Write, autoreview, editor, reviewer
3,129
edits
No edit summary |
|||
Line 11: | Line 11: | ||
==Outline== | ==Outline== | ||
Like other QDS protocols, it is divided into two phases: Distribution (Key Generation) and Messaging (signature and verification). This scheme is presented between PKG, a Seller and a buyer.</br> | |||
* '''Key Generation''': In this method, the PKG generates a private key for the Signer and sends the same. This transaction can take place on both secure and insecure channels. | * '''Key Generation''': In this method, the PKG generates a private key for the Signer and sends the same. This transaction can take place on both secure and insecure channels. | ||
** Using identity-based encryption, Signer's public key is generated using their personal public information like email or ID card. This public key is accessible on open channels. | ** Using identity-based encryption, Signer's public key is generated using their personal public information like email or ID card. This public key is accessible on open channels. | ||
Line 70: | Line 70: | ||
==Hardware Requirements== | ==Hardware Requirements== | ||
*The total number of qubits used in this protocol is equal to the total number of qubits in the message. | |||
* Secure quantum channel between Signer and Verifier | * Secure quantum channel between Signer and Verifier | ||
* Quantum channel between Signer and PKG | * Quantum channel between Signer and PKG |