| Publication | Date of Publication | Type |
|---|
| Collective Attack and Improvement on “Mediated Semi‐Quantum Key Distribution Using Single Photons” | 2023-11-14 | Paper |
| Mediated Semi‐Quantum Key Distribution Using Single Photons | 2023-11-06 | Paper |
| Mediated Semi‐Quantum Key Distribution Without Invoking Quantum Measurement | 2023-10-25 | Paper |
| Three-party authenticated lightweight quantum key distribution without pre-shared key between participants | 2023-09-18 | Paper |
| Measure-resend authenticated semi-quantum key distribution with single photons | 2023-01-18 | Paper |
| Efficient semi-quantum private comparison using single photons | 2022-12-08 | Paper |
| Collusion attack and counterattack on the quantum key agreement via non-maximally entangled cluster states | 2021-11-05 | Paper |
| On the controlled cyclic quantum teleportation of an arbitrary two-qubit entangled state by using a ten-qubit entangled state | 2020-02-28 | Paper |
| Improvement on: ``Cryptanalysis and improvement of a multiparty quantum direct secret sharing of classical messages with Bell states and Bell measurements | 2019-09-03 | Paper |
| Improving the security of `High-capacity quantum summation with single photons in both polarization and spatial-mode degrees of freedom' | 2019-09-03 | Paper |
| Double CNOT attack on “Quantum key distribution with limited classical Bob” | 2019-05-03 | Paper |
| Semi-quantum key distribution robust against combined collective noise | 2019-05-03 | Paper |
| Secure quantum communication scheme for six-qubit decoherence-free states | 2019-05-03 | Paper |
| Statistics attack on ``quantum private comparison with a malicious third party and its improvement | 2018-11-07 | Paper |
| Six-qubit decoherence-free state measurement method and its application to development of authenticated quantum secure direct communication protocol | 2018-11-06 | Paper |
| Double C-NOT attack and counterattack on 'three-step semi-quantum secure direct communication protocol' | 2018-11-05 | Paper |
| Multiparty quantum private comparison with almost dishonest third parties for strangers | 2018-02-27 | Paper |
| Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing | 2018-02-26 | Paper |
| Improvement of ``Novel multiparty quantum key agreement protocol with GHZ states | 2018-02-05 | Paper |
| Authenticated semi-quantum key distribution protocol using Bell states | 2017-11-21 | Paper |
| Comment on A practical protocol for three-party authenticated quantum key distribution | 2017-11-09 | Paper |
| Controlled quantum dialogue using cluster states | 2017-11-09 | Paper |
| On ``A new quantum blind signature with unlinkability | 2017-10-24 | Paper |
| Fault-tolerant controlled deterministic secure quantum communication using EPR states against collective noise | 2017-03-06 | Paper |
| Trojan horse attack free fault-tolerant quantum key distribution protocols using GHZ states | 2016-11-08 | Paper |
| Authenticated semi-quantum key distributions without classical channel | 2016-10-27 | Paper |
| Quantum dialogue protocols over collective noise using entanglement of GHZ state | 2016-10-27 | Paper |
| Controlled quantum dialogue robust against conspiring users | 2016-10-27 | Paper |
| Provably secure extended chaotic map-based three-party key agreement protocols using password authentication | 2016-10-19 | Paper |
| Multi-party quantum private comparison protocol with an almost-dishonest third party using GHZ states | 2016-07-05 | Paper |
| Comments on two group signatures | 2016-06-16 | Paper |
| An efficient quantum private comparison of equality over collective-noise channels | 2016-06-09 | Paper |
| Arbitrated unconditionally secure authentication scheme with multi-senders | 2016-06-09 | Paper |
| Quantum entanglement establishment between two strangers | 2016-04-04 | Paper |
