Multi-user quantum key distribution based on Bell states with mutual authentication
暂无分享,去创建一个
[1] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[2] Albert Einstein,et al. Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? , 1935 .
[3] Deng Fu-Guo,et al. A Theoretical Scheme for Multi-user Quantum Key Distribution with N Einstein-Podolsky-Rosen Pairs on a Passive Optical Network , 2002 .
[4] Long Gui-lu,et al. Quantum Key Distribution Network Based on Differential Phase Shift , 2007 .
[5] Li Zhi-qiang,et al. Efficient Quantum Secure Direct Communication with Authentication , 2007 .
[6] H. Bechmann-Pasquinucci,et al. Quantum cryptography , 2001, quant-ph/0101098.
[7] M. Daoud,et al. Three-dimensional quantum key distribution in the presence of several eavesdroppers , 2011 .
[8] Jan Bouda,et al. Entanglement swapping between multi-qudit systems , 2001 .
[9] Shi-Jinn Horng,et al. Quantum direct communication with mutual authentication , 2009, Quantum Inf. Comput..
[10] Jan-Åke Larsson,et al. Security Aspects of the Authentication Used in Quantum Cryptography , 2008, IEEE Transactions on Information Theory.
[11] Mosayeb Naseri. AN EFFICIENT PROTOCOL FOR QUANTUM SECURE DIALOGUE WITH AUTHENTICATION BY USING SINGLE PHOTONS , 2011 .
[12] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[13] 周萍,et al. Efficient Quantum Cryptography Network without Entanglement and Quantum Memory , 2006 .
[14] Qiaoyan Wen,et al. On the information-splitting essence of two types of quantum key distribution protocols , 2006 .
[15] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[16] Xiongfeng Ma,et al. Practical issues in quantum-key-distribution postprocessing , 2009, 0910.0312.
[17] Deng Fu-Guo,et al. Efficient Quantum Cryptography Network without Entanglement and Quantum Memory , 2006 .
[18] P. Knight,et al. Multiparticle generalization of entanglement swapping , 1998 .
[19] Jing Yang,et al. Quantum Secure Direct Communication with Authentication Expansion Using Single Photons , 2010 .
[20] Guihua Zeng,et al. Secure networking quantum key distribution schemes with Greenberger–Horne–Zeilinger states , 2010 .
[21] Jongin Lim,et al. N quantum channels are sufficient for Multi-user Quantum Key Distribution protocol between n users , 2010 .
[22] Michael K. Reiter,et al. Fair Exchange with a Semi-Trusted Third Party (extended abstract) , 1997, CCS.
[23] Jun Zhu,et al. QUANTUM IDENTITY AUTHENTICATION USING GAUSSIAN-MODULATED SQUEEZED STATES , 2011 .
[24] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[25] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[26] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[27] Li-Hua Gong,et al. Quantum deterministic key distribution protocols based on the authenticated entanglement channel , 2010 .
[28] Yan Wang,et al. Secure quantum key distribution network with Bell states and local unitary operations , 2007, 0705.1746.
[29] Pan Wei,et al. Quantum Secure Direct Communication Based on Authentication , 2008 .
[30] Hwayean Lee,et al. Quantum direct communication with authentication , 2005, quant-ph/0512051.
[31] Wang Yan,et al. Secure Quantum Key Distribution Network with Bell States and Local Unitary Operations , 2005 .
[32] P. Xue,et al. Conditional efficient multiuser quantum cryptography network , 2002 .
[33] Liu Dan,et al. A New Quantum Secure Direct Communication Scheme with Authentication , 2010 .
[34] S. Barnett,et al. Multi-user Quantum Cryptography on Optical Networks , 1995 .