Publication | Date of Publication | Type |
---|
Collective Attack and Improvement on “Mediated Semi‐Quantum Key Distribution Using Single Photons” | 2023-11-14 | Paper |
Mediated Semi‐Quantum Key Distribution Using Single Photons | 2023-11-06 | Paper |
Mediated Semi‐Quantum Key Distribution Without Invoking Quantum Measurement | 2023-10-25 | Paper |
Three-party authenticated lightweight quantum key distribution without pre-shared key between participants | 2023-09-18 | Paper |
Measure-resend authenticated semi-quantum key distribution with single photons | 2023-01-18 | Paper |
Efficient semi-quantum private comparison using single photons | 2022-12-08 | Paper |
Collusion attack and counterattack on the quantum key agreement via non-maximally entangled cluster states | 2021-11-05 | Paper |
On the controlled cyclic quantum teleportation of an arbitrary two-qubit entangled state by using a ten-qubit entangled state | 2020-02-28 | Paper |
Improving the security of `High-capacity quantum summation with single photons in both polarization and spatial-mode degrees of freedom' | 2019-09-03 | Paper |
Improvement on: ``Cryptanalysis and improvement of a multiparty quantum direct secret sharing of classical messages with Bell states and Bell measurements | 2019-09-03 | Paper |
Double CNOT attack on “Quantum key distribution with limited classical Bob” | 2019-05-03 | Paper |
Semi-quantum key distribution robust against combined collective noise | 2019-05-03 | Paper |
Secure quantum communication scheme for six-qubit decoherence-free states | 2019-05-03 | Paper |
Statistics attack on ``quantum private comparison with a malicious third party and its improvement | 2018-11-07 | Paper |
Six-qubit decoherence-free state measurement method and its application to development of authenticated quantum secure direct communication protocol | 2018-11-06 | Paper |
Double C-NOT attack and counterattack on 'three-step semi-quantum secure direct communication protocol' | 2018-11-05 | Paper |
Multiparty quantum private comparison with almost dishonest third parties for strangers | 2018-02-27 | Paper |
Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing | 2018-02-26 | Paper |
Improvement of ``Novel multiparty quantum key agreement protocol with GHZ states | 2018-02-05 | Paper |
Authenticated semi-quantum key distribution protocol using Bell states | 2017-11-21 | Paper |
Comment on A practical protocol for three-party authenticated quantum key distribution | 2017-11-09 | Paper |
Controlled quantum dialogue using cluster states | 2017-11-09 | Paper |
On ``A new quantum blind signature with unlinkability | 2017-10-24 | Paper |
Fault-tolerant controlled deterministic secure quantum communication using EPR states against collective noise | 2017-03-06 | Paper |
Trojan horse attack free fault-tolerant quantum key distribution protocols using GHZ states | 2016-11-08 | Paper |
Authenticated semi-quantum key distributions without classical channel | 2016-10-27 | Paper |
Quantum dialogue protocols over collective noise using entanglement of GHZ state | 2016-10-27 | Paper |
Controlled quantum dialogue robust against conspiring users | 2016-10-27 | Paper |
Provably secure extended chaotic map-based three-party key agreement protocols using password authentication | 2016-10-19 | Paper |
Multi-party quantum private comparison protocol with an almost-dishonest third party using GHZ states | 2016-07-05 | Paper |
Comments on two group signatures | 2016-06-16 | Paper |
An efficient quantum private comparison of equality over collective-noise channels | 2016-06-09 | Paper |
Arbitrated unconditionally secure authentication scheme with multi-senders | 2016-06-09 | Paper |
Quantum entanglement establishment between two strangers | 2016-04-04 | Paper |
Authenticated semi-quantum direct communication protocols using Bell states | 2016-04-01 | Paper |
Multi-controller quantum teleportation with remote rotation and its applications | 2016-04-01 | Paper |
Probabilistic authenticated quantum dialogue | 2016-04-01 | Paper |
Multi-party quantum private comparison with an almost-dishonest third party | 2015-12-09 | Paper |
(t,m) THRESHOLD AND GENERALIZED ID-BASED CONFERENCE KEY DISTRIBUTION SYSTEM | 2015-11-13 | Paper |
(t,n) THRESHOLD-MULTISIGNATURE SCHEME AND GENERALIZED-MULTISIGNATURE SCHEME WHERE SUSPECTED FORGERY IMPLIES TRACEABILITY OF ADVERSARIAL SHAREHOLDERS | 2015-11-13 | Paper |
Intercept-and-resend attack on controlled bidirectional quantum direct communication and its improvement | 2015-10-19 | Paper |
Authenticated quantum dialogue based on Bell states | 2015-07-08 | Paper |
Controlled probabilistic quantum key distribution using a ground state | 2015-04-13 | Paper |
Efficient quantum dialogue using single photons | 2015-01-23 | Paper |
Forgery attack on one-time proxy signature and the improvement | 2014-12-12 | Paper |
Multiparty controlled quantum secure direct communication based on quantum search algorithm | 2014-12-05 | Paper |
Controlled remote state preparation protocols via AKLT states | 2014-12-05 | Paper |
Trojan horse attack free fault-tolerant quantum key distribution protocols | 2014-06-13 | Paper |
EFFICIENT KEY CONSTRUCTION ON SEMI-QUANTUM SECRET SHARING PROTOCOLS | 2014-04-29 | Paper |
Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels | 2014-04-08 | Paper |
Measure-and-resend attack and improvement on ``A scheme to share information via employing discrete algorithm to quantum states | 2014-04-08 | Paper |
Attacks and improvement on ``Quantum direct communication with mutual authentication | 2014-04-08 | Paper |
