{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,30]],"date-time":"2025-11-30T08:51:01Z","timestamp":1764492661443},"reference-count":46,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["NHM"],"published-print":{"date-parts":[[2023]]},"abstract":"<jats:p xml:lang=\"fr\">&lt;abstract&gt;\n\n&lt;p&gt;The central remote servers are essential for storing and processing data for cloud computing evaluation. However, traditional systems need to improve their ability to provide technical data security solutions. Many data security challenges and complexities await technical solutions in today's fast-growing technology. These complexities will not be resolved by combining all secure encryption techniques. Quantum computing efficiently evolves composite algorithms, allowing for natural advances in cyber security, forensics, artificial intelligence, and machine learning-based complex systems. It also demonstrates solutions to many challenging problems in cloud computing security. This study proposes a user-storage-transit-server authentication process model based on secure keys data distribution and mathematical post-quantum cryptography methodology. The post-quantum cryptography mathematical algorithm is used in this study to involve the quantum computing-based distribution of security keys. It provides security scenarios and technical options for securing data in transit, storage, user, and server modes. Post-quantum cryptography has defined and included the mathematical algorithm in generating the distributed security key and the data in transit, on-storage, and on-editing. It has involved reversible computations on many different numbers by super positioning the qubits to provide quantum services and other product-based cloud-online access used to process the end-user's artificial intelligence-based hardware service components. This study will help researchers and industry experts prepare specific scenarios for synchronizing data with medicine, finance, engineering, and banking cloud servers. The proposed methodology is implemented with single-tenant, multi-tenant, and cloud-tenant-level servers and a database server. This model is designed for four enterprises with 245 users, and it employs integration parity rules that are implemented using salting techniques. The experimental scenario considers the plain text size ranging from 24 to 8248 for analyzing secure key data distribution, key generation, encryption, and decryption time variations. The key generation and encryption time variations are 2.3233 ms to 8.7277 ms at quantum-level 1 and 0.0355 ms to 1.8491 ms at quantum-level 2. The key generation and decryption time variations are 2.1533 ms to 19.4799 ms at quantum-level 1 and 0.0525 ms to 3.3513 ms at quantum-level 2.&lt;\/p&gt;\n\n\t      &lt;\/abstract&gt;<\/jats:p>","DOI":"10.3934\/nhm.2023057","type":"journal-article","created":{"date-parts":[[2023,5,6]],"date-time":"2023-05-06T11:35:43Z","timestamp":1683372943000},"page":"1313-1334","source":"Crossref","is-referenced-by-count":5,"title":["Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology"],"prefix":"10.3934","volume":"18","author":[{"given":"Santosh Kumar","family":"Henge","sequence":"first","affiliation":[{"name":"Department of Computer Applications, Directorate of Online Education, Manipal University Jaipur, Rajasthan, India"}]},{"given":"Gitanjali","family":"Jayaraman","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Vellore Institute of Technology, 632014, Vellore, India"}]},{"given":"M","family":"Sreedevi","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Madanapalle Institute of Technology and Science, 517325 