{"id":"https://openalex.org/W4393141794","doi":"https://doi.org/10.1109/ants59832.2023.10469296","title":"A Post-Quantum End-to-End Encryption Protocol","display_name":"A Post-Quantum End-to-End Encryption Protocol","publication_year":2023,"publication_date":"2023-12-17","ids":{"openalex":"https://openalex.org/W4393141794","doi":"https://doi.org/10.1109/ants59832.2023.10469296"},"language":"en","primary_location":{"id":"doi:10.1109/ants59832.2023.10469296","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ants59832.2023.10469296","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049121034","display_name":"Shashvat Sharma","orcid":null},"institutions":[{"id":"https://openalex.org/I83205935","display_name":"Malaviya National Institute of Technology Jaipur","ror":"https://ror.org/0077k1j32","country_code":"IN","type":"education","lineage":["https://openalex.org/I83205935"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Shashvat Sharma","raw_affiliation_strings":["Malaviya National Institute of Technology (MNIT),Department Of Computer Science and Engineering,Jaipur,India"],"affiliations":[{"raw_affiliation_string":"Malaviya National Institute of Technology (MNIT),Department Of Computer Science and Engineering,Jaipur,India","institution_ids":["https://openalex.org/I83205935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074885448","display_name":"Meenakshi Tripathi","orcid":"https://orcid.org/0000-0002-6559-5151"},"institutions":[{"id":"https://openalex.org/I83205935","display_name":"Malaviya National Institute of Technology Jaipur","ror":"https://ror.org/0077k1j32","country_code":"IN","type":"education","lineage":["https://openalex.org/I83205935"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Meenakshi Tripathi","raw_affiliation_strings":["Malaviya National Institute of Technology (MNIT),Department Of Computer Science and Engineering,Jaipur,India"],"affiliations":[{"raw_affiliation_string":"Malaviya National Institute of Technology (MNIT),Department Of Computer Science and Engineering,Jaipur,India","institution_ids":["https://openalex.org/I83205935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030148518","display_name":"Harish Kumar Sahu","orcid":"https://orcid.org/0009-0002-2868-0004"},"institutions":[{"id":"https://openalex.org/I4210120887","display_name":"Scientific Analysis Group","ror":"https://ror.org/02rpzt041","country_code":"IN","type":"facility","lineage":["https://openalex.org/I1340206300","https://openalex.org/I4210120887","https://openalex.org/I4210150591"]},{"id":"https://openalex.org/I1340206300","display_name":"Defence Research and Development Organisation","ror":"https://ror.org/05k37v296","country_code":"IN","type":"government","lineage":["https://openalex.org/I1340206300","https://openalex.org/I4210150591"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Harish Kumar Sahu","raw_affiliation_strings":["Defence Research and Development Organisation (DRDO),Scientific Analysis Group (SAG),Delhi,India"],"affiliations":[{"raw_affiliation_string":"Defence Research and Development Organisation (DRDO),Scientific Analysis Group (SAG),Delhi,India","institution_ids":["https://openalex.org/I4210120887","https://openalex.org/I1340206300"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023269161","display_name":"Ashish Karan","orcid":null},"institutions":[{"id":"https://openalex.org/I2801959050","display_name":"Indian Air Force","ror":"https://ror.org/04ajtb593","country_code":"IN","type":"government","lineage":["https://openalex.org/I2801959050"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ashish Karan","raw_affiliation_strings":["Indian Air Force (IAF),India"],"affiliations":[{"raw_affiliation_string":"Indian Air Force (IAF),India","institution_ids":["https://openalex.org/I2801959050"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5049121034"],"corresponding_institution_ids":["https://openalex.org/I83205935"],"apc_list":null,"apc_paid":null,"fwci":0.5245,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.73481248,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"756","last_page":"761"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9340999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9340999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9185000061988831,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6151018142700195},{"id":"https://openalex.org/keywords/end-to-end-principle","display_name":"End-to-end