An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption
暂无分享,去创建一个
Long Zhang | Hong-Wei Sun | Ke-Jia Zhang | Heng-Yue Jia | Kejia Zhang | Long Zhang | Hong-Wei Sun | H. Jia
[1] Fuguo Deng,et al. Improving the security of multiparty quantum secret sharing against Trojan horse attack , 2005, quant-ph/0506194.
[2] Qing-yu Cai,et al. The "ping-pong" protocol can be attacked without eavesdropping. , 2003, Physical review letters.
[3] Ahmed A. Abd El-Latif,et al. A dynamic watermarking scheme for quantum images using quantum wavelet transform , 2013, Quantum Information Processing.
[4] Fei Gao,et al. Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols , 2010, IEEE Journal of Quantum Electronics.
[5] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[6] R. Cleve,et al. HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.
[7] Yuan Su,et al. Cryptanalysis on the improved multiparty quantum secret sharing protocol based on the GHZ state , 2012, Physica Scripta.
[8] V. Buzek,et al. Quantum secret sharing , 1998, quant-ph/9806063.
[9] Tzonelih Hwang,et al. Comment on “Security analysis and improvements of arbitrated quantum signature schemes” , 2011, 1105.1232.
[10] Ying Sun,et al. Reexamination of arbitrated quantum signature: the impossible and the possible , 2013, Quantum Inf. Process..
[11] Qiaoyan Wen,et al. Quantum secure direct communication with χ -type entangled states , 2008 .
[12] Qiaoyan Wen,et al. Quantum Steganography with High Efficiency with Noisy Depolarizing Channels , 2013, IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences.
[13] Charles H. Bennett,et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.
[14] Su-Juan Qin,et al. Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state , 2010 .
[15] Antoni Wójcik. Eavesdropping on the "ping-pong" quantum communication protocol. , 2003, Physical review letters.
[16] Guihua Zeng,et al. Arbitrated quantum-signature scheme , 2001, quant-ph/0109007.
[17] N. Gisin,et al. Trojan-horse attacks on quantum-key-distribution systems (6 pages) , 2005, quant-ph/0507063.
[18] Mosayeb Naseri,et al. Quantum Watermarking Using Entanglement Swapping , 2012, International Journal of Theoretical Physics.
[19] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[20] Wen Qiao-Yan,et al. Cryptanalysis of the arbitrated quantum signature protocols , 2011 .
[21] Jian-Hong Shi,et al. An arbitrated quantum signature protocol based on the chained CNOT operations encryption , 2015, Quantum Inf. Process..
[22] Lov K. Grover. A fast quantum mechanical algorithm for database search , 1996, STOC '96.
[23] Antoni Wojcik,et al. Comment on 'Quantum dense key distribution' , 2005 .
[24] Wei-Wei Zhang,et al. Improving the security of arbitrated quantum signature against the forgery attack , 2013, Quantum Inf. Process..
[25] R. Cleve,et al. Quantum fingerprinting. , 2001, Physical review letters.
[26] Daowen Qiu,et al. Security analysis and improvements of arbitrated quantum signature schemes , 2010 .
[27] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[28] Adan Cabello. Quantum key distribution without alternative measurements , 2000 .
[29] Qiaoyan Wen,et al. Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174] , 2007 .
[30] Qiaoyan Wen,et al. Improving the security of multiparty quantum secret sharing against an attack with a fake signal , 2006 .
[31] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[32] Fen-Zhuo Guo,et al. Consistency of shared reference frames should be reexamined , 2008 .
[33] M. Koashi,et al. Quantum entanglement for secret sharing and secret splitting , 1999 .
[34] Ying Guo,et al. A Chaos-based Arbitrated Quantum Signature Scheme in Quantum Crypotosystem , 2014 .
[35] Fei Gao,et al. A simple participant attack on the brádler-dušek protocol , 2007, Quantum Inf. Comput..
[36] Adam D. Smith,et al. Authentication of quantum messages , 2001, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[37] Qiao-Yan Wen,et al. Comment on "experimental demonstration of a quantum protocol for Byzantine agreement and liar detection". , 2008, Physical review letters.
[38] Kejia Zhang,et al. Cryptanalysis of a Quantum Proxy Weak Blind Signature Scheme , 2015 .
[39] Wen Qiao-Yan,et al. Teleportation attack on the QSDC protocol with a random basis and order , 2008 .
[40] Guang-Can Guo,et al. Comment on “Quantum key distribution without alternative measurements” [Phys. Rev. A 61 , 052312 (2000)] , 2001 .
[41] Peng Xu,et al. Analysis and improvement of the watermark strategy for quantum images based on quantum Fourier transform , 2013, Quantum Inf. Process..
[42] Fuguo Deng,et al. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.
[43] Tzonelih Hwang,et al. Comment on "An arbitrated quantum signature protocol based on the chained CNOT operations encryption" , 2015 .
[44] Wen Qiao-Yan,et al. A Special Eavesdropping on One-Sender Versus N-Receiver QSDC Protocol , 2008 .
[45] Qiaoyan Wen,et al. Quantum key distribution without alternative measurements and rotations , 2006 .
[46] Gang Xu,et al. CRYPTANALYSIS OF THE QUANTUM STATE SHARING PROTOCOL USING FOUR SETS OF W-CLASS STATES , 2013 .
[47] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[48] Adan Cabello. Reply to `Comment on ``Quantum key distribution without alternative measurements''' , 2000 .
[49] Yixian Yang,et al. Multi-party quantum secret sharing with the single-particle quantum state to encode the information , 2013, Quantum Inf. Process..
[50] Shang Tao,et al. Enhanced arbitrated quantum signature scheme using Bell states , 2014 .
[51] Todd A. Brun,et al. Quantum steganography , 2010, Digital Media Steganography.
[52] G. Long,et al. Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.
[53] Deng Fu-Guo,et al. Erratum: Improving the security of multiparty quantum secret sharing against Trojan horse attack [Phys. Rev. A 72, 044302 (2005)] , 2006 .
[54] Qin Li,et al. Arbitrated quantum signature scheme using Bell states , 2009 .
[55] Dowon Hong,et al. Security problem on arbitrated quantum signature schemes , 2011 .
[56] Xin Liao,et al. Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels , 2015, J. Vis. Commun. Image Represent..