Cryptanalysis and improvement of a quantum private set intersection protocol
暂无分享,去创建一个
[1] Antoni Wójcik. Eavesdropping on the "ping-pong" quantum communication protocol. , 2003, Physical review letters.
[2] Hoi-Kwong Lo,et al. Is Quantum Bit Commitment Really Possible? , 1996, ArXiv.
[3] Ivan Damgård,et al. Cryptography in the Bounded-Quantum-Storage Model , 2008, SIAM J. Comput..
[4] Fen-Zhuo Guo,et al. Consistency of shared reference frames should be reexamined , 2008 .
[5] Hao Liang,et al. Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution , 2010 .
[6] Deng Fu-Guo,et al. Erratum: Improving the security of multiparty quantum secret sharing against Trojan horse attack [Phys. Rev. A 72, 044302 (2005)] , 2006 .
[7] Fei Gao,et al. A simple participant attack on the brádler-dušek protocol , 2007, Quantum Inf. Comput..
[8] Dominic Mayers. Unconditionally secure quantum bit commitment is impossible , 1997 .
[9] Fuguo Deng,et al. Improving the security of multiparty quantum secret sharing against Trojan horse attack , 2005, quant-ph/0506194.
[10] Fei Gao,et al. Postprocessing of the Oblivious Key in Quantum Private Query , 2014, IEEE Journal of Selected Topics in Quantum Electronics.
[11] Dong Hoon Lee,et al. Privacy-preserving disjunctive normal form operations on distributed sets , 2013, Inf. Sci..
[12] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[13] Qiao-Yan Wen,et al. Comment on "experimental demonstration of a quantum protocol for Byzantine agreement and liar detection". , 2008, Physical review letters.
[14] Craig Gentry,et al. Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..
[15] Qiaoyan Wen,et al. Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174] , 2007 .
[16] Qiaoyan Wen,et al. Improving the security of multiparty quantum secret sharing against an attack with a fake signal , 2006 .
[17] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[18] Kaushik Chakraborty,et al. Arbitrarily long relativistic bit commitment , 2015, Physical review letters.
[19] Su-Juan Qin,et al. Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state , 2010 .
[20] N. Gisin,et al. Trojan-horse attacks on quantum-key-distribution systems (6 pages) , 2005, quant-ph/0507063.
[21] Antoni Wojcik,et al. Comment on 'Quantum dense key distribution' , 2005 .
[22] Christoph Simon,et al. Practical private database queries based on a quantum-key-distribution protocol , 2010, 1002.4360.
[23] Christoph Pacher,et al. Attacks on quantum key distribution protocols that employ non-ITS authentication , 2012, Quantum Information Processing.
[24] Qiao-Yan Wen,et al. Improved secure quantum sealed-bid auction , 2009 .
[25] Yanbing Liu,et al. Cryptanalysis and improvement of verifiable quantum (k, n) secret sharing , 2016, Quantum Inf. Process..
[26] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[27] Hoi-Kwong Lo,et al. Insecurity of Quantum Secure Computations , 1996, ArXiv.
[28] Qing-yu Cai,et al. The "ping-pong" protocol can be attacked without eavesdropping. , 2003, Physical review letters.
[29] Fei Gao,et al. Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols , 2010, IEEE Journal of Quantum Electronics.
[30] Hoi-Kwong Lo,et al. Some attacks on quantum-based cryptographic protocols , 2005, Quantum Inf. Comput..
[31] Yi Mu,et al. An efficient quantum scheme for Private Set Intersection , 2016, Quantum Inf. Process..
[32] Wen Qiao-Yan,et al. Teleportation attack on the QSDC protocol with a random basis and order , 2008 .
[33] Bo Zhang,et al. Cryptanalysis and improvement of quantum private comparison of equality protocol without a third party , 2015, Quantum Inf. Process..
[34] Guang-Can Guo,et al. Comment on “Quantum key distribution without alternative measurements” [Phys. Rev. A 61 , 052312 (2000)] , 2001 .
[35] Christian Schaffner,et al. Cryptography from noisy storage. , 2007, Physical review letters.
[36] Qiaoyan Wen,et al. Revisiting the security of secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8, 347 (2009)] , 2011, Quantum Inf. Process..
[37] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[38] Bin Liu,et al. QKD-based quantum private query without a failure probability , 2015, Science China Physics, Mechanics & Astronomy.
[39] Sungyoung Lee,et al. Privacy-aware searching with oblivious term matching for cloud storage , 2012, The Journal of Supercomputing.
[40] Fei Gao,et al. Practical quantum private query with better performance in resisting joint-measurement attack , 2016 .
[41] Wen Qiao-Yan,et al. A Special Eavesdropping on One-Sender Versus N-Receiver QSDC Protocol , 2008 .
[42] Hung-Min Sun,et al. A communication-efficient private matching scheme in Client-Server model , 2014, Inf. Sci..
[43] Justin Zhijun Zhan,et al. Using Private Matching for Securely Querying Genomic Sequences , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[44] Dan Boneh,et al. Location Privacy via Private Proximity Testing , 2011, NDSS.
[45] Moti Yung,et al. Efficient robust private set intersection , 2009, Int. J. Appl. Cryptogr..
[46] Adan Cabello. Reply to `Comment on ``Quantum key distribution without alternative measurements''' , 2000 .