Economical quantum anonymous transmissions
暂无分享,去创建一个
Tian-Yin Wang | Fu-Chen Zhu | Qiao-Yan Wen | F. Zhu | Tianyin Wang | Q. Wen
[1] P. Oscar Boykin. Information Security and Quantum Mechanics: Security of Quantum Protocols , 2002 .
[2] Hong Guo,et al. Security bound of continuous-variable quantum key distribution with noisy coherent states and channel , 2009, 0904.1327.
[3] Jan Bouda,et al. Anonymous Transmission of Quantum Information , 2007, 2007 First International Conference on Quantum, Nano, and Micro Technologies (ICQNM'07).
[4] Charles H. Bennett,et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.
[5] F. Bussières,et al. Fair Loss-Tolerant Quantum Coin Flipping , 2009, 0904.3945.
[6] P. Hayden,et al. Security of quantum bit string commitment depends on the information measure. , 2006, Physical review letters.
[7] R. Cleve,et al. HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.
[8] M. Koashi,et al. Quantum entanglement for secret sharing and secret splitting , 1999 .
[9] K. Boström,et al. Deterministic secure direct communication using entanglement. , 2002, Physical review letters.
[10] Fuguo Deng,et al. Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.
[11] V. Buzek,et al. Quantum secret sharing , 1998, quant-ph/9806063.
[12] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[13] W. Bowen,et al. Tripartite quantum state sharing. , 2003, Physical review letters.
[14] Xiu-Bo Chen,et al. An efficient and secure multiparty quantum secret sharing scheme based on single photons , 2008 .
[15] M. Ying,et al. Unambiguous discrimination between mixed quantum states , 2004, quant-ph/0403147.
[16] Charles H. Bennett,et al. Quantum cryptography without Bell's theorem. , 1992, Physical review letters.
[17] Christian Kurtsiefer,et al. Experimental single qubit quantum secret sharing. , 2005, Physical review letters.
[18] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[19] Frank Stajano,et al. The Cocaine Auction Protocol: On the Power of Anonymous Broadcast , 1999, Information Hiding.
[20] Bowen Alpern,et al. Key Exchange Using 'Keyless Cryptography' , 1983, Inf. Process. Lett..
[21] Qiaoyan Wen,et al. Cryptanalysis and improvement of multiparty quantum secret sharing schemes , 2008 .
[22] Marco Lucamarini,et al. Secure deterministic communication without entanglement. , 2005, Physical review letters.
[23] Su-Juan Qin,et al. An external attack on the Brádler–Dušek protocol , 2007 .
[24] Guang Ping He,et al. Comment on "experimental single qubit quantum secret sharing". , 2007, Physical review letters.
[25] Gilles Brassard,et al. Oblivious Transfers and Privacy Amplification , 1997, Journal of Cryptology.
[26] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[27] P. Hayden,et al. Possibility, impossibility, and cheat sensitivity of quantum-bit string commitment , 2005, quant-ph/0504078.