Revisiting the security of secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8, 347 (2009)]
暂无分享,去创建一个
Qiaoyan Wen | Yu-Guang Yang | Yi-Wei Teng | Hai-Ping Chai | Yuguang Yang | Yi-Wei Teng | Hai-Ping Chai | Q. Wen
[1] Kaoru Shimizu,et al. Communication channels secured from eavesdropping via transmission of photonic Bell states , 1999 .
[2] Nguyen Ba An. Quantum dialogue , 2004 .
[3] Fuguo Deng,et al. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.
[4] Fuguo Deng,et al. Quantum secure direct communication with high-dimension quantum superdense coding , 2005 .
[5] Fei Gao,et al. Comment on ``Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers'' , 2005 .
[6] Marco Lucamarini,et al. Secure deterministic communication without entanglement. , 2005, Physical review letters.
[7] F. L. Yan,et al. A scheme for secure direct communication using EPR pairs and teleportation , 2004 .
[8] Qiaoyan Wen,et al. Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174] , 2007 .
[9] Qiaoyan Wen,et al. Quantum secure direct communication with χ -type entangled states , 2008 .
[10] Wen Qiao-Yan,et al. A Special Eavesdropping on One-Sender Versus N-Receiver QSDC Protocol , 2008 .
[11] Zhan-jun Zhang. Comment on : Quantum direct communication with authentication , 2006, quant-ph/0604125.
[12] Fuguo Deng,et al. Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.
[13] Hwayean Lee,et al. Quantum direct communication with authentication , 2005, quant-ph/0512051.
[14] K. Boström,et al. Deterministic secure direct communication using entanglement. , 2002, Physical review letters.
[15] Arti Chamoli,et al. Secure direct communication based on ping–pong protocol , 2009, Quantum Inf. Process..
[16] Su-Juan Qin,et al. Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state , 2010 .
[17] Mosayeb Naseri,et al. Comment on: “secure direct communication based on ping-pong protocol” [Quantum Inf. Process. 8, 347 (2009)] , 2010, Quantum Inf. Process..
[18] Qing-yu Cai,et al. Improving the capacity of the Boström-Felbinger protocol , 2003, quant-ph/0311168.
[19] Qiaoyan Wen,et al. Comment II on "Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers" (3 pages) , 2005, quant-ph/0505052.
[20] Qiaoyan Wen,et al. Comment on “Quantum key distribution for d -level systems with generalized Bell states” , 2005, quant-ph/0505053.
[21] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.