Attacks and Improvements of QSDC Schemes Based on CSS Codes
暂无分享,去创建一个
[1] Qing-yu Cai,et al. The "ping-pong" protocol can be attacked without eavesdropping. , 2003, Physical review letters.
[2] Zhi-Xi Wang,et al. Quantum secure direct communication by Einstein-Podolsky-Rosen pairs and entanglement swapping , 2004, quant-ph/0406083.
[3] Zhi-Xi Wang,et al. Deterministic secure direct communication using GHZ states and swapping quantum entanglement , 2004, quant-ph/0406082.
[4] Xin Ji,et al. Three-party quantum secure direct communication based on GHZ states , 2006, quant-ph/0601125.
[5] Zhan-jun Zhang,et al. Improving Wojcik's eavesdropping attack on the ping-pong protocol , 2004 .
[6] Fu-Guo Deng,et al. Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2005 .
[7] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[8] Fuguo Deng,et al. Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.
[9] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[10] Huadeng Wang,et al. Man-in-the-middle attack on BB84 protocol and its defence , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[11] A. Mohri,et al. Effect of inner current-carrying rings on the equilibrium of toroidal plasma , 1971 .
[12] Ping Zhou,et al. Quantum secure direct communication network with Einstein–Podolsky–Rosen pairs , 2006 .
[13] H. Hoffmann,et al. Comment on 'Secure direct communication with a quantum one-time pad' , 2005 .
[14] Nguyen Ba An. Quantum dialogue , 2004 .
[15] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[16] Harald Weinfurter,et al. Secure Communication with a Publicly Known Key , 2001 .
[17] Fuguo Deng,et al. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.
[18] Antoni Wójcik. Eavesdropping on the "ping-pong" quantum communication protocol. , 2003, Physical review letters.
[19] I. Chuang,et al. Quantum Computation and Quantum Information: Introduction to the Tenth Anniversary Edition , 2010 .
[20] Zhang Zhan-jun,et al. Deterministic secure direct communication by using swapping quantum entanglement and local unitary operations , 2005 .
[21] Ma Zhi,et al. Quantum Secure Direct Communication Using Quantum Calderbank-Shor-Steane Error Correcting Codes , 2006 .
[22] Marco Lucamarini,et al. Secure deterministic communication without entanglement. , 2005, Physical review letters.
[23] K. Boström,et al. Deterministic secure direct communication using entanglement. , 2002, Physical review letters.