Tzonelih Hwang

From MaRDI portal
(Redirected from Person:175949)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Collective Attack and Improvement on “Mediated Semi‐Quantum Key Distribution Using Single Photons”
Annalen der Physik
2023-11-14Paper
Mediated Semi‐Quantum Key Distribution Using Single Photons
Annalen der Physik
2023-11-06Paper
Mediated Semi‐Quantum Key Distribution Without Invoking Quantum Measurement
Annalen der Physik
2023-10-25Paper
Three-party authenticated lightweight quantum key distribution without pre-shared key between participants
Quantum Information Processing
2023-09-18Paper
Measure-resend authenticated semi-quantum key distribution with single photons
Quantum Information Processing
2023-01-18Paper
Efficient semi-quantum private comparison using single photons
Quantum Information Processing
2022-12-08Paper
Collusion attack and counterattack on the quantum key agreement via non-maximally entangled cluster states
International Journal of Theoretical Physics
2021-11-05Paper
On the controlled cyclic quantum teleportation of an arbitrary two-qubit entangled state by using a ten-qubit entangled state
International Journal of Theoretical Physics
2020-02-28Paper
Improvement on: ``Cryptanalysis and improvement of a multiparty quantum direct secret sharing of classical messages with Bell states and Bell measurements
International Journal of Theoretical Physics
2019-09-03Paper
Improving the security of `High-capacity quantum summation with single photons in both polarization and spatial-mode degrees of freedom'
International Journal of Theoretical Physics
2019-09-03Paper
Double CNOT attack on ``Quantum key distribution with limited classical Bob
International Journal of Quantum Information
2019-05-03Paper
Semi-quantum key distribution robust against combined collective noise
International Journal of Theoretical Physics
2019-05-03Paper
Secure quantum communication scheme for six-qubit decoherence-free states
International Journal of Theoretical Physics
2019-05-03Paper
Statistics attack on ``quantum private comparison with a malicious third party and its improvement
Quantum Information Processing
2018-11-07Paper
Six-qubit decoherence-free state measurement method and its application to development of authenticated quantum secure direct communication protocol
International Journal of Theoretical Physics
2018-11-06Paper
Double C-NOT attack and counterattack on 'three-step semi-quantum secure direct communication protocol'
Quantum Information Processing
2018-11-05Paper
Multiparty quantum private comparison with almost dishonest third parties for strangers
Quantum Information Processing
2018-02-27Paper
Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing
Quantum Information Processing
2018-02-26Paper
Improvement of ``Novel multiparty quantum key agreement protocol with GHZ states
International Journal of Theoretical Physics
2018-02-05Paper
Authenticated semi-quantum key distribution protocol using Bell states
Quantum Information Processing
2017-11-21Paper
Comment on A practical protocol for three-party authenticated quantum key distribution
Quantum Information Processing
2017-11-09Paper
Controlled quantum dialogue using cluster states
Quantum Information Processing
2017-11-09Paper
On ``A new quantum blind signature with unlinkability
Quantum Information Processing
2017-10-24Paper
Fault-tolerant controlled deterministic secure quantum communication using EPR states against collective noise
Quantum Information Processing
2017-03-06Paper
Trojan horse attack free fault-tolerant quantum key distribution protocols using GHZ states
International Journal of Theoretical Physics
2016-11-08Paper
Authenticated semi-quantum key distributions without classical channel
Quantum Information Processing
2016-10-27Paper
Quantum dialogue protocols over collective noise using entanglement of GHZ state
Quantum Information Processing
2016-10-27Paper
Controlled quantum dialogue robust against conspiring users
Quantum Information Processing
2016-10-27Paper
Provably secure extended chaotic map-based three-party key agreement protocols using password authentication
Nonlinear Dynamics
2016-10-19Paper
Multi-party quantum private comparison protocol with an almost-dishonest third party using GHZ states
International Journal of Theoretical Physics
2016-07-05Paper
Comments on two group signatures
Information Processing Letters
2016-06-16Paper
An efficient quantum private comparison of equality over collective-noise channels
International Journal of Theoretical Physics
2016-06-09Paper
Arbitrated unconditionally secure authentication scheme with multi-senders
Information Processing Letters
2016-06-09Paper
Quantum entanglement establishment between two strangers
Quantum Information Processing
2016-04-04Paper
Authenticated semi-quantum direct communication protocols using Bell states