| Authenticated semi-quantum direct communication protocols using Bell states | 2016-04-01 | Paper |
| Multi-controller quantum teleportation with remote rotation and its applications | 2016-04-01 | Paper |
| Probabilistic authenticated quantum dialogue | 2016-04-01 | Paper |
| Multi-party quantum private comparison with an almost-dishonest third party | 2015-12-09 | Paper |
| (t,m) THRESHOLD AND GENERALIZED ID-BASED CONFERENCE KEY DISTRIBUTION SYSTEM | 2015-11-13 | Paper |
| (t,n) THRESHOLD-MULTISIGNATURE SCHEME AND GENERALIZED-MULTISIGNATURE SCHEME WHERE SUSPECTED FORGERY IMPLIES TRACEABILITY OF ADVERSARIAL SHAREHOLDERS | 2015-11-13 | Paper |
| Intercept-and-resend attack on controlled bidirectional quantum direct communication and its improvement | 2015-10-19 | Paper |
| Authenticated quantum dialogue based on Bell states | 2015-07-08 | Paper |
| Controlled probabilistic quantum key distribution using a ground state | 2015-04-13 | Paper |
| Efficient quantum dialogue using single photons | 2015-01-23 | Paper |
| Forgery attack on one-time proxy signature and the improvement | 2014-12-12 | Paper |
| Multiparty controlled quantum secure direct communication based on quantum search algorithm | 2014-12-05 | Paper |
| Controlled remote state preparation protocols via AKLT states | 2014-12-05 | Paper |
| Trojan horse attack free fault-tolerant quantum key distribution protocols | 2014-06-13 | Paper |
| EFFICIENT KEY CONSTRUCTION ON SEMI-QUANTUM SECRET SHARING PROTOCOLS | 2014-04-29 | Paper |
| Attacks and improvement on ``Quantum direct communication with mutual authentication | 2014-04-08 | Paper |
| Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels | 2014-04-08 | Paper |
| Measure-and-resend attack and improvement on ``A scheme to share information via employing discrete algorithm to quantum states | 2014-04-08 | Paper |
| Comment on the ``Quantum private comparison protocol based on Bell entangled states | 2014-04-08 | Paper |
| Multiparty quantum remote control | 2014-02-25 | Paper |
| Comment on ``Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise | 2014-02-25 | Paper |
| Fault tolerant authenticated quantum direct communication immune to collective noises | 2014-02-25 | Paper |
| Man-in-the-middle attack on ``Quantum dialogue with authentication based on Bell states | 2013-11-22 | Paper |
| Provably secure three-party password-based authenticated key exchange protocol using Weil pairing | 2013-10-18 | Paper |
| Fault tolerant deterministic quantum communications using GHZ states over collective-noise channels | 2013-09-20 | Paper |
| Quantum dialogue protocols immune to collective noise | 2013-07-05 | Paper |
| Enhanced Multiparty Controlled QSDC Using GHZ State | 2013-06-07 | Paper |
| Multi-user private comparison protocol using GHZ class states | 2013-05-31 | Paper |
| Entanglement swapping of a GHZ state via a GHZ-like state | 2013-05-22 | Paper |
| Enhancement on ``Quantum blind signature based on two-state vector formalism | 2013-02-28 | Paper |
| Dynamic quantum secret sharing | 2013-02-28 | Paper |
| Improved QSDC protocol over a collective-dephasing noise channel | 2013-02-04 | Paper |
| Quantum secret sharing based on quantum search algorithm | 2013-01-11 | Paper |
| Quantum secret sharing using symmetric \(W\) state | 2013-01-10 | Paper |
| One-way quantum authenticated secure communication using rotation operation | 2012-09-26 | Paper |
| Enhancement of Gao's multiparty quantum secret sharing | 2012-09-26 | Paper |
| Controlled deterministic secure quantum communication based on quantum search algorithm | 2012-08-24 | Paper |
| Thwarting intercept-and-resend attack on Zhang's quantum secret sharing using collective rotation noises | 2012-06-20 | Paper |
| New quantum private comparison protocol using EPR pairs | 2012-05-31 | Paper |
