This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
|
||||||||
|
Paper Details
Paper Title
Quantum Secret Sharing Protocol using the heuristic Attacks
Authors
  Rajaram Jatothu,  Dr. R P Singh
Abstract
In this work to dissect the power of the four party QSS protocol exceptionally well known heuristic attack are executed. This heuristic attack is molded by three prevalent heuristics calculations, for example, Quantum motivated Genetic Algorithm (GA), and Tabu Search Algorithm (TSA) and Cuckoo Search Algorithm (CSA) .The mobile ad-hoc network (MANET) is one of the self-configuring infrastructures less network, of mobile terminals associated by wireless. Quantum cryptography is the science of exploiting quantum mechanical properties to achieve cryptographic perform tasks. The best known example of quantum cryptography quantum key distribution is which offers and information secure solution.
Keywords- Heuristic attacks, MANET, Cuckoo Search Algorithm, Quantum Secret Sharing Protocol
Publication Details
Unique Identification Number - IJEDR1704082Page Number(s) - 521-527Pubished in - Volume 5 | Issue 4 | November 2017DOI (Digital Object Identifier) -    Publisher - IJEDR (ISSN - 2321-9939)
Cite this Article
  Rajaram Jatothu,  Dr. R P Singh,   "Quantum Secret Sharing Protocol using the heuristic Attacks", International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Volume.5, Issue 4, pp.521-527, November 2017, Available at :http://www.ijedr.org/papers/IJEDR1704082.pdf
Article Preview
|
|
||||||
|