Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols
暂无分享,去创建一个
Fei Gao | Qiao-Yan Wen | Fen-Zhuo Guo | Su-Juan Qin | S. Qin | F. Guo | Q. Wen | F. Gao
[1] Antoni Wójcik. Eavesdropping on the "ping-pong" quantum communication protocol. , 2003, Physical review letters.
[2] Fuguo Deng,et al. Bidirectional quantum secret sharing and secret splitting with polarized single photons , 2005, quant-ph/0504119.
[3] Wang Yan,et al. Secure Quantum Key Distribution Network with Bell States and Local Unitary Operations , 2005 .
[4] S. Barnett,et al. Multi-user Quantum Cryptography on Optical Networks , 1995 .
[5] Qiaoyan Wen,et al. Quantum secure direct communication over the collective amplitude damping channel , 2009 .
[6] M. Koashi,et al. Quantum entanglement for secret sharing and secret splitting , 1999 .
[7] Charles H. Bennett,et al. Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. , 1992, Physical review letters.
[8] Lov K. Grover. A fast quantum mechanical algorithm for database search , 1996, STOC '96.
[9] Antoni Wojcik,et al. Comment on 'Quantum dense key distribution' , 2005 .
[10] G. Long,et al. Controlled order rearrangement encryption for quantum key distribution , 2003, quant-ph/0308172.
[11] Dieter Meschede,et al. Quantum engineering: An atom-sorting machine , 2006, Nature.
[12] Marco Lucamarini,et al. Secure deterministic communication without entanglement. , 2005, Physical review letters.
[13] XingLan Zhang. One-way quantum identity authentication based on public key , 2009 .
[14] Qiaoyan Wen,et al. Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174] , 2007 .
[15] A. Tajima,et al. Ensuring Quality of Shared Keys Through Quantum Key Distribution for Practical Application , 2009, IEEE Journal of Selected Topics in Quantum Electronics.
[16] K. Inoue,et al. Quantum key distribution technologies , 2006, IEEE Journal of Selected Topics in Quantum Electronics.
[17] Qiao-Yan Wen,et al. Comment on "experimental demonstration of a quantum protocol for Byzantine agreement and liar detection". , 2008, Physical review letters.
[18] Fuguo Deng,et al. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.
[19] Wen Qiao-Yan,et al. A Special Eavesdropping on One-Sender Versus N-Receiver QSDC Protocol , 2008 .
[20] Guang-Can Guo,et al. Comment on “Quantum key distribution without alternative measurements” [Phys. Rev. A 61 , 052312 (2000)] , 2001 .
[21] V. Buzek,et al. Quantum secret sharing , 1998, quant-ph/9806063.
[22] Fuguo Deng,et al. Improving the security of multiparty quantum secret sharing against Trojan horse attack , 2005, quant-ph/0506194.
[23] Fen-Zhuo Guo,et al. Consistency of shared reference frames should be reexamined , 2008 .
[24] Hao Liang,et al. Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution , 2010 .
[25] A. Tajima,et al. Practical Quantum Cryptosystem for Metro Area Applications , 2007, IEEE Journal of Selected Topics in Quantum Electronics.
[26] N. Gisin,et al. Trojan-horse attacks on quantum-key-distribution systems (6 pages) , 2005, quant-ph/0507063.
[27] Qiao-Yan Wen,et al. Quantum secure direct communication with cluster states , 2010 .
[28] Qing-yu Cai,et al. The "ping-pong" protocol can be attacked without eavesdropping. , 2003, Physical review letters.
[29] K. Boström,et al. Deterministic secure direct communication using entanglement. , 2002, Physical review letters.
[30] G. Long,et al. Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.
[31] David Nowak,et al. A Framework for Game-Based Security Proofs , 2007, ICICS.
[32] Neil Genzlinger. A. and Q , 2006 .
[33] M. Dušek,et al. Quantum identification system , 1998, quant-ph/9809024.
[34] Fuguo Deng,et al. Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.
[35] R. Cleve,et al. HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.
[36] H.P. Yuen,et al. Key Generation: Foundations and a New Quantum Approach , 2009, IEEE Journal of Selected Topics in Quantum Electronics.
[37] 高飞,et al. A Special Eavesdropping on One-Sender Versus N-Receiver QSDC Protocol , 2008 .
[38] A. Tajima,et al. Technologies for Quantum Key Distribution Networks Integrated With Optical Communication Networks , 2009, IEEE Journal of Selected Topics in Quantum Electronics.
[39] Su-Juan Qin,et al. Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state , 2010 .
[40] Gan Gao,et al. Reexamining the security of the improved quantum secret sharing scheme , 2009 .
[41] Joonsang Baek,et al. Formal Proofs for the Security of Signcryption , 2002, Journal of Cryptology.
[42] Qiaoyan Wen,et al. Improving the security of multiparty quantum secret sharing against an attack with a fake signal , 2006 .
[43] Yan Wang,et al. Secure quantum key distribution network with Bell states and local unitary operations , 2007, 0705.1746.
[44] Dong Liu,et al. Field experiment on a robust hierarchical metropolitan quantum cryptography network , 2009 .
[45] Fei Gao,et al. A simple participant attack on the brádler-dušek protocol , 2007, Quantum Inf. Comput..
[46] Tzonelih Hwang,et al. New Efficient Three-Party Quantum Key Distribution Protocols , 2009, IEEE Journal of Selected Topics in Quantum Electronics.
[47] 林崧,et al. Cryptanalysis and Improvement of Quantum Secret Sharing Protocol between Multiparty and Multiparty with Single Photons and Unitary Transformations , 2009 .
[48] Zhang Yu-qing,et al. Cryptanalysis and Improvement of a Quantum Secret Sharing Protocol between Multiparty and Multiparty with Single Photons and Unitary Transformations , 2010 .
[49] Victor Shoup,et al. Sequences of games: a tool for taming complexity in security proofs , 2004, IACR Cryptol. ePrint Arch..
[50] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[51] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[52] Guihua Zeng,et al. Identity verification in quantum key distribution , 2000 .
[53] Hoi-Kwong Lo,et al. Some attacks on quantum-based cryptographic protocols , 2005, Quantum Inf. Comput..
[54] Wen Qiao-Yan,et al. Teleportation attack on the QSDC protocol with a random basis and order , 2008 .