Comment on the ``Quantum private comparison protocol based on Bell entangled states | 2014-04-08 | Paper |
Comment on ``Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise | 2014-02-25 | Paper |
Fault tolerant authenticated quantum direct communication immune to collective noises | 2014-02-25 | Paper |
Multiparty quantum remote control | 2014-02-25 | Paper |
Man-in-the-middle attack on ``Quantum dialogue with authentication based on Bell states | 2013-11-22 | Paper |
Provably secure three-party password-based authenticated key exchange protocol using Weil pairing | 2013-10-18 | Paper |
Fault tolerant deterministic quantum communications using GHZ states over collective-noise channels | 2013-09-20 | Paper |
Quantum dialogue protocols immune to collective noise | 2013-07-05 | Paper |
Enhanced Multiparty Controlled QSDC Using GHZ State | 2013-06-07 | Paper |
Multi-user private comparison protocol using GHZ class states | 2013-05-31 | Paper |
Entanglement swapping of a GHZ state via a GHZ-like state | 2013-05-22 | Paper |
Dynamic quantum secret sharing | 2013-02-28 | Paper |
Enhancement on ``Quantum blind signature based on two-state vector formalism | 2013-02-28 | Paper |
Improved QSDC protocol over a collective-dephasing noise channel | 2013-02-04 | Paper |
Quantum secret sharing based on quantum search algorithm | 2013-01-11 | Paper |
Quantum secret sharing using symmetric \(W\) state | 2013-01-10 | Paper |
Enhancement of GAO's Multiparty Quantum Secret Sharing | 2012-09-26 | Paper |
One-Way Quantum Authenticated Secure Communication Using Rotation Operation | 2012-09-26 | Paper |
Controlled deterministic secure quantum communication based on quantum search algorithm | 2012-08-24 | Paper |
Thwarting intercept-and-resend attack on Zhang's quantum secret sharing using collective rotation noises | 2012-06-20 | Paper |
Revisiting Deng et al.'s multiparty quantum secret sharing protocol | 2012-03-09 | Paper |
Comment on ``Quantum key distribution and quantum authentication based on entangled state | 2012-03-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q3104214 | 2011-12-19 | Paper |
Improvement on ``quantum key agreement protocol with maximally entangled states | 2011-11-04 | Paper |
Multiparty quantum secret sharing based on GHZ states | 2011-08-03 | Paper |
Quantum Secret Sharing Using GHZ-Like State | 2011-06-30 | Paper |
Teleportation of a pure EPR state via GHZ-like state | 2010-10-08 | Paper |
TWO-WAY QUANTUM-BIT-STRING COMMITMENT | 2010-06-30 | Paper |
Simple password-based three-party authenticated key exchange without server public keys | 2010-06-11 | Paper |
THE ENHANCEMENT OF ZHOU et al.'s QUANTUM SECRET SHARING PROTOCOL | 2010-01-25 | Paper |
Subliminal channels in the identity-based threshold ring signature | 2009-05-29 | Paper |
SECURE DIRECT COMMUNICATION USING DETERMINISTIC BB84 PROTOCOL | 2008-10-17 | Paper |
Efficient one-out-of-two quantum oblivious transfer based on four-coherent-state postselection protocol | 2008-10-08 | Paper |
All-in-one group-oriented cryptosystem based on bilinear pairing | 2008-01-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q3594279 | 2007-08-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q3594280 | 2007-08-07 | Paper |
SECURITY OF "ASYMMETRICAL QUANTUM KEY DISTRIBUTION PROTOCOL" | 2007-07-04 | Paper |
Proxy-protected signature secure against the undelegated proxy signature attack | 2007-06-08 | Paper |
On the unlinkability of randomization-enhanced Chaum's blind signature scheme | 2005-06-13 | Paper |
On the traceability on RSA-based partially signature with low computation | 2005-02-22 | Paper |
Improved authenticated multiple-key agreement protocol | 2004-08-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q4460706 | 2004-03-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4457760 | 2004-03-25 | Paper |
The security of two ID-based multisignature protocols for sequential and broadcasting architectures | 2002-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q2757261 | 2001-11-25 | Paper |
\((t,m)\) threshold and generalized ID-based conference key distribution system | 2001-04-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q4945039 | 2000-08-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q3839203 | 2000-03-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4251027 | 2000-02-15 | Paper |
Remarks on Chang-Buehrer access control scheme in a hierarchy | 1999-04-12 | Paper |
ON THE SECURITY OF PARK ET AL.'S KEY DISTRIBUTION PROTOCOL FOR DIGITAL MOBILE COMMUNICATIONS | 1998-11-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4365739 | 1997-11-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341768 | 1997-09-17 | Paper |
On the security of SPLICE/AS -- The authentication system in WIDE Internet | 1997-02-28 | Paper |
Two attacks on Neuman-Stubblebine authentication protocols | 1997-02-28 | Paper |
CONSPIRACY ATTACKS ON THE THRESHOLD RSA SIGNATURE SCHEME | 1996-02-20 | Paper |
Key generation of algebraic-code cryptosystems | 1994-07-24 | Paper |
Scheme for secure digital mobile communications based on symmetric key cryptography | 1994-05-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4036891 | 1993-05-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4032032 | 1993-05-03 | Paper |
Attacks on Okamoto and Tanaka's one-way ID-based key distribution system | 1993-01-17 | Paper |
Protocols for group oriented secret sharing | 1993-01-16 | Paper |
Efficient ID-based key distribution with tamperfree devices | 1993-01-04 | Paper |
On double-one matrices and double-zero matrices | 1992-09-27 | Paper |