Madanapalle, India"}]},{"given":"R","family":"Rajakumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Madanapalle Institute of Technology and Science, 517325 Madanapalle, India"}]},{"given":"Mamoon","family":"Rashid","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Faculty of Science and Technology, Vishwakarma University, Pune, 411048, India"}]},{"given":"Sultan S.","family":"Alshamrani","sequence":"additional","affiliation":[{"name":"Department of Information Technology, College of Computers and Information Technology, Taif University, Taif PO Box 11099, Taif, 21944, Saudi Arabia"}]},{"given":"Mrim M.","family":"Alnfiai","sequence":"additional","affiliation":[{"name":"Department of Information Technology, College of Computers and Information Technology, Taif University, Taif PO Box 11099, Taif, 21944, Saudi Arabia"}]},{"given":"Ahmed Saeed","family":"AlGhamdi","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, College of Computer and Information Technology, Taif University, PO Box. 11099, Taif 21994, Saudi Arabia"}]}],"member":"2321","reference":[{"key":"key-10.3934\/nhm.2023057-1","doi-asserted-by":"publisher","unstructured":"W. S. Peter, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer,  <i>SIAM J. Comput.<\/i>,  <b>26<\/b> (1997). https:\/\/doi.org\/10.1137\/S0097539795293172","DOI":"10.1137\/S0097539795293172"},{"key":"key-10.3934\/nhm.2023057-2","doi-asserted-by":"publisher","unstructured":"W. Zhao, R. H. Shi, J. J. Shi, X. C. Ruan, Y. Guo, D. Huang, Quantum digital signature based on measurement-device-independent continuous-variable scheme,  <i>Quantum Inf. Process.<\/i>,  <b>20<\/b> (2021), 222. https:\/\/doi.org\/10.1007\/s11128-021-03152-7","DOI":"10.1007\/s11128-021-03152-7"},{"key":"key-10.3934\/nhm.2023057-3","doi-asserted-by":"publisher","unstructured":"Montanaro, Ashley, Quantum algorithms: an overview,  <i>npj Quantum Inf.<\/i>,  <b>2<\/b> (2016), 15023. https:\/\/doi.org\/10.1038\/npjqi.2015.23","DOI":"10.1038\/npjqi.2015.23"},{"key":"key-10.3934\/nhm.2023057-4","doi-asserted-by":"publisher","unstructured":"S. Barz, E. Kashefi, A. Broadbent, J. F. Fitzsimons, A. Zeilinger, P. Walther, Demonstration of blind quantum computing,  <i>Science<\/i>,  <b>335<\/b> (2012), 303\u2013308. https:\/\/doi.org\/10.1126\/science.1214707","DOI":"10.1126\/science.1214707"},{"key":"key-10.3934\/nhm.2023057-5","doi-asserted-by":"crossref","unstructured":"X. Tan, Introduction to quantum cryptography, in <i>Theory and Practice of Cryptography and Network Security Protocols and Technologies<\/i> (eds. J. Sen), Rijeka: IntechOpen, 2013. <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/doi.org\/10.5772\/56092\">https:\/\/doi.org\/10.5772\/56092<\/ext-link>","DOI":"10.5772\/56092"},{"key":"key-10.3934\/nhm.2023057-6","unstructured":"D Stebila M, Moscaand N L\u00fctkenhaus, The case for quantum key distribution, in <i>Quantum Communication and Quantum Networking<\/i> (eds. A. Sergienko, S. Pascazio and P. Villoresi), Berlin, Heidelberg: Springer, <b>36<\/b> (2010). <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/doi.org\/10.1007\/978-3-642-11731-2-35\">https:\/\/doi.org\/10.1007\/978-3-642-11731-2-35<\/ext-link>"},{"key":"key-10.3934\/nhm.2023057-7","doi-asserted-by":"publisher","unstructured":"S. Pironio, A. Ac\u00edn, N. Brunner, N. Gisin, S. Massar, V. Scaran, Device-independent quantum key distribution secure against collective attacks,  <i>New J. Phys.