Security Analysis of Quantum Cryptographic Protocols
暂无分享,去创建一个
[1] Zhang Shou,et al. Secret sharing of quantum information via entanglement swapping , 2006 .
[2] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[3] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[4] Huadeng Wang,et al. Man-in-the-middle attack on BB84 protocol and its defence , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[5] Gilles Brassard,et al. Merkle Puzzles in a Quantum World , 2011, CRYPTO.
[6] Mihir Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[7] Mihir Bellare,et al. Optimal Asymmetric Encryption-How to Encrypt with RSA , 1995 .
[8] Mark Zhandry,et al. Random Oracles in a Quantum World , 2010, ASIACRYPT.
[9] Xiangfu Zou,et al. Attacks and Improvements of QSDC Schemes Based on CSS Codes , 2011, ICIC.
[10] 宋婷婷,et al. Participant attack on quantum secret sharing based on entanglement swapping , 2009 .
[11] Lütkenhaus. Security against eavesdropping in quantum cryptography. , 1996, Physical review. A, Atomic, molecular, and optical physics.
[12] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[13] Tatsuaki Okamoto,et al. Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, Journal of Cryptology.
[14] Wen Qiao-Yan,et al. Forcible-Measurement Attack on Quantum Secure Direct Communication Protocol with Cluster State , 2008 .
[15] Dag Roar Hjelme,et al. Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography , 2001 .
[16] Ma Zhi,et al. Quantum Secure Direct Communication Using Quantum Calderbank-Shor-Steane Error Correcting Codes , 2006 .
[17] Mihir Bellare,et al. Optimal Asymmetric Encryption , 1994, EUROCRYPT.
[18] Scott Aaronson,et al. Quantum Copy-Protection and Quantum Money , 2009, 2009 24th Annual IEEE Conference on Computational Complexity.
[19] Wen Qiao-Yan,et al. Teleportation attack on the QSDC protocol with a random basis and order , 2008 .
[20] Dag R. Hjelme,et al. Faked states attack on quantum cryptosystems , 2005 .
[21] 宋杰,et al. Quantum secure direct communication protocol with blind polarization bases and particles' transmitting order , 2007 .
[22] Qiao-Yan Wen,et al. Comment on "experimental demonstration of a quantum protocol for Byzantine agreement and liar detection". , 2008, Physical review letters.