Semiquantum key distribution without invoking the classical party's measurement capability
From MaRDI portal
Publication:496891
DOI10.1007/s11128-015-1015-zzbMath1327.81182DBLPjournals/qip/ZouQZM15OpenAlexW248796252WikidataQ59196621 ScholiaQ59196621MaRDI QIDQ496891
Xiangfu Zou, Shengyu Zhang, Paulo Mateus, Dao Wen Qiu
Publication date: 23 September 2015
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-015-1015-z
quantum key distributionsemiquantum key distributioncomplete robustnessjoint attackmeasurement capability
Related Items (41)
Security of a semi-quantum protocol where reflections contribute to the secret key ⋮ Semi-quantum dialogue based on single photons ⋮ Semiquantum secure direct communication using EPR pairs ⋮ Measurement-device-independent semiquantum key distribution ⋮ Semi-quantum cryptography ⋮ Semi-quantum private comparison based on Bell states ⋮ Mediated Semi‐Quantum Key Distribution Without Invoking Quantum Measurement ⋮ Advanced semi-quantum secure direct communication protocol based on Bell states against flip attack ⋮ Efficient and secure semi-quantum secure direct communication protocol against double CNOT attack ⋮ Multi‐Party Semi‐Quantum Key Distribution Protocol With Four‐Particle Cluster States ⋮ Three Attacks on the Mediated Semi‐Quantum Key Distribution without Invoking Quantum Measurement ⋮ Cryptanalysis and improvement of semi-quantum dialogue with Bell entangled states ⋮ Collective Attack and Improvement on “Mediated Semi‐Quantum Key Distribution Using Single Photons” ⋮ Efficient semi-quantum private comparison without using entanglement resource and pre-shared key ⋮ Two semi-quantum key distribution protocols with G-like states ⋮ Semi-quantum key distribution using qudit systems and security proof ⋮ Qutrit-based semi-quantum key distribution protocol ⋮ Semi-quantum private query protocol without invoking the measurement capability of classical user ⋮ Quantum secret sharing with identity authentication based on Bell states ⋮ Cryptanalysis and improvement of the semi-quantum secret sharing protocol ⋮ Semi-quantum key distribution with single photons in both polarization and spatial-mode degrees of freedom ⋮ Single-state semi-quantum key distribution protocol and its security proof ⋮ Quantum Cryptography: Key Distribution and Beyond ⋮ Multiparty semiquantum key agreement without entanglement ⋮ Semi-quantum key distribution protocols with GHZ states ⋮ Measure-resend semi-quantum private comparison without entanglement ⋮ Security of a single-state semi-quantum key distribution protocol ⋮ Authenticated semiquantum dialogue with secure delegated quantum computation over a collective noise channel ⋮ Multiparty semi-quantum secret sharing with \(d\)-level single-particle states ⋮ Three-party semi-quantum key agreement protocol ⋮ Circular Semi-Quantum Secret Sharing Using Single Particles ⋮ Cryptanalysis and improvement of the semi-quantum key distribution robust against combined collective noise ⋮ Efficient mediated semi-quantum key distribution ⋮ Semi-quantum identification ⋮ A mediated semi-quantum protocol for millionaire problem based on high-dimensional Bell states ⋮ Single-state multi-party semiquantum key agreement protocol based on multi-particle GHZ entangled states ⋮ Efficient semi-quantum private comparison using single photons ⋮ Efficient semiquantum key distribution based on single photons in both polarization and spatial-mode degrees of freedom ⋮ Efficient semiquantum key distribution without entanglement ⋮ High-capacity quantum key distribution based on hyperentangled Bell states and hyper-encoding ⋮ Semi-quantum key distribution protocol with logical qubits over the collective-rotation noise channel
Cites Work
- Quantum cryptography: public key distribution and coin tossing
- Restricted attacks on semi-quantum key distribution protocols
- Authenticated semi-quantum key distribution protocol using Bell states
- Trojan-horse attacks on quantum key distribution with classical bob
- Semiquantum key distribution
- Quantum Key Distribution with Classical Bob
- RELATION BETWEEN INFORMATION AND DISTURBANCE IN QUANTUM KEY DISTRIBUTION PROTOCOL WITH CLASSICAL ALICE
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography without Bell’s theorem
- Generalized privacy amplification
- SEMIQUANTUM SECRET SHARING USING TWO-PARTICLE ENTANGLED STATE
- Quantum secret sharing with classical Bobs
- QUANTUM KEY DISTRIBUTION WITH CLASSICAL ALICE
- Quantum cryptography
This page was built for publication: Semiquantum key distribution without invoking the classical party's measurement capability