An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States
暂无分享,去创建一个
[1] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[2] R. Cleve,et al. HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.
[3] V. Buzek,et al. Quantum secret sharing , 1998, quant-ph/9806063.
[4] A Cabello. Quantum key distribution in the Holevo limit. , 2000, Physical review letters.
[5] Guihua Zeng,et al. Quantum key agreement protocol , 2004 .
[6] Qiaoyan Wen,et al. An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement , 2009 .
[7] Chen Hanwu,et al. An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication , 2009 .
[8] Tzonelih Hwang,et al. Quantum key agreement protocol based on BB84 , 2010 .
[9] Runhua Shi,et al. Multiparty quantum secret sharing with the pure entangled two-photon states , 2012, Quantum Inf. Process..
[10] Fei Gao,et al. Multiparty quantum key agreement with single particles , 2012, Quantum Information Processing.
[11] Chitra Shukla,et al. Orthogonal-state-based protocols of quantum key agreement , 2013, 1310.1435.
[12] Wang Xiaojun,et al. Attacks and Improvement of Quantum Sealed-Bid Auction with EPR Pairs , 2014 .
[13] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[14] Wenjie Liu,et al. Secure Quantum Private Comparison of Equality Based on Asymmetric W State , 2013, 1312.5577.
[15] Fei Gao,et al. Novel multiparty quantum key agreement protocol with GHZ states , 2014, Quantum Information Processing.
[16] Chitra Shukla,et al. Protocols of quantum key agreement solely using Bell states and Bell measurement , 2014, Quantum Inf. Process..
[17] Yu Zheng,et al. Cryptanalysis and Improvement of Quantum Private Comparison Protocol Based on Bell Entangled States , 2014, 1405.6455.
[18] Lili Wang,et al. Two-party quantum key agreement with four-qubit cluster states , 2014, Quantum Information Processing.
[19] Huantong Geng,et al. Same Initial States Attack in Yang et al.’s Quantum Private Comparison Protocol and the Improvement , 2013, 1312.5562.
[20] Chao Liu,et al. Improved Deterministic N-To-One Joint Remote Preparation of an Arbitrary Qubit via EPR Pairs , 2014, 1405.6453.
[21] Anmin Fu,et al. Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement , 2015, Quantum Inf. Process..
[22] Jin Wang,et al. Privacy-Preserving Smart Similarity Search Based on Simhash over Encrypted Data in Cloud Computing , 2015 .
[23] YeFeng He,et al. Quantum key agreement protocols with four-qubit cluster states , 2015, Quantum Inf. Process..
[24] Xiaodong Liu,et al. A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment , 2016, Secur. Commun. Networks.
[25] Wenping Ma,et al. Two-party quantum key agreement based on four-particle GHZ states , 2016 .
[26] Xingming Sun,et al. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.
[27] Wenjie Liu,et al. Information Leakage Problem in Efficient Bidirectional Quantum Secure Direct Communication with Single Photons in Both Polarization and Spatial-Mode Degrees of Freedom , 2016 .
[28] Hanwu Chen,et al. Information Leakage Problem in High-Capacity Quantum Secure Communication with Authentication Using Einstein—Podolsky—Rosen Pairs , 2016 .
[29] Wenjie Liu,et al. Cryptanalysis of Controlled Quantum Secure Direct Communication and Authentication Protocol Based on Five-Particle Cluster State and Quantum One-Time Pad , 2016 .
[30] Yong Xu,et al. Multiparty quantum sealed-bid auction using single photons as message carrier , 2016, Quantum Inf. Process..
[31] Xingming Sun,et al. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.
[32] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[33] Hanwu Chen,et al. Cryptanalysis and improvement of quantum broadcast communication and authentication protocol with a quantum one-time pad , 2016 .
[34] Xiao-Yan Zhou,et al. Deterministic Joint Remote Preparation of a Four-Qubit Cluster-Type State via GHZ States , 2016, 1602.02065.
[35] Zhangjie Fu,et al. Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data , 2017, IEEE Transactions on Information Forensics and Security.
[36] Jian Shen,et al. An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.
[37] Jian Shen,et al. A secure cloud-assisted urban data sharing framework for ubiquitous-cities , 2017, Pervasive Mob. Comput..
[38] Xingming Sun,et al. Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data , 2019, IEEE Transactions on Services Computing.