An improved coding method of quantum key distribution protocols based on Fibonacci-valued OAM entangled states
暂无分享,去创建一个
Mehmet A. Orgun | Cheng Zhan | Josef Pieprzyk | Hong Lai | J. Pieprzyk | M. Orgun | Hong Lai | M. Luo | Ming Xing Luo | Cheng Zhan
[1] A. Stakhov. Fibonacci matrices, a generalization of the “Cassini formula”, and a new coding theory , 2006 .
[2] Jian Shen,et al. A secure cloud-assisted urban data sharing framework for ubiquitous-cities , 2017, Pervasive Mob. Comput..
[3] Charles H. Bennett,et al. Quantum cryptography without Bell's theorem. , 1992, Physical review letters.
[4] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[5] Jian Shen,et al. An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.
[6] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[7] G. Long,et al. Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.
[8] Xingming Sun,et al. Digital forensics of Microsoft Office 2007–2013 documents to prevent covert communication , 2015, Journal of Communications and Networks.
[9] Xiaodong Liu,et al. A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment , 2016, Secur. Commun. Networks.
[10] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[11] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[12] Masahide Sasaki,et al. Progress towards practical device-independent quantum key distribution with spontaneous parametric down-conversion sources, on-off photodetectors, and entanglement swapping , 2015, 1512.06876.
[13] H. Vogel. A better way to construct the sunflower head , 1979 .
[14] Matrix arithmetic based on Fibonacci matrices , 2001 .
[15] Stefano Pironio,et al. Necessary detection efficiencies for secure quantum key distribution and bound randomness , 2016 .
[16] Zhihua Xia,et al. A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[17] Zhangjie Fu,et al. Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data , 2017, IEEE Transactions on Information Forensics and Security.
[18] Ling-An Wu,et al. Measurement-device-independent entanglement-based quantum key distribution , 2016 .
[19] Casey Fitzpatrick,et al. Security in the Multi-Dimensional Fibonacci Protocol , 2015 .
[20] D. Simon,et al. High-capacity quantum Fibonacci coding for key distribution , 2013 .
[21] T. Aaron Gulliver,et al. A new class of Fibonacci sequence based error correcting codes , 2017, Cryptography and Communications.
[22] Sateesh Addepalli,et al. Fog computing and its role in the internet of things , 2012, MCC '12.
[23] Shuang Wang,et al. Experimental demonstration on the deterministic quantum key distribution based on entangled photons , 2016, Scientific Reports.