Cryptanalysis and Improvement of Quantum Private Comparison Protocol Based on Bell Entangled States
暂无分享,去创建一个
Yu Zheng | Chao Liu | Wen-Jie Liu | Zheng-Fei Chen | Wenjie Liu | Yu-Lin Zheng | Chao Liu | Zheng-Fei Chen
[1] Adrian Kent,et al. Memory attacks on device-independent quantum cryptography. , 2012, Physical review letters.
[2] Chao Liu,et al. Quantum Private Comparison: A Review , 2013, ArXiv.
[3] Chen Hanwu,et al. An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication , 2009 .
[4] Huantong Geng,et al. Same Initial States Attack in Yang et al.’s Quantum Private Comparison Protocol and the Improvement , 2013, 1312.5562.
[5] Damian Markham,et al. Quantum Secret Sharing with Error Correction , 2014, ArXiv.
[6] Kimble,et al. Unconditional quantum teleportation , 1998, Science.
[7] Yan Wang,et al. Secure quantum key distribution network with Bell states and local unitary operations , 2007, 0705.1746.
[8] Kejin Wei,et al. Experimental circular quantum secret sharing over telecom fiber network. , 2013, Optics express.
[9] Fuguo Deng,et al. Circular quantum secret sharing , 2006, quant-ph/0612018.
[10] Jian-Wei Pan,et al. Efficient multiparty quantum-secret-sharing schemes , 2004, quant-ph/0405179.
[11] Qiaoyan Wen,et al. Quantum Private Comparison Using Genuine Four-Particle Entangled States , 2012 .
[12] Wen Liu,et al. A Protocol for the Quantum Private Comparison of Equality with χ-Type State , 2012 .
[13] Tzonelih Hwang,et al. New quantum private comparison protocol using EPR pairs , 2011, Quantum Information Processing.
[14] Fuguo Deng,et al. Bidirectional quantum key distribution protocol with practical faint laser pulses , 2004 .
[15] Harald Weinfurter,et al. Secure Communication with a Publicly Known Key , 2001 .
[16] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[17] R. Cleve,et al. HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.
[18] Fuguo Deng,et al. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.
[19] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[20] Zhiwei Sun,et al. Quantum Private Comparison Protocol Based on Cluster States , 2013 .
[21] Qiaoyan Wen,et al. Quantum Private Comparison Protocol with the Random Rotation , 2013 .
[22] Tian-Yin Wang,et al. Fault-Tolerate Quantum Private Comparison Based on GHZ States and ECC , 2013, 1405.6765.
[23] Wei-Wei Zhang,et al. Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party , 2013, Quantum Inf. Process..
[24] G. Long,et al. Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.
[25] Xiang Peng,et al. Source monitoring for continuous-variable quantum key distribution , 2012 .
[26] Fuguo Deng,et al. Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.
[27] Wang Yan,et al. Secure Quantum Key Distribution Network with Bell States and Local Unitary Operations , 2005 .
[28] Hoi-Kwong Lo,et al. Insecurity of Quantum Secure Computations , 1996, ArXiv.
[29] Wenjie Liu,et al. Secure Quantum Private Comparison of Equality Based on Asymmetric W State , 2013, 1312.5577.
[30] H. Weinfurter,et al. Experimental quantum teleportation , 1997, Nature.
[31] Christian Kurtsiefer,et al. LETTER TO THE EDITOR: Secure communication with single-photon two-qubit states , 2001 .
[32] Qiaoyan Wen,et al. An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement , 2009 .
[33] Hua Lu,et al. Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel , 2011, 1111.0109.
[34] Bin Liu,et al. Robust and efficient quantum private comparison of equality with collective detection over collective-noise channels , 2013 .
[35] Jacques Traoré,et al. A fair and efficient solution to the socialist millionaires' problem , 2001, Discret. Appl. Math..
[36] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[37] Li Zhi-qiang,et al. Efficient Quantum Secure Direct Communication with Authentication , 2007 .
[38] Wei Cui,et al. Quantum Private Comparison Protocol Based on Bell Entangled States , 2012 .
[39] Bin Gu,et al. High-Capacity Three-Party Quantum Secret Sharing with Single Photons in Both the Polarization and the Spatial-Mode Degrees of Freedom , 2013 .