Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay
暂无分享,去创建一个
[1] Bart De Decker,et al. Ubiquitous Privacy-Preserving Identity Managment , 2008, SEC.
[2] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[3] Jian-Wei Pan,et al. Experimental demonstration of a hyper-entangled ten-qubit Schr\ , 2008, 0809.4277.
[4] Gilles Brassard,et al. Anonymous Quantum Communication , 2007, ASIACRYPT.
[5] Gail-Joon Ahn,et al. Portable User-Centric Identity Management , 2008, SEC.
[6] S. Etcheverry,et al. Quantum key distribution session with 16-dimensional photonic states , 2013, Scientific Reports.
[7] P. Oscar Boykin. Information Security and Quantum Mechanics: Security of Quantum Protocols , 2002 .
[8] Charles H. Bennett,et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.
[9] Xia Zhou,et al. TRUST: A General Framework for Truthful Double Spectrum Auctions , 2009, IEEE INFOCOM 2009.
[10] Zhi Ma,et al. Decoy-state quantum key distribution with biased basis choice , 2013, Scientific Reports.
[11] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[12] Ying Guo,et al. The Dining Cryptographer Problem-Based Anonymous Quantum Communication via Non-maximally Entanglement State Analysis , 2013 .
[13] J. Boyan. DATA AND INFORMATION COLLECTION ON THE NET The Anonymizer Protecting User Privacy on the Web , 1997 .
[14] Tian-Yin Wang,et al. Economical quantum anonymous transmissions , 2010 .
[15] Jan Bouda,et al. Anonymous Transmission of Quantum Information , 2007, 2007 First International Conference on Quantum, Nano, and Micro Technologies (ICQNM'07).
[16] S. Rajsbaum. Foundations of Cryptography , 2014 .
[17] Willy Susilo,et al. A provably secure identity-based proxy ring signature based on RSA , 2015, Secur. Commun. Networks.
[18] Kaoru Shimizu,et al. Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair , 2009 .
[19] Lan Zhou,et al. Deterministic entanglement distillation for secure double-server blind quantum computation , 2013, Scientific Reports.
[20] Matthias Christandl,et al. Quantum Anonymous Transmissions , 2004, ASIACRYPT.
[21] Alain Tapp,et al. Information-Theoretic Security Without an Honest Majority , 2007, ASIACRYPT.
[22] Birgit Pfitzmann,et al. Unconditional Byzantine Agreement for any Number of Faulty Processors , 1992, STACS.
[23] David Chaum,et al. Unconditionally Secure Digital Signatures , 1990, CRYPTO.
[24] Birgit Pfitzmann,et al. Unconditionally Untraceable and Fault-tolerant Broadcast and SecretBallot Election , 1992 .
[25] Yossi Matias,et al. Consistent, yet anonymous, Web access with LPWA , 1999, CACM.
[26] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[27] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[28] Su-Juan Qin,et al. Comment on 'Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair' , 2010 .