| Revisiting Deng et al.'s multiparty quantum secret sharing protocol | 2012-03-09 | Paper |
| Comment on ``Quantum key distribution and quantum authentication based on entangled state | 2012-03-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3104214 | 2011-12-19 | Paper |
| Improvement on ``quantum key agreement protocol with maximally entangled states | 2011-11-04 | Paper |
| Multiparty quantum secret sharing based on GHZ states | 2011-08-03 | Paper |
| Quantum Secret Sharing Using GHZ-Like State | 2011-06-30 | Paper |
| Teleportation of a pure EPR state via GHZ-like state | 2010-10-08 | Paper |
| TWO-WAY QUANTUM-BIT-STRING COMMITMENT | 2010-06-30 | Paper |
| Simple password-based three-party authenticated key exchange without server public keys | 2010-06-11 | Paper |
| THE ENHANCEMENT OF ZHOU et al.'s QUANTUM SECRET SHARING PROTOCOL | 2010-01-25 | Paper |
| Subliminal channels in the identity-based threshold ring signature | 2009-05-29 | Paper |
| SECURE DIRECT COMMUNICATION USING DETERMINISTIC BB84 PROTOCOL | 2008-10-17 | Paper |
| Efficient one-out-of-two quantum oblivious transfer based on four-coherent-state postselection protocol | 2008-10-08 | Paper |
| All-in-one group-oriented cryptosystem based on bilinear pairing | 2008-01-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3594279 | 2007-08-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3594280 | 2007-08-07 | Paper |
| SECURITY OF "ASYMMETRICAL QUANTUM KEY DISTRIBUTION PROTOCOL" | 2007-07-04 | Paper |
| Proxy-protected signature secure against the undelegated proxy signature attack | 2007-06-08 | Paper |
| On the unlinkability of randomization-enhanced Chaum's blind signature scheme | 2005-06-13 | Paper |
| On the traceability on RSA-based partially signature with low computation | 2005-02-22 | Paper |
| Improved authenticated multiple-key agreement protocol | 2004-08-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4460706 | 2004-03-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4457760 | 2004-03-25 | Paper |
| The security of two ID-based multisignature protocols for sequential and broadcasting architectures | 2002-08-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2757261 | 2001-11-25 | Paper |
| \((t,m)\) threshold and generalized ID-based conference key distribution system | 2001-04-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4945039 | 2000-08-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3839203 | 2000-03-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4251027 | 2000-02-15 | Paper |
| Remarks on Chang-Buehrer access control scheme in a hierarchy | 1999-04-12 | Paper |
| ON THE SECURITY OF PARK ET AL.'S KEY DISTRIBUTION PROTOCOL FOR DIGITAL MOBILE COMMUNICATIONS | 1998-11-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4365739 | 1997-11-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4341768 | 1997-09-17 | Paper |
| On the security of SPLICE/AS -- The authentication system in WIDE Internet | 1997-02-28 | Paper |
| Two attacks on Neuman-Stubblebine authentication protocols | 1997-02-28 | Paper |
| CONSPIRACY ATTACKS ON THE THRESHOLD RSA SIGNATURE SCHEME | 1996-02-20 | Paper |
| Key generation of algebraic-code cryptosystems | 1994-07-24 | Paper |
| Scheme for secure digital mobile communications based on symmetric key cryptography | 1994-05-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4036891 | 1993-05-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4032032 | 1993-05-03 | Paper |
| Attacks on Okamoto and Tanaka's one-way ID-based key distribution system | 1993-01-17 | Paper |
| Protocols for group oriented secret sharing | 1993-01-16 | Paper |
| Efficient ID-based key distribution with tamperfree devices | 1993-01-04 | Paper |
| On double-one matrices and double-zero matrices | 1992-09-27 | Paper |