Qiao-Yan Wen

From MaRDI portal
Revision as of 23:11, 9 December 2023 by AuthorDisambiguator (talk | contribs) (AuthorDisambiguator moved page Qiao-Yan Wen to Qiao-Yan Wen: Duplicate)

Person:265420

Available identifiers

zbMath Open wen.qiaoyanMaRDI QIDQ265420

List of research outcomes





PublicationDate of PublicationType
Generalized constructions of highly non-linear multi-output Boolean functions2024-09-18Paper
Sharing genuine entanglement of generalized tripartite states by multiple sequential observers2024-02-02Paper
Quantum alternating operator ansatz for solving the minimum exact cover problem2023-09-08Paper
Quantum algorithm for unsupervised anomaly detection2023-08-07Paper
A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion2023-06-30Paper
Quantum discriminative canonical correlation analysis2023-05-23Paper
Using entanglement more efficiently in distinguishing orthogonal product states by LOCC2023-01-05Paper
Effects of measurement dependence on 1-parameter family of Bell tests2022-11-28Paper
Practical decoy-state quantum private queries against joint-measurement attack under weak coherent pulse sources2022-11-24Paper
Quantum mean centering for block-encoding-based quantum algorithm2022-11-11Paper
Controlling the key by choosing the detection bits in quantum cryptographic protocols2022-10-28Paper
Quantum algorithms for anomaly detection using amplitude estimation2022-09-06Paper
https://portal.mardi4nfdi.de/entity/Q50337392022-02-23Paper
https://portal.mardi4nfdi.de/entity/Q50327152022-02-22Paper
https://portal.mardi4nfdi.de/entity/Q50355012022-02-22Paper
https://portal.mardi4nfdi.de/entity/Q50355932022-02-22Paper
https://portal.mardi4nfdi.de/entity/Q50355942022-02-22Paper
Cryptanalysis of a multi-party quantum key agreement protocol with single particles2020-06-16Paper
A new protocol for quantum private query against joint-measurement attack2019-09-03Paper
Quantum-resistant identity-based signature with message recovery and proxy delegation2019-07-10Paper
A novel pairing-free certificateless authenticated key agreement protocol with provable security2019-05-28Paper
Cryptanalysis and improvement of a certificateless encryption scheme in the standard model2019-05-28Paper
Practical covert quantum key distribution with decoy-state method2019-03-15Paper
The critical detection efficiency for closing the detection loophole of some modified Bell inequalities2019-03-15Paper
Certificateless public key encryption scheme with hybrid problems and its application to Internet of things2019-02-08Paper
Attribute-based fuzzy identity access control in multicloud computing environments2018-10-23Paper
Perfect quantum multiple-unicast network coding protocol2018-08-07Paper
A unified view of consistent functions2018-02-27Paper
Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing2018-02-27Paper
Local indistinguishability of multipartite orthogonal product bases2018-02-27Paper
Cryptanalysis and improvement of a certificateless aggregate signature scheme2017-05-16Paper
Rough approximations based on bisimulations2017-01-19Paper
https://portal.mardi4nfdi.de/entity/Q29513652017-01-06Paper
Public Key Encryption with Authorized Keyword Search2016-09-02Paper
Certificateless proxy multi-signature2016-07-11Paper
On bounding entangling rates and mixing rates in some special cases2016-06-09Paper
Construction of a class of quantum Boolean functions based on the Hadamard matrix2016-05-04Paper
Determination of locally perfect discrimination for two-qubit unitary operations2016-04-04Paper
Local distinguishability of maximally entangled states in canonical form2015-11-11Paper
Perfect discrimination of projective measurements with the rank of all projectors being one2015-08-11Paper
A lattice-based signcryption scheme without random oracles2015-08-05Paper
A Unified Definition of Consistent Functions2015-06-26Paper
General bounds for quantum discord and discord distance2015-06-05Paper
Bound on local unambiguous discrimination between multipartite quantum states2015-04-13Paper
Privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks2015-03-16Paper
Novel multiparty quantum key agreement protocol with GHZ states2015-01-09Paper
Eavesdropping on multiparty quantum secret sharing scheme based on the phase shift operations2014-12-11Paper
Semi-loss-tolerant strong quantum coin-flipping protocol using quantum non-demolition measurement2014-12-05Paper
Efficient secure multiparty computation protocol for sequencing problem over insecure channel2014-10-13Paper
Quantum key agreement with EPR pairs and single-particle measurements2014-06-13Paper
One-way LOCC indistinguishability of maximally entangled states2014-06-13Paper
The general theory of three-party quantum secret sharing protocols over phase-damping channels2014-04-08Paper
Cheat sensitive quantum bit commitment via pre- and post-selected quantum states2014-04-08Paper
Quantum private comparison protocol based on entanglement swapping of \(d\)-level Bell states2014-02-25Paper
GLS: New class of generalized Legendre sequences with optimal arithmetic cross-correlation2014-02-24Paper
Quantum private comparison protocol with the random rotation2013-11-22Paper
A novel remote user authentication and key agreement scheme for mobile client-server environment2013-08-08Paper
Discrete-time interacting quantum walks and quantum hash schemes2013-07-05Paper
Analysis of the two-particle controlled interacting quantum walks2013-07-05Paper
Multiparty quantum key agreement with single particles2013-07-05Paper
Operations on soft sets revisited2013-06-14Paper
Three-Tangle for High-Rank Mixed States2013-06-04Paper
A watermark strategy for quantum images based on quantum Fourier transform2013-05-31Paper
A quantum watermark protocol2013-04-08Paper
Improved secure multiparty computation with a dishonest majority via quantum means2013-04-08Paper
Participant attack and improvement to multiparty quantum secret sharing based on GHZ states2013-04-08Paper
Splitting a quantum secret without the assistance of entanglements2013-03-04Paper
CRYPTANALYSIS OF THE QSDC PROTOCOL WITHOUT USING PERFECT QUANTUM CHANNEL2013-02-11Paper
https://portal.mardi4nfdi.de/entity/Q49013312013-01-24Paper
Dynamic quantum secret sharing2013-01-22Paper
Comment on “Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair”2013-01-19Paper
Remote preparation of a six-particle entangled cluster-type state2013-01-10Paper
Deterministic secure quantum communication with collective detection using single photons2013-01-10Paper
Information-theoretic measures associated with rough set approximations2012-10-25Paper
https://portal.mardi4nfdi.de/entity/Q31660342012-10-21Paper
Entropy and co-entropy of a covering approximation space2012-09-11Paper
On the joint 2-adic complexity of binary multisequences2012-08-27Paper
A note on communicating between information systems based on including degrees2012-08-20Paper
On the construction of multi-output Boolean functions with optimal algebraic immunity2012-08-17Paper
Eavesdropping and improvement to multiparty quantum secret sharing with collective eavesdropping-check2012-07-17Paper
Quantum private comparison using genuine four-particle entangled states2012-07-17Paper
Affine braid groups: a better platform than braid groups for cryptology?2012-06-20Paper
https://portal.mardi4nfdi.de/entity/Q31041962011-12-19Paper
https://portal.mardi4nfdi.de/entity/Q31042002011-12-19Paper
Cryptanalysis and improvement of multiparty quantum secret sharing schemes2011-11-30Paper
Comment on: ``Efficient high-capacity quantum secret sharing with two-photon entanglement [Phys. Lett. A 372 (2008) 1957]2011-11-30Paper
Comment on: ``Three-party quantum secure direct communication based on GHZ states2011-09-06Paper
Fault-tolerant quantum secret sharing against collective noise2011-07-25Paper
MULTIPARTY CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION WITH PHASE ENCRYPTION2011-07-13Paper
Robust Quantum Secure Direct Communication over Collective Rotating Channel2011-06-30Paper
An Economical Scheme for Cloning an Unknown M -Qudit Equatorial-Like State with Assistance2011-06-30Paper
