca.2017.11.012_bib19) 2009; 1
10.1016/j.jnca.2017.11.012_bib15
Ledda (10.1016/j.jnca.2017.11.012_bib22) 2010; 49
Castiglione (10.1016/j.jnca.2017.11.012_bib6) 2016; 11
Lane (10.1016/j.jnca.2017.11.012_bib20) 1998
Akl (10.1016/j.jnca.2017.11.012_bib2) 1983; 1
Nielsen (10.1016/j.jnca.2017.11.012_bib26) 2011
Liu (10.1016/j.jnca.2017.11.012_bib24) 2017; 16
Selinger (10.1016/j.jnca.2017.11.012_bib28) 2007; 170
Boykin (10.1016/j.jnca.2017.11.012_bib5) 2003; 67
Bian (10.1016/j.jnca.2017.11.012_bib4) 2015; 98-A
Yanofsky (10.1016/j.jnca.2017.11.012_bib31) 2008
References_xml – volume: 13
  start-page: 1
  year: 2011
  end-page: 85
  ident: bib11
  article-title: Interacting quantum observables: categorical algebra and diagrammatics
  publication-title: New J. Phys.
– year: 2011
  ident: bib26
  article-title: Quantum Computation and Quantum Information
– volume: 82
  start-page: 245
  year: 2006
  end-page: 270
  ident: bib21
  article-title: Mv-algebras and quantum computation
  publication-title: Stud. Log.
– reference: Coecke B., Heunen C., Kissinger A., 2013. Compositional quantum logic. In: Coecke B., Ong L., Panangaden P., (eds.), Computation, Logic, Games, and Quantum Foundations. The Many Facets of Samson Abramsky - Essays Dedicated to Samson Abramsky on the Occasion of His 60th Birthday. Springer; volume 7860 of Lecture Notes in Computer Science; 2013. p. 21–36. 〈
– year: 2008
  ident: bib31
  article-title: Quantum Computing for Computer Scientists
– volume: 14
  start-page: 237
  year: 2017
  end-page: 248
  ident: bib23
  article-title: On emerging family of elliptic curves to secure internet of things: ECC comes of age
  publication-title: IEEE Trans. Dependable Sec Comput.
– volume: 170
  start-page: 139
  year: 2007
  end-page: 163
  ident: bib28
  article-title: Dagger compact closed categories and completely positive maps: (extended abstract)
  publication-title: Electr. Notes Theor. Comput. Sci.
– year: 2017
  ident: bib30
  article-title: Quantum technique for access control in cloud computing I: quantum imperative logic
  publication-title: Stud. Log.
– volume: 11
  start-page: 850
  year: 2016
  end-page: 865
  ident: bib7
  article-title: Hierarchical and shared access control
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 8
  year: 2010
  ident: bib16
  article-title: Environment and classical channels in categorical quantum mechanics
  publication-title: Log. Methods Comput. Sci.
– volume: 67
  start-page: 645
  year: 2003
  end-page: 648
  ident: bib5
  article-title: Optimal encryption of quantum bits
  publication-title: Phys. Rev. A
– volume: 15
  start-page: 5179
  year: 2016
  end-page: 5209
  ident: bib13
  article-title: Categories of quantum and classical channels
  publication-title: Quantum Inf. Process.
– volume: 1
  start-page: 64
  year: 2009
  end-page: 70
  ident: bib19
  article-title: Quantum three-pass protocol: key distribution using quantum superposition states
  publication-title: Int. J. Netw. Secur. Appl.
– year: 2017
  ident: bib14
  article-title: Picturing Quantum Processes: A First Course in Quantum Theory and Diagrammatic Reasoning
– year: 1998
  ident: bib20
  article-title: Categories for the Working Mathematician
– volume: 43
  start-page: 1803
  year: 2004
  end-page: 1817
  ident: bib9
  article-title: An unsharp logic from quantum computation
  publication-title: Int. J. Theor. Phys.
– reference: 〉.
– volume: 87
  start-page: 99
  year: 2007
  end-page: 128
  ident: bib18
  article-title: Expanding quasi-mv algebras by a quantum operator
  publication-title: Stud. Log.
– year: 2017
  ident: bib27
  article-title: Categorical quantum cryptography for access control in cloud computing
  publication-title: Soft Comput.