<\/i>,  <b>11<\/b> (2019), 045021. https:\/\/doi.org\/10.1088\/1367-2630\/11\/4\/045021","DOI":"10.1088\/1367-2630\/11\/4\/045021"},{"key":"key-10.3934\/nhm.2023057-8","doi-asserted-by":"publisher","unstructured":"S. Pirandola, U. L. Andersen, L. Banchi, M. Berta, D. Bunandar, R. Colbeck, et al., Advances in quantum cryptography,  <i>Adv. Opt. Photonics<\/i>,  <b>12<\/b> (2020): 1012\u20131236. https:\/\/doi.org\/10.1364\/AOP.361502","DOI":"10.1364\/AOP.361502"},{"key":"key-10.3934\/nhm.2023057-9","doi-asserted-by":"publisher","unstructured":"I. S. Kabanov, R. R. Yunusov, Y. V. Kurochkin, A. K. Fedorov, Practical cryptographic strategies in the post-quantum era,  <i>AIP Conf. Proc.<\/i>,  <b>1936<\/b> (2017), 020021. https:\/\/doi.org\/10.1063\/1.5025459","DOI":"10.1063\/1.5025459"},{"key":"key-10.3934\/nhm.2023057-10","doi-asserted-by":"publisher","unstructured":"D. A. Kronberg, E. O. Kiktenko, A. K. Fedorov, Yu. V. Kurochkin, Analysis of coherent quantum cryptography protocol vulnerability to an active beam-splitting attack,  <i>Quantum Electron.<\/i>,  <b>47<\/b> (2017), 163\u2013168. https:\/\/doi.org\/10.1070\/QEL16240","DOI":"10.1070\/QEL16240"},{"key":"key-10.3934\/nhm.2023057-11","unstructured":"Serious Security: Post-Quantum Cryptography (and why we're getting it), 2023. Available from: <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/nakedsecurity.sophos.com\/2019\/02\/07\/serious-security-post-quantum-cryptography-and-why-we-are-getting-it\">https:\/\/nakedsecurity.sophos.com\/2019\/02\/07\/serious-security-post-quantum-cryptography-and-why-we-are-getting-it<\/ext-link>."},{"key":"key-10.3934\/nhm.2023057-12","doi-asserted-by":"publisher","unstructured":"E. O. Kiktenko, A. S. Trushechkin, C. C. W. Lim, Y. V. Kurochkin, A. K. Fedorov, Symmetric blind information reconciliation for quantum key distribution,  <i>Phys. Rev. Appl.<\/i>,  <b>8<\/b> (2017), 044017. https:\/\/doi.org\/10.1103\/PhysRevApplied.8.044017","DOI":"10.1103\/PhysRevApplied.8.044017"},{"key":"key-10.3934\/nhm.2023057-13","unstructured":"B. Huttner, L. Perret, Quantum-Safe Security, Working Group Overview, Available from: <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/cloudsecurityalliance.org\/research\/working-groups\/quantum-safe-security\">https:\/\/cloudsecurityalliance.org\/research\/working-groups\/quantum-safe-security<\/ext-link>."},{"key":"key-10.3934\/nhm.2023057-14","unstructured":"K. Hirapara, The need to be quantum-safe-cyber security threats in the era of quantum computing, Vtech Solution, 2018. Available from: <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/www.vtechsolution.com\/why-the-need-to-be-quantum-safe-the-era-of-quantum-computing\">https:\/\/www.vtechsolution.com\/why-the-need-to-be-quantum-safe-the-era-of-quantum-computing<\/ext-link>."},{"key":"key-10.3934\/nhm.2023057-15","unstructured":"The advantages and disadvantage of quantum computing, 2018. Available from: <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/www.e-spincorp.com\/the-advantages-and-disadvantage-of-quantum-computing\">https:\/\/www.e-spincorp.com\/the-advantages-and-disadvantage-of-quantum-computing<\/ext-link>."},{"key":"key-10.3934\/nhm.2023057-16","doi-asserted-by":"publisher","unstructured":"P. W. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer,  <i>SIAM J. Comput.<\/i>, 26 (1997), 1484. https:\/\/doi.org\/10.1137\/S0097539795293172","DOI":"10.1137\/S0097539795293172"},{"key":"key-10.3934\/nhm.2023057-17","unstructured":"D. J. Bernstein, Introduction to post-quantum cryptography, in <i>Post-Quantum Cryptography<\/i> Berlin, Heidelberg: Springer, (2009), 1\u201314. <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-540-88702-7_1\">https:\/\/link.springer.com\/chapter\/10.1007\/978-3-540-88702-7_1<\/ext-link>"},{"key":"key-10.3934\/nhm.2023057-18","doi-asserted-by":"publisher","unstructured":"S. H. Sun, M. S. Jiang, X. C. Ma, C. Y. Li, L. M. Liang, Hacking on decoy-state quantum key distribution system with partial phase randomization,  <i>Sci. Rep.