Quantum Information Processing
2016-04-01Paper
Multi-controller quantum teleportation with remote rotation and its applications
Quantum Information Processing
2016-04-01Paper
Probabilistic authenticated quantum dialogue
Quantum Information Processing
2016-04-01Paper
Multi-party quantum private comparison with an almost-dishonest third party
Quantum Information Processing
2015-12-09Paper
\((t,m)\) Threshold and generalized ID-based conference key distribution system
Cryptologia
2015-11-13Paper
\((t,n)\) Threshold-multisignature scheme and generalized-multisignature scheme where suspected forgery implies traceability of adversarial shareholders
Cryptologia
2015-11-13Paper
Intercept-and-resend attack on controlled bidirectional quantum direct communication and its improvement
Quantum Information Processing
2015-10-19Paper
Authenticated quantum dialogue based on Bell states
International Journal of Theoretical Physics
2015-07-08Paper
Controlled probabilistic quantum key distribution using a ground state
Quantum Information Processing
2015-04-13Paper
Efficient quantum dialogue using single photons
Quantum Information Processing
2015-01-23Paper
Forgery attack on one-time proxy signature and the improvement
Quantum Information Processing
2014-12-12Paper
Multiparty controlled quantum secure direct communication based on quantum search algorithm
Quantum Information Processing
2014-12-05Paper
Controlled remote state preparation protocols via AKLT states
Quantum Information Processing
2014-12-05Paper
Trojan horse attack free fault-tolerant quantum key distribution protocols
Quantum Information Processing
2014-06-13Paper
Efficient key construction on semi-quantum secret sharing protocols
International Journal of Quantum Information
2014-04-29Paper
Attacks and improvement on ``Quantum direct communication with mutual authentication
International Journal of Theoretical Physics
2014-04-08Paper
Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels
Quantum Information Processing
2014-04-08Paper
Measure-and-resend attack and improvement on ``A scheme to share information via employing discrete algorithm to quantum states
International Journal of Theoretical Physics
2014-04-08Paper
Comment on the ``Quantum private comparison protocol based on Bell entangled states
International Journal of Theoretical Physics
2014-04-08Paper
Multiparty quantum remote control
Quantum Information Processing
2014-02-25Paper
Comment on ``Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise
Quantum Information Processing
2014-02-25Paper
Fault tolerant authenticated quantum direct communication immune to collective noises
Quantum Information Processing
2014-02-25Paper
Man-in-the-middle attack on ``Quantum dialogue with authentication based on Bell states
International Journal of Theoretical Physics
2013-11-22Paper
Provably secure three-party password-based authenticated key exchange protocol using Weil pairing
IEE Proceedings. Communications
2013-10-18Paper
Fault tolerant deterministic quantum communications using GHZ states over collective-noise channels
Quantum Information Processing
2013-09-20Paper
Quantum dialogue protocols immune to collective noise
Quantum Information Processing
2013-07-05Paper
Enhanced multiparty controlled QSDC using GHZ state
Communications in Theoretical Physics
2013-06-07Paper
Multi-user private comparison protocol using GHZ class states
Quantum Information Processing
2013-05-31Paper
Entanglement swapping of a GHZ state via a GHZ-like state
Physica Scripta
2013-05-22Paper
Enhancement on ``Quantum blind signature based on two-state vector formalism
Quantum Information Processing
2013-02-28Paper
Dynamic quantum secret sharing
Quantum Information Processing
2013-02-28Paper
Improved QSDC protocol over a collective-dephasing noise channel
International Journal of Theoretical Physics
2013-02-04Paper
Quantum secret sharing based on quantum search algorithm
International Journal of Theoretical Physics
2013-01-11Paper
Quantum secret sharing using symmetric \(W\) state
International Journal of Theoretical Physics
2013-01-10Paper
One-way quantum authenticated secure communication using rotation operation
Communications in Theoretical Physics
2012-09-26Paper
Enhancement of Gao's multiparty quantum secret sharing
Communications in Theoretical Physics
2012-09-26Paper
Controlled deterministic secure quantum communication based on quantum search algorithm
International Journal of Theoretical Physics
2012-08-24Paper
Thwarting intercept-and-resend attack on Zhang's quantum secret sharing using collective rotation noises
Quantum Information Processing
2012-06-20Paper
New quantum private comparison protocol using EPR pairs
Quantum Information Processing
2012-05-31Paper
Revisiting Deng et al.'s multiparty quantum secret sharing protocol