– volume: 1
  start-page: 239
  year: 1983
  end-page: 248
  ident: bib2
  article-title: Cryptographic solution to a problem of access control in a hierarchy
  publication-title: ACM Trans. Comput. Syst.
– reference: Coecke, B., Paquette, É. Categories for the Practising Physicist; Berlin, Heidelberg: Springer Berlin Heidelberg. p. 173–286. 〈
– volume: 49
  start-page: 3158
  year: 2010
  end-page: 3165
  ident: bib22
  article-title: Towards quantum computational logics
  publication-title: Int. J. Theor. Phys.
– volume: 98-A
  start-page: 391
  year: 2015
  end-page: 399
  ident: bib4
  article-title: Graphical calculus for qutrit systems
  publication-title: IEICE Trans.
– volume: 11
  start-page: 2349
  year: 2016
  end-page: 2364
  ident: bib6
  article-title: Cryptographic hierarchical access control for dynamic structures
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 16
  start-page: 53:1
  year: 2017
  end-page: 53:18
  ident: bib24
  article-title: Efficient elliptic curve cryptography for embedded devices
  publication-title: ACM Trans. Embed. Comput. Syst.
– reference: Bennetta C., GillesBrassard., 1984. Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing. p. 175-179.
– volume: 387
  start-page: 56
  year: 2017
  end-page: 74
  ident: bib8
  article-title: Supporting dynamic updates in storage clouds with the akl-taylor scheme
  publication-title: Inf. Sci.
– volume: 270
  start-page: 231
  year: 2011
  end-page: 249
  ident: bib17
  article-title: Graphical calculus for quantum key distribution (extended abstract)
  publication-title: Electr. Notes Theor. Comput. Sci.
– reference: Shor P.W., 1994. Polynominal time algorithms for discrete logarithms and factoring on a quantum computer. In: Adleman L.M., Huang M.A. (eds.), Algorithmic Number Theory, Proceedings of the First International Symposium, ANTS-I, Ithaca, NY, USA, May 6-9, 1994, Proceedings. Springer; volume 877 of Lecture Notes in Computer Science. p. 289. 〈
– volume: 76
  start-page: 533
  year: 1988
  end-page: 549
  ident: bib25
  article-title: An introduction to contemporary cryptology
  publication-title: Proc. IEEE
– reference: Abramsky S., Coecke B., 2004. A categorical semantics of quantum protocols. In: Proceedings of the 19th IEEE Symposium on Logic in Computer Science (LICS 2004), 14-17 July 2004, Turku, Finland, Proceedings. IEEE Computer Society. p. 415-425. 〈
– year: 2016
  ident: bib10
  article-title: A many-valued approach to quantum computational logics
  publication-title: Fuzzy Sets Syst.
– volume: 98-A
  start-page: 391
  issue: 1
  year: 2015
  ident: 10.1016/j.jnca.2017.11.012_bib4
  article-title: Graphical calculus for qutrit systems
  publication-title: IEICE Trans.
  doi: 10.1587/transfun.E98.A.391
– year: 2016
  ident: 10.1016/j.jnca.2017.11.012_bib10
  article-title: A many-valued approach to quantum computational logics
  publication-title: Fuzzy Sets Syst.
– volume: 67
  start-page: 645
  year: 2003
  ident: 10.1016/j.jnca.2017.11.012_bib5
  article-title: Optimal encryption of quantum bits
  publication-title: Phys. Rev. A
  doi: 10.1103/PhysRevA.67.042317
– volume: 387
  start-page: 56
  year: 2017
  ident: 10.1016/j.jnca.2017.11.012_bib8
  article-title: Supporting dynamic updates in storage clouds with the akl-taylor scheme
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2016.08.093
– volume: 76
  start-page: 533
  year: 1988
  ident: 10.1016/j.jnca.2017.11.012_bib25
  article-title: An introduction to contemporary cryptology
  publication-title: Proc. IEEE
  doi: 10.1109/5.4440
– volume: 1
  start-page: 64
  issue: 2
  year: 2009
  ident: 10.1016/j.jnca.2017.11.012_bib19
  article-title: Quantum three-pass protocol: key distribution using quantum superposition states
  publication-title: Int. J. Netw. Secur. Appl.