<\/i>,  <b>4<\/b> (2014), 4759. https:\/\/doi.org\/10.1038\/srep04759","DOI":"10.1038\/srep04759"},{"key":"key-10.3934\/nhm.2023057-19","doi-asserted-by":"publisher","unstructured":"D. Mayers, Unconditional security in quantum cryptography,  <i>J. ACM<\/i>,  <b>48<\/b> (2001), 351\u2013406. https:\/\/doi.org\/10.1145\/382780.382781","DOI":"10.1145\/382780.382781"},{"key":"key-10.3934\/nhm.2023057-20","doi-asserted-by":"publisher","unstructured":"H. K. Lo, H. F. Chau, Unconditional security of quantum key distribution over arbitrarily long distances,  <i>Science<\/i>,  <b>283<\/b> (1999), 2050\u20132056. https:\/\/doi.org\/10.1126\/science.283.5410.2050","DOI":"10.1126\/science.283.5410.2050"},{"key":"key-10.3934\/nhm.2023057-21","doi-asserted-by":"publisher","unstructured":"J. Barrett, L. Hardy, A. Kent, No signaling and quantum key distribution,  <i>Phys. Rev. Lett.<\/i>,  <b>95<\/b> (2005), 010503. https:\/\/doi.org\/10.1103\/PhysRevLett.95.010503","DOI":"10.1103\/PhysRevLett.95.010503"},{"key":"key-10.3934\/nhm.2023057-22","unstructured":"G. Brassard, Brief history of quantum cryptography: a personal perspective, <i>IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security<\/i>, Awaji, Japan, (2005), 19\u201323. <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/doi.org\/10.1109\/ITWTPI.2005.1543949\">https:\/\/doi.org\/10.1109\/ITWTPI.2005.1543949<\/ext-link>"},{"key":"key-10.3934\/nhm.2023057-23","unstructured":"Implementing quantum-safe key distribution, 2021. <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/quantumxc.com\/quantum-cryptography-explained\">https:\/\/quantumxc.com\/quantum-cryptography-explained<\/ext-link>."},{"key":"key-10.3934\/nhm.2023057-24","doi-asserted-by":"publisher","unstructured":"B. Zhang, Q. Zhuang, Quantum internet under random breakdowns and intentional attacks,  <i>Quantum Sci. Technol.<\/i>,  <b>6<\/b> (2021), 045007. https:\/\/doi.org\/10.1088\/2058-9565\/ac1041","DOI":"10.1088\/2058-9565\/ac1041"},{"key":"key-10.3934\/nhm.2023057-25","doi-asserted-by":"publisher","unstructured":"Y. Yang, Y. J. Chen, F. Chen, A compressive integrity auditing protocol for secure cloud storage,  <i>IEEE ACM Trans. Netw.<\/i>,  <b>2<\/b> (2021), 1197\u20131209. https:\/\/doi.org\/10.1109\/TNET.2021.3058130","DOI":"10.1109\/TNET.2021.3058130"},{"key":"key-10.3934\/nhm.2023057-26","doi-asserted-by":"publisher","unstructured":"S. Barz, E. Kashefi, A. Broadbent, J. F. Fitzsimons, A. Zeilinger, P. Walther, Demonstration of blind quantum computing,  <i>Science<\/i> <b>335<\/b> (2012), 303\u2013308. https:\/\/doi.org\/10.1126\/science.1214707","DOI":"10.1126\/science.1214707"},{"key":"key-10.3934\/nhm.2023057-27","doi-asserted-by":"publisher","unstructured":"R. Amiri, P. Wallden, A. Kent, E. Andersson, Secure quantum signatures using insecure quantum channels,  <i>Phys. Rev. A<\/i>,  <b>93<\/b> (2016), 032325. https:\/\/doi.org\/10.1103\/PhysRevA.93.032325","DOI":"10.1103\/PhysRevA.93.032325"},{"key":"key-10.3934\/nhm.2023057-28","doi-asserted-by":"publisher","unstructured":"M. Thornton, H. Scott, C. Croal, N. Korolkova, Continuous-variable quantum digital signatures over insecure channels,  <i>Phys. Rev. A<\/i>,  <b>99<\/b> (2019), 032341. https:\/\/doi.org\/10.1103\/PhysRevA.99.032341","DOI":"10.1103\/PhysRevA.99.032341"},{"key":"key-10.3934\/nhm.2023057-29","doi-asserted-by":"publisher","unstructured":"H. X. Ma, P. Huang, D. Y. Bai, T. Wang, S. Y. Wang, W. S. Bao, Long-distance continuous-variable measurement-device-independent quantum key distribution with discrete modulation,  <i>Phys. Rev. A<\/i>,  <b>99<\/b> (2018), 