International Journal of Theoretical Physics
2012-03-09Paper
Comment on ``Quantum key distribution and quantum authentication based on entangled state
International Journal of Theoretical Physics
2012-03-09Paper
Probabilistic quantum key distribution2011-12-19Paper
Improvement on ``quantum key agreement protocol with maximally entangled states
International Journal of Theoretical Physics
2011-11-04Paper
Multiparty quantum secret sharing based on GHZ states
Physica Scripta
2011-08-03Paper
Quantum secret sharing using GHZ-like state
Communications in Theoretical Physics
2011-06-30Paper
Teleportation of a pure EPR state via GHZ-like state
International Journal of Theoretical Physics
2010-10-08Paper
Two-way quantum-bit-string commitment
International Journal of Modern Physics B
2010-06-30Paper
Simple password-based three-party authenticated key exchange without server public keys
Information Sciences
2010-06-11Paper
The enhancement of Zhou et al.'s quantum secret sharing protocol
International Journal of Modern Physics C
2010-01-25Paper
Subliminal channels in the identity-based threshold ring signature
International Journal of Computer Mathematics
2009-05-29Paper
SECURE DIRECT COMMUNICATION USING DETERMINISTIC BB84 PROTOCOL
International Journal of Modern Physics C
2008-10-17Paper
Efficient one-out-of-two quantum oblivious transfer based on four-coherent-state postselection protocol
Physica Scripta
2008-10-08Paper
All-in-one group-oriented cryptosystem based on bilinear pairing
Information Sciences
2008-01-03Paper
scientific article; zbMATH DE number 5177767 (Why is no real title available?)2007-08-07Paper
scientific article; zbMATH DE number 5177768 (Why is no real title available?)2007-08-07Paper
SECURITY OF "ASYMMETRICAL QUANTUM KEY DISTRIBUTION PROTOCOL"
International Journal of Modern Physics C
2007-07-04Paper
Proxy-protected signature secure against the undelegated proxy signature attack
Computers and Electrical Engineering
2007-06-08Paper
On the unlinkability of randomization-enhanced Chaum's blind signature scheme
Applied Mathematics and Computation
2005-06-13Paper
On the traceability on RSA-based partially signature with low computation
Applied Mathematics and Computation
2005-02-22Paper
Improved authenticated multiple-key agreement protocol
Computers & Mathematics with Applications
2004-08-06Paper
scientific article; zbMATH DE number 2063048 (Why is no real title available?)2004-03-29Paper
scientific article; zbMATH DE number 2061978 (Why is no real title available?)2004-03-25Paper
The security of two ID-based multisignature protocols for sequential and broadcasting architectures
Information Processing Letters
2002-08-04Paper
scientific article; zbMATH DE number 1676658 (Why is no real title available?)2001-11-25Paper
\((t,m)\) threshold and generalized ID-based conference key distribution system
Applied Mathematics and Computation
2001-04-25Paper
scientific article; zbMATH DE number 1420967 (Why is no real title available?)2000-08-24Paper
scientific article; zbMATH DE number 1189400 (Why is no real title available?)2000-03-07Paper
scientific article; zbMATH DE number 1304300 (Why is no real title available?)2000-02-15Paper
Remarks on Chang-Buehrer access control scheme in a hierarchy
Computers & Mathematics with Applications
1999-04-12Paper
ON THE SECURITY OF PARK ET AL.'S KEY DISTRIBUTION PROTOCOL FOR DIGITAL MOBILE COMMUNICATIONS
Cryptologia
1998-11-18Paper
scientific article; zbMATH DE number 1088914 (Why is no real title available?)1997-11-18Paper
scientific article; zbMATH DE number 1024074 (Why is no real title available?)1997-09-17Paper
On the security of SPLICE/AS -- The authentication system in WIDE Internet
Information Processing Letters
1997-02-28Paper
Two attacks on Neuman-Stubblebine authentication protocols
Information Processing Letters
1997-02-28Paper
CONSPIRACY ATTACKS ON THE THRESHOLD RSA SIGNATURE SCHEME
Cryptologia
1996-02-20Paper
Key generation of algebraic-code cryptosystems
Computers & Mathematics with Applications
1994-07-24Paper
Scheme for secure digital mobile communications based on symmetric key cryptography
Information Processing Letters
1994-05-29Paper
scientific article; zbMATH DE number 177047 (Why is no real title available?)1993-05-18Paper
scientific article; zbMATH DE number 151930 (Why is no real title available?)1993-05-03Paper
Attacks on Okamoto and Tanaka's one-way ID-based key distribution system
Information Processing Letters
1993-01-17Paper
Protocols for group oriented secret sharing
Information Processing Letters
1993-01-16Paper
Efficient ID-based key distribution with tamperfree devices
Information Processing Letters
1993-01-04Paper
On double-one matrices and double-zero matrices
Linear and Multilinear Algebra
1992-09-27Paper


Research outcomes over time


This page was built for person: Tzonelih Hwang