Modification Attack on QSDC with Authentication and the Improvement
暂无分享,去创建一个
[1] T. Hwang,et al. Improved QSDC Protocol over a Collective-Dephasing Noise Channel , 2012 .
[2] Ivan Damgård,et al. A Design Principle for Hash Functions , 1989, CRYPTO.
[3] T. Hwang,et al. One-Way Quantum Authenticated Secure Communication Using Rotation Operation , 2011 .
[4] Zhan-jun Zhang. Comment on : Quantum direct communication with authentication , 2006, quant-ph/0604125.
[5] Li Zhi-qiang,et al. Efficient Quantum Secure Direct Communication with Authentication , 2007 .
[6] Hwayean Lee,et al. Quantum direct communication with authentication , 2005, quant-ph/0512051.
[7] Liu Dan,et al. A New Quantum Secure Direct Communication Scheme with Authentication , 2010 .
[8] Shi-Jinn Horng,et al. Quantum direct communication with mutual authentication , 2009, Quantum Inf. Comput..
[9] Fuguo Deng,et al. Improving the security of multiparty quantum secret sharing against Trojan horse attack , 2005, quant-ph/0506194.
[10] Jing Yang,et al. Quantum Secure Direct Communication with Authentication Expansion Using Single Photons , 2010 .
[11] Chao-Hua Yu,et al. Quantum Secure Direct Communication with Authentication Using Two Nonorthogonal States , 2013 .
[12] Fuguo Deng,et al. Improving the security of secure direct communication based on the secret transmitting order of particles , 2006, quant-ph/0612016.
[13] Chun-Wei Yang,et al. Enhancement on “quantum blind signature based on two-state vector formalism” , 2013, Quantum Inf. Process..
[14] Wen Qiao-Yan,et al. High Efficiency of Two Efficient QSDC with Authentication Is at the Cost of Their Security , 2009 .
[15] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[16] Zhiwei Sun,et al. QUANTUM SECURE DIRECT COMMUNICATION WITH QUANTUM IDENTIFICATION , 2012 .
[17] Q. Cai. Eavesdropping on the two-way quantum communication protocols with invisible photons , 2005, quant-ph/0508002.
[18] Ping Zhou,et al. Robustness of two-way quantum communication protocols against Trojan horse attack , 2005 .
[19] Qing-yu Cai,et al. The "ping-pong" protocol can be attacked without eavesdropping. , 2003, Physical review letters.
[20] Wen Qiao-Yan,et al. Quantum blind signature based on Two-State Vector Formalism , 2010 .
[21] Deng Fu-Guo,et al. Erratum: Improving the security of multiparty quantum secret sharing against Trojan horse attack [Phys. Rev. A 72, 044302 (2005)] , 2006 .