– volume: 16
  start-page: 53:1
  issue: 2
  year: 2017
  ident: 10.1016/j.jnca.2017.11.012_bib24
  article-title: Efficient elliptic curve cryptography for embedded devices
  publication-title: ACM Trans. Embed. Comput. Syst.
  doi: 10.1145/2967103
– volume: 82
  start-page: 245
  issue: 2
  year: 2006
  ident: 10.1016/j.jnca.2017.11.012_bib21
  article-title: Mv-algebras and quantum computation
  publication-title: Stud. Log.
  doi: 10.1007/s11225-006-7202-2
– volume: 87
  start-page: 99
  issue: 1
  year: 2007
  ident: 10.1016/j.jnca.2017.11.012_bib18
  article-title: Expanding quasi-mv algebras by a quantum operator
  publication-title: Stud. Log.
  doi: 10.1007/s11225-007-9079-0
– volume: 11
  start-page: 850
  issue: 4
  year: 2016
  ident: 10.1016/j.jnca.2017.11.012_bib7
  article-title: Hierarchical and shared access control
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2015.2512533
– ident: 10.1016/j.jnca.2017.11.012_bib3
– ident: 10.1016/j.jnca.2017.11.012_bib12
  doi: 10.1007/978-3-642-38164-5_3
– year: 1998
  ident: 10.1016/j.jnca.2017.11.012_bib20
– volume: 1
  start-page: 239
  issue: 3
  year: 1983
  ident: 10.1016/j.jnca.2017.11.012_bib2
  article-title: Cryptographic solution to a problem of access control in a hierarchy
  publication-title: ACM Trans. Comput. Syst.
  doi: 10.1145/357369.357372
– volume: 270
  start-page: 231
  issue: 2
  year: 2011
  ident: 10.1016/j.jnca.2017.11.012_bib17
  article-title: Graphical calculus for quantum key distribution (extended abstract)
  publication-title: Electr. Notes Theor. Comput. Sci.
  doi: 10.1016/j.entcs.2011.01.034
– ident: 10.1016/j.jnca.2017.11.012_bib29
  doi: 10.1007/3-540-58691-1_68
– volume: 13
  start-page: 1
  issue: 043016
  year: 2011
  ident: 10.1016/j.jnca.2017.11.012_bib11
  article-title: Interacting quantum observables: categorical algebra and diagrammatics
  publication-title: New J. Phys.
– volume: 8
  issue: 4
  year: 2010
  ident: 10.1016/j.jnca.2017.11.012_bib16
  article-title: Environment and classical channels in categorical quantum mechanics
  publication-title: Log. Methods Comput. Sci.
  doi: 10.1007/978-3-642-15205-4_20
– volume: 11
  start-page: 2349
  issue: 10
  year: 2016
  ident: 10.1016/j.jnca.2017.11.012_bib6
  article-title: Cryptographic hierarchical access control for dynamic structures
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2016.2581147
– volume: 43
  start-page: 1803
  issue: 7
  year: 2004
  ident: 10.1016/j.jnca.2017.11.012_bib9
  article-title: An unsharp logic from quantum computation
  publication-title: Int. J. Theor. Phys.
  doi: 10.1023/B:IJTP.0000048821.56239.cb
– volume: 49
  start-page: 3158
  issue: 12
  year: 2010
  ident: 10.1016/j.jnca.2017.11.012_bib22
  article-title: Towards quantum computational logics
  publication-title: Int. J. Theor. Phys.
  doi: 10.1007/s10773-010-0368-4
– year: 2011
  ident: 10.1016/j.jnca.2017.11.012_bib26
– year: 2017
  ident: 10.1016/j.jnca.2017.11.012_bib27
  article-title: Categorical quantum cryptography for access control in cloud computing
  publication-title: Soft Comput.
– year: 2008
  ident: 10.1016/j.jnca.2017.11.012_bib31
– ident: 10.1016/j.jnca.2017.11.012_bib15
  doi: 10.1007/978-3-642-12821-9_3
– volume: 14
  start-page: 237
  issue: 3
  year: 2017
  ident: 10.1016/j.jnca.2017.11.012_bib23
  article-title: On emerging family of elliptic curves to secure internet of things: ECC comes of age
  publication-title: IEEE Trans. Dependable Sec Comput.
