Memory-free quantum secret sharing protocol with collective detection

[1]  B. Liu,et al.  Decoy-state method for quantum-key-distribution-based quantum private query , 2022, Science China Physics, Mechanics & Astronomy.

[2]  Song Yu,et al.  Rate compatible reconciliation for continuous-variable quantum key distribution using Raptor-like LDPC codes , 2021, Science China Physics, Mechanics & Astronomy.

[3]  Jian-Wei Pan,et al.  Secure quantum key distribution with realistic devices , 2020 .

[4]  G. B. Xu,et al.  Novel methods to construct nonlocal sets of orthogonal product states in an arbitrary bipartite high-dimensional system , 2020, Quantum Information Processing.

[5]  Shanghong Zhao,et al.  Orbital angular momentum-encoded measurement device independent quantum key distribution under atmospheric turbulence , 2019, Quantum Information Processing.

[6]  Jian Li,et al.  A Quantum Key Distribution Protocol Based on the EPR Pairs and its Simulation , 2019, Mobile Networks and Applications.

[7]  Bin Liu,et al.  Quantum Identity Authentication in the Counterfactual Quantum Key Distribution Protocol , 2019, Entropy.

[8]  Changde Xie,et al.  Quantum Secret Sharing Among Four Players Using Multipartite Bound Entanglement of an Optical Field. , 2018, Physical review letters.

[9]  Gang Xu,et al.  Cryptanalysis of secret sharing with a single d-level quantum system , 2018, Quantum Inf. Process..

[10]  Daesung Kwon,et al.  Quantum identity authentication with single photon , 2017, Quantum Information Processing.

[11]  C. Hong,et al.  Quantum identity authentication with single photon , 2017, Quantum Information Processing.

[12]  Bin Liu,et al.  A Generic Construction of Quantum-Oblivious-Key-Transfer-Based Private Query with Ideal Database Security and Zero Failure , 2017, IEEE Transactions on Computers.

[13]  T. Monz,et al.  Realization of a scalable Shor algorithm , 2015, Science.

[14]  Peng Xu,et al.  Flexible protocol for quantum private query based on B92 protocol , 2014, Quantum Inf. Process..

[15]  Xin Jia,et al.  A Quantum Protocol for (t,n)-Threshold Identity Authentication Based on Greenberger-Horne-Zeilinger States , 2013 .

[16]  Yuguang Yang,et al.  A Quantum Protocol for (t,n)-Threshold Identity Authentication Based on Greenberger-Horne-Zeilinger States , 2012, International Journal of Theoretical Physics.

[17]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[18]  Fei Gao,et al.  Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols , 2010, IEEE Journal of Quantum Electronics.

[19]  Gan Gao,et al.  Cryptanalysis of multiparty quantum secret sharing with collective eavesdropping-check , 2010 .

[20]  D. Markham,et al.  Graph states for quantum secret sharing , 2008, 0808.1532.

[21]  Seth Lloyd,et al.  Quantum private queries. , 2007, Physical review letters.

[22]  Guihua Zeng,et al.  Ja n 20 07 Improving security of quantum identity authentication based on ping-pong technique for photons , 1978 .

[23]  H. Lo,et al.  Practical decoy state for quantum key distribution (15 pages) , 2005, quant-ph/0503005.

[24]  Jian-Wei Pan,et al.  Efficient multiparty quantum-secret-sharing schemes , 2004, quant-ph/0405179.

[25]  Guang-Can Guo,et al.  Entanglement preparation and quantum communication with atoms in optical cavities , 2004 .

[26]  V. Scarani,et al.  Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2002, Physical review letters.

[27]  K. Boström,et al.  Deterministic secure direct communication using entanglement. , 2002, Physical review letters.

[28]  R. Cleve,et al.  HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.

[29]  Charles H. Bennett,et al.  Quantum information and computation , 1995, Nature.

[30]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[31]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[32]  T. Hwang,et al.  Dynamic quantum secret sharing , 2013, Quantum Inf. Process..