Quantum identity authentication in the orthogonal-state-encoding QKD system
暂无分享,去创建一个
Bin Liu | Di Xiao | Zhifeng Gao | Wei Huang | Xingbin Liu | Bingjie Xu | D. Xiao | Wei Huang | Bingjie Xu | Bin Liu | Xingbin Liu | Zhifeng Gao
[1] V. Buzek,et al. Quantum secret sharing , 1998, quant-ph/9806063.
[2] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[3] S. Barnett,et al. Quantum state discrimination , 2008, 0810.1970.
[4] Qiaoyan Wen,et al. Security of a kind of quantum secret sharing with single photons , 2011, Quantum Inf. Comput..
[5] Ying Sun,et al. Quantum private query based on single-photon interference , 2016, Quantum Inf. Process..
[6] M. Bourennane,et al. Authority-based user authentication in quantum key distribution , 2000 .
[7] K. Boström,et al. Deterministic secure direct communication using entanglement. , 2002, Physical review letters.
[8] G. Long,et al. Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.
[9] Fei Gao,et al. Security of quantum secret sharing with two-particle entanglement against individual attacks , 2009, Quantum Inf. Comput..
[10] Qiao-Yan Wen,et al. Eavesdropping and Improvement to Multiparty Quantum Secret Sharing with Collective Eavesdropping-Check , 2009, International Journal of Theoretical Physics.
[11] Wei Cui,et al. Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.
[12] Wen Qiao-Yan,et al. Fault tolerant quantum secure direct communication with quantum encryption against collective noise , 2012 .
[13] Tang Chao-jing,et al. Multiparty Simultaneous Quantum Identity Authentication Based on Entanglement Swapping , 2006 .
[14] Fei Gao,et al. Postprocessing of the Oblivious Key in Quantum Private Query , 2014, IEEE Journal of Selected Topics in Quantum Electronics.
[15] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[16] R. Cleve,et al. HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.
[17] Daesung Kwon,et al. Quantum identity authentication with single photon , 2017, Quantum Information Processing.
[18] Christoph Simon,et al. Practical private database queries based on a quantum-key-distribution protocol , 2010, 1002.4360.
[19] Bin Liu,et al. QKD-based quantum private query without a failure probability , 2015, 1511.05267.
[20] Jun Zhou,et al. Quantum identity authentication based on ping-pong technique without entanglements , 2014, Quantum Inf. Process..
[21] Jian Li,et al. Quantum key distribution and quantum authentication based on entangled state , 2001 .
[22] Qiaoyan Wen,et al. Robust variations of the Bennett-Brassard 1984 protocol against collective noise , 2009 .
[23] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[24] M. Dušek,et al. Quantum identification system , 1998, quant-ph/9809024.
[25] Chen Yuan,et al. Quantum Authentication Scheme Based on Entanglement Swapping , 2016 .
[26] Bin Liu,et al. Quantum private comparison employing single-photon interference , 2017, Quantum Inf. Process..
[27] Song Lin,et al. Quantum key distribution: defeating collective noise without reducing efficiency , 2014, Quantum Inf. Comput..
[28] Quan Zhang,et al. Multiparty simultaneous quantum identity authentication based on entanglement swapping , 2006 .
[29] Yan-Bing Li. Analysis of counterfactual quantum key distribution using error-correcting theory , 2014, Quantum Inf. Process..
[30] Su-Juan Qin,et al. Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state , 2010 .
[31] Guihua Zeng,et al. Ja n 20 07 Improving security of quantum identity authentication based on ping-pong technique for photons , 2009 .
[32] Peng Huang,et al. Continuous-variable quantum identity authentication based on quantum teleportation , 2016, Quantum Information Processing.
[33] Bin Liu,et al. A Generic Construction of Quantum-Oblivious-Key-Transfer-Based Private Query with Ideal Database Security and Zero Failure , 2017, IEEE Transactions on Computers.
[34] Qiaoyan Wen,et al. Finite-key analysis for measurement-device-independent quantum key distribution , 2012 .
[35] Goldenberg,et al. Quantum cryptography based on orthogonal states. , 1995, Physical review letters.
[36] Ying Guo,et al. Graph state-based quantum authentication scheme , 2017 .
[37] Qiaoyan Wen,et al. Quantum secure direct communication with χ -type entangled states , 2008 .
[38] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[39] M. Curty,et al. Quantum authentication of classical messages , 2001, quant-ph/0103122.
[40] G. Long,et al. Controlled order rearrangement encryption for quantum key distribution , 2003, quant-ph/0308172.
[41] Xing Zhang,et al. Multiparty simultaneous quantum identity authentication with secret sharing , 2008 .
[42] Kaoru Shimizu,et al. Single-photon-interference communication equivalent to Bell-state-basis cryptographic quantum communication , 2000 .