Secure quantum network coding based on quantum homomorphic message authentication
暂无分享,去创建一个
Gang Xu | Xiubo Chen | Yi-Xian Yang | Zhen-Zhen Li | Xiubo Chen | Yixian Yang | Gang Xu | Zhen-Zhen Li
[1] Dan Boneh,et al. Homomorphic MACs: MAC-Based Integrity for Network Coding , 2009, ACNS.
[2] Xiongfeng Ma,et al. Decoy state quantum key distribution. , 2004, Physical review letters.
[3] Ziye Zhang,et al. Existence, uniqueness, and exponential stability analysis for complex-valued memristor-based BAM neural networks with time delays , 2017, Appl. Math. Comput..
[4] Charles H. Bennett,et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.
[5] Sae-Young Chung,et al. Parallel Opportunistic Routing in Wireless Networks , 2009, IEEE Transactions on Information Theory.
[6] Gang Xu,et al. Quantum state secure transmission in network communications , 2014, Inf. Sci..
[7] Karol Bartkiewicz,et al. Using quantum routers to implement quantum message authentication and Bell-state manipulation , 2014 .
[8] Tongsong Jiang,et al. An algebraic method for quaternion and complex Least Squares coneigen-problem in quantum mechanics , 2014, Appl. Math. Comput..
[9] Chau Yuen,et al. A Tag Encoding Scheme against Pollution Attack to Linear Network Coding , 2014, IEEE Transactions on Parallel and Distributed Systems.
[10] Kenneth W. Shum,et al. Linear Network Coding for Erasure Broadcast Channel With Feedback: Complexity and Algorithms , 2012, IEEE Transactions on Information Theory.
[11] Frédérique E. Oggier,et al. An Authentication Code Against Pollution Attacks in Network Coding , 2009, IEEE/ACM Transactions on Networking.
[12] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[13] Tao Jiang,et al. A Novel Homomorphic MAC Scheme for Authentication in Network Coding , 2011, IEEE Communications Letters.
[14] Tao Jiang,et al. An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding , 2013, IEEE Transactions on Computers.
[15] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[16] Jing Wang,et al. synchronization for singularly perturbed complex networks with semi-Markov jump topology , 2018, Appl. Math. Comput..
[17] Jianwei Liu,et al. Quantum Network Coding Against Pollution Attacks , 2016, IEEE Communications Letters.
[18] Rodney Van Meter,et al. Analysis of quantum network coding for realistic repeater networks , 2015, 1508.02141.
[19] Feihu Xu,et al. Concise security bounds for practical decoy-state quantum key distribution , 2013, 1311.7129.
[20] Mark Zhandry,et al. Quantum-Secure Message Authentication Codes , 2013, IACR Cryptol. ePrint Arch..
[21] Hoi-Kwong Lo,et al. Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security , 2004, Journal of Cryptology.
[22] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[23] Gang Xu,et al. The solvability of quantum k-pair network in a measurement-based way , 2017, Scientific Reports.
[24] Hiroshi Imai,et al. Quantum network coding for quantum repeaters , 2012, 1205.3745.
[25] Randall Dougherty,et al. Nonreversibility and Equivalent Constructions of Multiple-Unicast Networks , 2006, IEEE Transactions on Information Theory.
[26] Fuguo Deng,et al. Efficient high-capacity quantum secret sharing with two-photon entanglement , 2006, quant-ph/0602160.
[27] Martin Rötteler,et al. General Scheme for Perfect Quantum Network Coding with Free Classical Communication , 2009, ICALP.
[28] I. Chuang,et al. Quantum Computation and Quantum Information: Introduction to the Tenth Anniversary Edition , 2010 .
[29] Masahito Hayashi,et al. Prior entanglement between senders enables perfect quantum network coding with modification , 2007, 0706.0197.
[30] Masahito Hayashi,et al. Single-shot secure quantum network coding on butterfly network with free public communication , 2017, Quantum Science and Technology.
[31] Masahito Hayashi,et al. Quantum Network Coding , 2006, STACS.
[32] Debbie W. Leung,et al. Quantum Network Communication—The Butterfly and Beyond , 2010, IEEE Transactions on Information Theory.
[33] Alexander Russell,et al. Quantum-secure message authentication via blind-unforgeability , 2018, IACR Cryptol. ePrint Arch..
[34] Harumichi Nishimura,et al. Quantum network coding — How can network coding be applied to quantum information? , 2013, 2013 International Symposium on Network Coding (NetCod).
[35] Donghua Zhou,et al. Data-based predictive control for networked nonlinear systems with packet dropout and measurement noise , 2017, Journal of Systems Science and Complexity.
[36] Adam D. Smith,et al. Authentication of quantum messages , 2001, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[37] Michael Epping,et al. Robust entanglement distribution via quantum network coding , 2016 .
[38] Jianguo Huang,et al. Solving steady incompressible Navier-Stokes equations by the Arrow-Hurwicz method , 2017, J. Comput. Appl. Math..
[39] Xinxin Niu,et al. Probabilistic quantum network coding of M-qudit states over the butterfly network , 2010 .
[40] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.
[41] Shuo-Yen Robert Li,et al. Linear network coding , 2003, IEEE Trans. Inf. Theory.
[42] Martin Rötteler,et al. Constructing quantum network coding schemes from classical nonlinear protocols , 2010, 2011 IEEE International Symposium on Information Theory Proceedings.
[43] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[44] M. Curty,et al. Quantum authentication of classical messages , 2001, quant-ph/0103122.
[45] Huanhe Dong,et al. Generalized Bilinear Differential Operators, Binary Bell Polynomials, and Exact Periodic Wave Solution of Boiti-Leon-Manna-Pempinelli Equation , 2014 .
[46] Xiaoqian Zhang,et al. Controlled quantum secure direct communication by entanglement distillation or generalized measurement , 2016, Quantum Information Processing.
[47] Masahito Hayashi,et al. Secure Quantum Network Coding on Butterfly Network , 2017 .
[48] Mio Murao,et al. Network Coding for Distributed Quantum Computation Over Cluster and Butterfly Networks , 2015, IEEE Transactions on Information Theory.
[49] Tzonelih Hwang,et al. New quantum private comparison protocol using EPR pairs , 2011, Quantum Information Processing.
[50] Junwei Lu,et al. Hopf bifurcation analysis of a complex-valued neural network model with discrete and distributed delays , 2018, Appl. Math. Comput..
[51] Gang Xu,et al. Network coding for quantum cooperative multicast , 2015, Quantum Inf. Process..