Arbitrated quantum signature protocol with boson sampling-based random unitary encryption
暂无分享,去创建一个
Feng Yanyan | Wei Zhao | Ronghua Shi | Jinjing Shi | Lu Yuhu | Tang Yongze | Wei Zhao | Ronghua Shi | Jinjing Shi | Yanyan Feng | Yuhu Lu | Yongze Tang
[1] Hwayean Lee,et al. Arbitrated quantum signature scheme with message recovery , 2004 .
[2] Dowon Hong,et al. Security problem on arbitrated quantum signature schemes , 2011 .
[3] P. Busch,et al. Heisenberg's uncertainty principle , 2006, quant-ph/0609185.
[4] Peng Huang,et al. High-speed continuous-variable quantum key distribution without sending a local oscillator. , 2015, Optics letters.
[5] Yu-Guang Yang,et al. Arbitrated quantum signature scheme based on cluster states , 2016, Quantum Inf. Process..
[6] Andris Ambainis,et al. Quantum walks on graphs , 2000, STOC '01.
[7] Jiangfeng Du,et al. Experimental implementation of the quantum random-walk algorithm , 2002, quant-ph/0203120.
[8] Ying Guo,et al. Long-distance continuous-variable quantum key distribution using separable Gaussian states , 2018, Physical Review A.
[9] Long Zhang,et al. An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption , 2017, Quantum Inf. Process..
[10] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[11] Ying Guo,et al. A Chaos-based Arbitrated Quantum Signature Scheme in Quantum Crypotosystem , 2014 .
[12] Ying Guo,et al. Quantum dual signature scheme based on coherent states with entanglement swapping , 2016 .
[13] Jian-Hong Shi,et al. An arbitrated quantum signature protocol based on the chained CNOT operations encryption , 2015, Quantum Inf. Process..
[14] Adam D. Smith,et al. Authentication of quantum messages , 2001, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[15] N. Lutkenhaus,et al. Comment on ``Arbitrated quantum-signature scheme'' , 2008, 0806.0854.
[16] Guihua Zeng. Reply to “Comment on ‘Arbitrated quantum-signature scheme’ ” , 2008 .
[17] Andris Ambainis,et al. One-dimensional quantum walks , 2001, STOC '01.
[18] Jian Zhou,et al. Arbitrated quantum signature scheme with quantum walk-based teleportation , 2019, Quantum Inf. Process..
[19] Peng Huang,et al. Long-distance continuous-variable quantum key distribution by controlling excess noise , 2016, Scientific Reports.
[20] I. Chuang,et al. Quantum Computation and Quantum Information: Bibliography , 2010 .
[21] Wen Qiao-Yan,et al. Cryptanalysis of the arbitrated quantum signature protocols , 2011 .
[22] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[23] Lov K. Grover. Quantum Mechanics Helps in Searching for a Needle in a Haystack , 1997, quant-ph/9706033.
[24] Bikash K. Behera,et al. Experimental realization of quantum teleportation using coined quantum walks , 2019, Quantum Information Processing.
[25] Zhiwei Sun,et al. Improving the security of arbitrated quantum signature protocols , 2011 .
[26] Wei-Wei Zhang,et al. Improving the security of arbitrated quantum signature against the forgery attack , 2013, Quantum Inf. Process..
[27] Yuguang Yang,et al. An Approach to Cryptography Based on Continuous-Variable Quantum Neural Network , 2020, Scientific Reports.
[28] Daowen Qiu,et al. Security analysis and improvements of arbitrated quantum signature schemes , 2010 .
[29] Run-Hua Shi,et al. A generic quantum protocol for one-sided secure two-party classical computations , 2019, Quantum Information Processing.
[30] G. Guo,et al. Optical implementation of one-dimensional quantum random walks using orbital angular momentum of a single photon , 2006 .
[31] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[32] N. Killoran,et al. Strawberry Fields: A Software Platform for Photonic Quantum Computing , 2018, Quantum.
[33] Scott Aaronson,et al. The computational complexity of linear optics , 2010, STOC '11.
[34] Georgios M. Nikolopoulos,et al. Cryptographic one-way function based on boson sampling , 2019, Quantum Information Processing.
[35] Meng Li,et al. Experimental realization of state transfer by quantum walks with two coins , 2019 .
[36] Yu Wang,et al. Quantum communication protocols by quantum walks with two coins , 2018, EPL (Europhysics Letters).
[37] R. Cleve,et al. Quantum fingerprinting. , 2001, Physical review letters.
[38] Georgios M. Nikolopoulos,et al. Decision and function problems based on boson sampling , 2016, ArXiv.
[39] Guihua Zeng,et al. Arbitrated quantum-signature scheme , 2001, quant-ph/0109007.
[40] Seungbeom Chin,et al. Partial distinguishability as a coherence resource in boson sampling , 2018, Quantum Inf. Process..
[41] Hai Zhang,et al. Controlled SWAP attack and improved quantum encryption of arbitrated quantum signature schemes , 2019, Quantum Inf. Process..
[42] Peter W. Shor. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1999 .
[43] Qin Li,et al. Arbitrated quantum signature scheme using Bell states , 2009 .
[44] Gilles Brassard,et al. An Update on Quantum Cryptography , 1985, CRYPTO.
[45] Charles H. Bennett,et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.
[46] Yun Shang,et al. Generalized teleportation by quantum walks , 2017, Quantum Inf. Process..