We demonstrate that the proposed protocol is secure under common quantum attacks and outlining the procedure for the scalability of the scheme to …
We demonstrate that the proposed protocol is secure under common quantum attacks and outlining the procedure for the scalability of the scheme to …