Homomorphisms between fuzzy information systems revisited2011-06-28Paper
Revisiting the security of secure direct communication based on ping-pong protocol2011-06-16Paper
Robust Multiparty Quantum Secret Sharing against Participant Forcible Manipulation2011-05-20Paper
PERFECT TELEPORTATION, SUPERDENSE CODING VIA A KIND OF W-CLASS STATE2011-05-18Paper
Verifiable quantum \((k,n)\)-threshold secret key sharing2011-04-05Paper
Improving the security of controlled quantum secure direct communication by using four particle cluster states against an attack with fake entangled particles2011-03-17Paper
QUANTUM KEY DISTRIBUTION BY CONSTRUCTING NONORTHOGONAL STATES WITH BELL STATES2011-02-03Paper
One-time pads cannot be used to improve the efficiency of quantum communication2011-01-20Paper
A TWO-STEP CHANNEL-ENCRYPTING QUANTUM KEY DISTRIBUTION PROTOCOL2011-01-20Paper
https://portal.mardi4nfdi.de/entity/Q30615642011-01-03Paper
An efficient protocol for the secure multi-party quantum summation2010-12-21Paper
https://portal.mardi4nfdi.de/entity/Q30521652010-11-05Paper
Threshold quantum cryptograph based on Grover's algorithm2010-10-28Paper
Quantum key distribution without alternative measurements and rotations2010-09-27Paper
Some improved results on communication between information systems2010-09-08Paper
An improved semantically-secure identity-based signcryption scheme in the standard model2010-05-27Paper
A New Solution to Detectable Byzantine Agreement Problem2010-04-13Paper
On the information-splitting essence of two types of quantum key distribution protocols2010-03-01Paper
Secure quantum private comparison2010-02-12Paper
REEXAMINING THE SECURITY OF THE RECONSTRUCTION PHASE OF THE HILLERY-BUZĚK-BERTHIAUME QUANTUM SECRET-SHARING PROTOCOL2010-01-28Paper
Threshold Multiparty Controlled Teleportation of Arbitrary m -Qubit Quantum Information2010-01-26Paper
THRESHOLD MULTIPARTY QUANTUM-INFORMATION SPLITTING VIA QUANTUM CHANNEL ENCRYPTION2009-10-28Paper
https://portal.mardi4nfdi.de/entity/Q31816562009-10-12Paper
https://portal.mardi4nfdi.de/entity/Q53216622009-07-22Paper
An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement2009-02-16Paper
New Constructions of Large Binary Sequences Family with Low Correlation2009-01-15Paper
https://portal.mardi4nfdi.de/entity/Q35386572008-11-24Paper
CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION WITH W STATE2008-11-17Paper
CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION WITH QUANTUM ENCRYPTION2008-11-03Paper
Improving the security of multiparty quantum secret sharing against an attack with a fake signal2008-10-29Paper
Threshold quantum secret sharing between multi-party and multi-party2008-10-16Paper
Threshold proxy quantum signature scheme with threshold shared verification2008-09-23Paper
https://portal.mardi4nfdi.de/entity/Q35226282008-09-03Paper
QUANTUM CIRCUITS FOR PROBABILISTIC ENTANGLEMENT TELEPORTATION VIA A PARTIALLY ENTANGLED PAIR2008-05-20Paper
Multiparty simultaneous quantum identity authentication with secret sharing2008-05-07Paper
https://portal.mardi4nfdi.de/entity/Q54328732007-12-18Paper
An efficient quantum secret sharing protocol with orthogonal product states2007-08-20Paper
Improved authenticated multi-key agreement protocol2007-06-01Paper
An identity-based strong designated verifier proxy signature scheme2007-06-01Paper
Applied Cryptography and Network Security2007-05-02Paper
QUANTUM KEY DISTRIBUTION BASED ON ENTANGLEMENT SWAPPING BETWEEN TWO BELL STATES2007-03-21Paper
ON THE AUTOMORPHISM GROUPS OF A FAMILY OF BINARY QUANTUM ERROR-CORRECTING CODES2007-03-14Paper
Construction of nonbinary quantum cyclic codes by using graph method2007-02-20Paper
Information Security and Cryptology2006-11-14Paper
Cryptology and Network Security2006-11-14Paper
Resilient Functions with Good Cryptographic Properties2005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q56983422005-10-27Paper

Research outcomes over time

This page was built for person: Qiao-Yan Wen