022322. https:\/\/doi.org\/10.1103\/PhysRevA.99.022322","DOI":"10.1103\/PhysRevA.99.022322"},{"key":"key-10.3934\/nhm.2023057-30","unstructured":"S. F. Shetu, M. Saifuzzaman, N. N. Moon, F. N. Nur, A survey of botnet in cyber security, in <i>2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)<\/i>, IEEE, Jaipur, India, (2019), 174\u2013177. <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/doi.org\/10.1109\/icct46177.2019.8969048\">https:\/\/doi.org\/10.1109\/icct46177.2019.8969048<\/ext-link>"},{"key":"key-10.3934\/nhm.2023057-31","doi-asserted-by":"publisher","unstructured":"P. Dhiman, S. K. Henge, R. Ramalingam, A. Dumka, R. Singh, A. Gehlot, et al., Secure token-key implications in an enterprise multi-tenancy environment using BGV\u2013EHC hybrid homomorphic encryption,  <i>Electronics<\/i>,  <b>11<\/b> (2022), 1942. https:\/\/doi.org\/10.3390\/electronics11131942","DOI":"10.3390\/electronics11131942"},{"key":"key-10.3934\/nhm.2023057-32","unstructured":"Data security challenges, 2023. Available from: <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/docs.oracle.com\/cd\/B10501_01\/network.920\/a96582\/overview.htm\">https:\/\/docs.oracle.com\/cd\/B10501_01\/network.920\/a96582\/overview.htm<\/ext-link>."},{"key":"key-10.3934\/nhm.2023057-33","doi-asserted-by":"publisher","unstructured":"J. W. Leng, S. D. Ye, M. Zhou, J. L. Zhao, Q. Liu, W. Guo, et al., Blockchain-secured smart manufacturing in industry 4.0: A survey,  <i>IEEE Trans. Syst. Man Cybern. Syst.<\/i>,  <b>51<\/b> (2021), 237\u2013252. https:\/\/doi.org\/10.1109\/TSMC.2020.3040789","DOI":"10.1109\/TSMC.2020.3040789"},{"key":"key-10.3934\/nhm.2023057-34","doi-asserted-by":"publisher","unstructured":"J. Leng, M. Zhou, J. L. Zhao, Y. Huang, Y. Bian, Blockchain security: a survey of techniques and research directions,  <i>IEEE Trans. Serv. Comput.<\/i>,  <b>15<\/b> (2022), 2490\u20132510. https:\/\/doi.org\/10.1109\/TSC.2020.3038641","DOI":"10.1109\/TSC.2020.3038641"},{"key":"key-10.3934\/nhm.2023057-35","doi-asserted-by":"publisher","unstructured":"J. W. Leng, G. L. Ruan, P. Y. Jiang, K. L. Xu, Q. Liu, X. L. Zhou, et al., Blockchain-empowered sustainable manufacturing and product lifecycle management in industry 4.0: A survey,  <i>Renew. Sust. Energ. Rev.<\/i>,  <b>132<\/b> (2020), 110112. https:\/\/doi.org\/10.1016\/j.rser.2020.110112","DOI":"10.1016\/j.rser.2020.110112"},{"key":"key-10.3934\/nhm.2023057-36","unstructured":"Gaurav Gupta, Digital Twin: A Foundation for a Secure, Intelligent and Connected Enterprise, <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/isg-one.com\/articles\/digital-twin-a-foundation-for-a-secure-intelligent-and-connected-enterprise\">https:\/\/isg-one.com\/articles\/digital-twin-a-foundation-for-a-secure-intelligent-and-connected-enterprise<\/ext-link>."},{"key":"key-10.3934\/nhm.2023057-37","unstructured":"Maria Korolov, How to secure digital twin technology in your data center, 2022. Available from: <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/www.datacenterknowledge.com\/security\/how-secure-digital-twin-technology-your-data-center\">https:\/\/www.datacenterknowledge.com\/security\/how-secure-digital-twin-technology-your-data-center<\/ext-link>."},{"key":"key-10.3934\/nhm.2023057-38","doi-asserted-by":"publisher","unstructured":"L. Gopal, H. Singh, P. Mounica, N. Mohankumar, N. P. Challa, P. Jayaraman, Digital twin and IOT technology for secure manufacturing systems,  <i>Meas.: Sens.<\/i>,  <b>25<\/b> (2023), 100661. https:\/\/doi.org\/10.1016\/j.measen.2022.100661","DOI":"10.1016\/j.measen.2022.100661"},{"key":"key-10.3934\/nhm.2023057-39","doi-asserted-by":"publisher","unstructured":"J. W. Leng, W. Sha, Z. S. Lin, J. B. Jing, Q. Liu, X. Chen, Blockchained smart contract pyramid-driven multi-agent autonomous process control for resilient individualized manufacturing towards Industry 5.0,  <i>Int. J. Prod. Res.