principle","score":0.6020771265029907},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.49067580699920654},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4798716604709625},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.46104782819747925},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.4338512420654297},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.3727872371673584},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33491525053977966},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.16594865918159485},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.14343684911727905},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.0824228823184967}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6151018142700195},{"id":"https://openalex.org/C74296488","wikidata":"https://www.wikidata.org/wiki/Q2527392","display_name":"End-to-end principle","level":2,"score":0.6020771265029907},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.49067580699920654},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4798716604709625},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.46104782819747925},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.4338512420654297},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.3727872371673584},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33491525053977966},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.16594865918159485},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.14343684911727905},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0824228823184967},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ants59832.2023.10469296","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ants59832.2023.10469296","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W33071360","https://openalex.org/W1597479987","https://openalex.org/W1598269861","https://openalex.org/W2084652510","https://openalex.org/W2164090669","https://openalex.org/W2168676717","https://openalex.org/W2510236823","https://openalex.org/W2762094014","https://openalex.org/W2791664942","https://openalex.org/W2794556148","https://openalex.org/W2866028610","https://openalex.org/W4280552546","https://openalex.org/W4297991408","https://openalex.org/W6601380484"],"related_works":["https://openalex.org/W3179968364","https://openalex.org/W1999612375","https://openalex.org/W2938107654","https://openalex.org/W2151749779","https://openalex.org/W3008587939","https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W3196421258","https://openalex.org/W2385965183","https://openalex.org/W4387301579"],"abstract_inverted_index":{"Because":[0],"of":[1,55,62,87,160],"Shor\u2019s":[2],"method,":[3],"it":[4],"is":[5,23,148,172,188,199],"expected":[6],"that":[7,65,187,205],"quantum":[8,72,153,193,211],"computers":[9],"will":[10],"have":[11,79],"the":[12,43,53,60,85,105,130,144,158,166,177,197],"capability":[13],"to":[14,26,59,68,71,140,150,175,190],"decipher":[15],"current":[16],"public":[17,29,168],"key":[18,30,133,137,146,179,184],"encryption":[19,110,218],"methods.":[20],"Consequently,":[21],"there":[22,171],"a":[24,173,182],"need":[25,174],"replace":[27,176],"existing":[28],"cryptography":[31,39,203],"with":[32,181],"quantum-resistant":[33],"cryptography,":[34],"also":[35],"known":[36],"as":[37,117],"post-quantum":[38,202],"(PQC)":[40,204],"algorithms.":[41],"In":[42],"last":[44],"twenty":[45],"years,":[46],"significant":[47],"progress":[48],"has":[49],"been":[50],"made":[51],"in":[52,84],"field":[54],"PQC":[56,90],"research,":[57],"leading":[58],"creation":[61],"various":[63],"algorithms":[64,139],"are":[66,83],"proven":[67],"be":[69],"resistant":[70,189],"attacks.":[73],"Several":[74],"organizations":[75],"responsible":[76],"for":[77],"standardization":[78],"already":[80],"selected":[81],"and":[82,95,103,112,125,135,214],"process":[86],"standardizing":[88],"specific":[89],"algorithms.In":[91],"popular":[92],"instant":[93],"messaging":[94],"voice-over":[96],"IP":[97],"applications":[98],"like":[99],"Signal,":[100],"Facebook":[101],"Messenger,":[102],"WhatsApp,":[104],"Signal":[106],"Protocol":[107],"provides":[108],"end-to-end":[109,217],"(E2EE)":[111],"additional":[113],"security":[114,159,209],"features":[115],"such":[116],"forward":[118],"secrecy,":[119,121],"future":[120],"authentication,":[122],"asynchronous":[123],"communication,":[124],"deniability.":[126],"The":[127],"protocol":[128],"utilizes":[129],"ECDH":[131,145,178],"Curve25519":[132],"exchange":[134,147,180,185],"hash-based":[136],"derivation":[138],"accomplish":[141],"this.":[142],"However,":[143],"vulnerable":[149],"attacks":[151,191],"from":[152,192],"computers,":[154],"which":[155],"can":[156,206],"compromise":[157],"contemporary":[161],"cryptographic":[162],"techniques":[163],"by":[164],"obtaining":[165],"corresponding":[167],"keys.":[169],"Therefore,":[170],"quantum-safe":[183],"scheme":[186],"computers.In":[194],"this":[195],"context,":[196],"focus":[198],"on":[200],"investigating":[201],"provide":[207],"robust":[208],"against":[210],"computing":[212],"threats":[213],"proposing":[215],"an":[216],"scheme.":[219]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
