Provably Secure and Password-Authenticated Quantum Key Agreement Protocol with Dynamic Basis
暂无分享,去创建一个
[1] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[2] Hoi-Kwong Lo,et al. Proof of security of quantum key distribution with two-way classical communications , 2001, IEEE Trans. Inf. Theory.
[3] Li Gong,et al. Efficient network authentication protocols: Lower bounds and optimal implementations , 1995, Distributed Computing.
[4] Guihua Zeng,et al. Identity verification in quantum key distribution , 2000 .
[5] J. Schwinger. UNITARY OPERATOR BASES. , 1960, Proceedings of the National Academy of Sciences of the United States of America.
[6] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[7] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[8] Xu Chen. A(3,3) visual cryptography scheme for authentication , 2013 .
[9] Gilles Brassard,et al. Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..
[10] Tzonelih Hwang,et al. Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols , 2007, IEEE Transactions on Dependable and Secure Computing.
[11] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[12] King-Hang Wang,et al. Comments on “An improved secure and efficient password and chaos-based two-party key agreement protocol” , 2016, Nonlinear Dynamics.
[13] D. J. Guan,et al. A practical protocol for three-party authenticated quantum key distribution , 2014, Quantum Information Processing.
[14] Haiyang Li,et al. Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New Architecture in Standard Model , 2016, Int. J. Netw. Secur..
[15] Mihir Bellare,et al. Provably secure session key distribution: the three party case , 1995, STOC '95.
[16] Linhua Zhang. Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .
[17] Emmanuel Bresson,et al. Provably authenticated group Diffie-Hellman key exchange , 2001, CCS '01.
[18] Chien-Ming Chen,et al. On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol , 2016, J. Netw. Intell..