<\/i>,  (2022), 1\u201320. https:\/\/doi.org\/10.1080\/00207543.2022.2089929","DOI":"10.1080\/00207543.2022.2089929"},{"key":"key-10.3934\/nhm.2023057-40","doi-asserted-by":"publisher","unstructured":"J. W. Leng, P. Y. Jiang, K. L. Xu, Q. Liu, J. L. Zhao, Y. Y. Bian, et al., Makerchain: A blockchain with chemical signature for self-organizing process in social manufacturing,  <i>J. Clean. Prod.<\/i>,  <b>234<\/b> (2019), 767\u2013778. https:\/\/doi.org\/10.1016\/j.jclepro.2019.06.265","DOI":"10.1016\/j.jclepro.2019.06.265"},{"key":"key-10.3934\/nhm.2023057-41","doi-asserted-by":"publisher","unstructured":"P. Dhiman, S. K. Henge, S. Singh, A. Kaur, P. Singh, M. Hadabou, Blockchain merkle-tree ethereum approach in enterprise multi-tenant cloud environment,  <i>Comput. Mater. Contin.<\/i>,  <b>74<\/b> (2023), 3297\u20133313. https:\/\/doi.org\/10.32604\/cmc.2023.030558","DOI":"10.32604\/cmc.2023.030558"},{"key":"key-10.3934\/nhm.2023057-42","doi-asserted-by":"crossref","unstructured":"P. Dhiman, S. K. Henge, Comparative analysis of cloud security complexities and past proposed non-homomorphic and homomorphic encryption methodologies with limitation, in <i>ICT for Competitive Strategies<\/i>, Boca Raton: CRC Press, (2020), 787\u2013799.","DOI":"10.1201\/9781003052098-83"},{"key":"key-10.3934\/nhm.2023057-43","unstructured":"P. Dhiman, S. K. Henge, Analysis of blockchain secure models and approaches based on various services in multi-tenant environment, in <i>Recent Innovations in Computing<\/i>, Singapore: Springer, <b>855<\/b> (2022), 563\u2013571. <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/doi.org\/10.1007\/978-981-16-8892-8_42\">https:\/\/doi.org\/10.1007\/978-981-16-8892-8_42<\/ext-link>"},{"key":"key-10.3934\/nhm.2023057-44","unstructured":"K. Kwiatkowski, Towards post-quantum cryptography in TLS, 2019. Available from: <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/blog.cloudflare.com\/towards-post-quantum-cryptography-in-tls\">https:\/\/blog.cloudflare.com\/towards-post-quantum-cryptography-in-tls<\/ext-link>."},{"key":"key-10.3934\/nhm.2023057-45","doi-asserted-by":"publisher","unstructured":"C. Meshram, S. A. Meshram, An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem,  <i>Inf. Process. Lett.<\/i>,  <b>113<\/b> (2013), 375\u2013380. https:\/\/doi.org\/10.1016\/j.ipl.2013.02.009","DOI":"10.1016\/j.ipl.2013.02.009"},{"key":"key-10.3934\/nhm.2023057-46","unstructured":"NIST reveals 26 algorithms advancing to the post-quantum crypto 'semifinals', 2019. Available from: <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/www.nist.gov\/news-events\/news\/2019\/01\/nist-reveals-26-algorithms-advancing-post-quantum-crypto-semifinals\">https:\/\/www.nist.gov\/news-events\/news\/2019\/01\/nist-reveals-26-algorithms-advancing-post-quantum-crypto-semifinals<\/ext-link>."}],"container-title":["Networks and Heterogeneous Media"],"original-title":[],"link":[{"URL":"http:\/\/www.aimspress.com\/article\/doi\/10.3934\/nhm.2023057?viewType=html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,6]],"date-time":"2023-05-06T11:35:48Z","timestamp":1683372948000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.aimspress.com\/article\/doi\/10.3934\/nhm.2023057"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":46,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023]]}},"URL":"https:\/\/doi.org\/10.3934\/nhm.2023057","relation":{},"ISSN":["1556-1801"],"issn-type":[{"value":"1556-1801","type":"print"}],"subject":[],"published":{"date-parts":[[2023]]}}}