Eavesdropping on secure quantum telephone protocol with dishonest server
暂无分享,去创建一个
[1] K. Boström,et al. Deterministic secure direct communication using entanglement. , 2002, Physical review letters.
[2] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[3] Yun Liu,et al. Secure quantum telephone , 2007 .
[4] Marco Lucamarini,et al. Secure deterministic communication without entanglement. , 2005, Physical review letters.
[5] Fuguo Deng,et al. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.
[6] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[7] I. Chuang,et al. Quantum Computation and Quantum Information: Introduction to the Tenth Anniversary Edition , 2010 .
[8] Fuguo Deng,et al. Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.
[9] Guihua Zeng,et al. Quantum key agreement protocol , 2004 .
[10] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[11] V. Buzek,et al. Quantum secret sharing , 1998, quant-ph/9806063.
[12] M. Koashi,et al. Quantum entanglement for secret sharing and secret splitting , 1999 .