– year: 2017
  ident: 10.1016/j.jnca.2017.11.012_bib30
  article-title: Quantum technique for access control in cloud computing I: quantum imperative logic
  publication-title: Stud. Log.
– ident: 10.1016/j.jnca.2017.11.012_bib1
  doi: 10.1109/LICS.2004.1319636
– volume: 170
  start-page: 139
  year: 2007
  ident: 10.1016/j.jnca.2017.11.012_bib28
  article-title: Dagger compact closed categories and completely positive maps: (extended abstract)
  publication-title: Electr. Notes Theor. Comput. Sci.
  doi: 10.1016/j.entcs.2006.12.018
– volume: 15
  start-page: 5179
  issue: 12
  year: 2016
  ident: 10.1016/j.jnca.2017.11.012_bib13
  article-title: Categories of quantum and classical channels
  publication-title: Quantum Inf. Process.
  doi: 10.1007/s11128-014-0837-4
– year: 2017
  ident: 10.1016/j.jnca.2017.11.012_bib14
SSID ssj0006493
Score 2.3145084
Snippet This is the second paper of the series of papers dealing with access control problems in cloud computing by adopting quantum techniques. In this paper we study...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 178
SubjectTerms Access control
Categorical quantum mechanics
Quantum encryption
Quantum key distribution
Title Quantum technique for access control in cloud computing II: Encryption and key distribution
URI https://dx.doi.org/10.1016/j.jnca.2017.11.012
Volume 103
WOSCitedRecordID wos000424726600012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1095-8592
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0006493
  issn: 1084-8045
  databaseCode: AIEXJ
  dateStart: 19960101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1La9wwEBZL0kN76CNtSfpCh94WB3lty1JvoWypewgppLDQg5ElGXbZ2st2HZJ_kZ_c0cOymzahOfRilmUtezWfR-PRN_Mh9L7mTJNKV1HCMhmlCt5ZWVyLqK5IIiBcyGgtrdhEfnrKFgt-Nplc97UwF-u8adjlJd_8V1PDd2BsUzp7D3OHQeEL-AxGhyOYHY7_ZPivHUxW92M6dGe1REkrjBiY6YZ9vm47W9K26Sz1uShMdmDeyO2VcyMmpQ6PuNnDCbJYt8SyjSOT90VyVidiOt4bH_LTbWdTAd2QyXfextz2uvXrqN2lsv5wsRxoAh0M51S2z5btbjtOWMSs5zgHH0tYCguj6yIZnDBJRm40drI-fkWOnYjcH87e5R1WxyuT_IEr5cemH6tnZf_WWfvGihd4iD3FbVWaMUozBrwSlcTIVu_P8oyDq98_KeaLL2F1pyn3RRvuT_hCLMcZvHknfw92RgHM-VP02FsLnzjEPEMT3RygJ72qB_ZO_gA9GrWofI6-ezjhACcMcMIOTtjDCS8bbOGEA5xwUXzAA5gwIAMDmPAYTC_Qt0_z84-fIy_IEcmE0l2U0sx0V5IZFXGlOKNEKJqLulaqrgWhMlcpxFysms3M_r5WinOplUhFVckkU8lLtNe0jT5EOJUiloQnuoYZhRBe0CTWxCTXcgnTSo9Q3M9cKX23eiOasi5vt9kRmoZzNq5Xy52_znqDlD7adFFkCfi647xX97rKa_RweAbeoL3dttNv0QN5sVv-3L7z4PoFbmGkXQ
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Quantum+technique+for+access+control+in+cloud+computing+II%3A+Encryption+and+key+distribution&rft.jtitle=Journal+of+network+and+computer+applications&rft.au=Zhou%2C+Lu&rft.au=Wang%2C+Quanlong&rft.au=Sun%2C+Xin&rft.au=Kulicki%2C+Piotr&rft.date=2018-02-01&rft.issn=1084-8045&rft.volume=103&rft.spage=178&rft.epage=184&rft_id=info:doi/10.1016%2Fj.jnca.2017.11.012&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_jnca_2017_11_012
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1084-8045&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1084-8045&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1084-8045&client=summon