Tzonelih Hwang

From MaRDI portal
Person:175949

Available identifiers

zbMath Open hwang.tzonelihMaRDI QIDQ175949

List of research outcomes

PublicationDate of PublicationType
Collective Attack and Improvement on “Mediated Semi‐Quantum Key Distribution Using Single Photons”2023-11-14Paper
Mediated Semi‐Quantum Key Distribution Using Single Photons2023-11-06Paper
Mediated Semi‐Quantum Key Distribution Without Invoking Quantum Measurement2023-10-25Paper
Three-party authenticated lightweight quantum key distribution without pre-shared key between participants2023-09-18Paper
Measure-resend authenticated semi-quantum key distribution with single photons2023-01-18Paper
Efficient semi-quantum private comparison using single photons2022-12-08Paper
Collusion attack and counterattack on the quantum key agreement via non-maximally entangled cluster states2021-11-05Paper
On the controlled cyclic quantum teleportation of an arbitrary two-qubit entangled state by using a ten-qubit entangled state2020-02-28Paper
Improving the security of `High-capacity quantum summation with single photons in both polarization and spatial-mode degrees of freedom'2019-09-03Paper
Improvement on: ``Cryptanalysis and improvement of a multiparty quantum direct secret sharing of classical messages with Bell states and Bell measurements2019-09-03Paper
Double CNOT attack on “Quantum key distribution with limited classical Bob”2019-05-03Paper
Semi-quantum key distribution robust against combined collective noise2019-05-03Paper
Secure quantum communication scheme for six-qubit decoherence-free states2019-05-03Paper
Statistics attack on ``quantum private comparison with a malicious third party and its improvement2018-11-07Paper
Six-qubit decoherence-free state measurement method and its application to development of authenticated quantum secure direct communication protocol2018-11-06Paper
Double C-NOT attack and counterattack on 'three-step semi-quantum secure direct communication protocol'2018-11-05Paper
Multiparty quantum private comparison with almost dishonest third parties for strangers2018-02-27Paper
Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing2018-02-26Paper
Improvement of ``Novel multiparty quantum key agreement protocol with GHZ states2018-02-05Paper
Authenticated semi-quantum key distribution protocol using Bell states2017-11-21Paper
Comment on A practical protocol for three-party authenticated quantum key distribution2017-11-09Paper
Controlled quantum dialogue using cluster states2017-11-09Paper
On ``A new quantum blind signature with unlinkability2017-10-24Paper
Fault-tolerant controlled deterministic secure quantum communication using EPR states against collective noise2017-03-06Paper
Trojan horse attack free fault-tolerant quantum key distribution protocols using GHZ states2016-11-08Paper
Authenticated semi-quantum key distributions without classical channel2016-10-27Paper
Quantum dialogue protocols over collective noise using entanglement of GHZ state2016-10-27Paper
Controlled quantum dialogue robust against conspiring users2016-10-27Paper
Provably secure extended chaotic map-based three-party key agreement protocols using password authentication2016-10-19Paper
Multi-party quantum private comparison protocol with an almost-dishonest third party using GHZ states2016-07-05Paper
Comments on two group signatures2016-06-16Paper
An efficient quantum private comparison of equality over collective-noise channels2016-06-09Paper
Arbitrated unconditionally secure authentication scheme with multi-senders2016-06-09Paper
Quantum entanglement establishment between two strangers2016-04-04Paper
Authenticated semi-quantum direct communication protocols using Bell states2016-04-01Paper
Multi-controller quantum teleportation with remote rotation and its applications2016-04-01Paper
Probabilistic authenticated quantum dialogue2016-04-01Paper
Multi-party quantum private comparison with an almost-dishonest third party2015-12-09Paper
(t,m) THRESHOLD AND GENERALIZED ID-BASED CONFERENCE KEY DISTRIBUTION SYSTEM2015-11-13Paper
(t,n) THRESHOLD-MULTISIGNATURE SCHEME AND GENERALIZED-MULTISIGNATURE SCHEME WHERE SUSPECTED FORGERY IMPLIES TRACEABILITY OF ADVERSARIAL SHAREHOLDERS2015-11-13Paper
Intercept-and-resend attack on controlled bidirectional quantum direct communication and its improvement2015-10-19Paper
Authenticated quantum dialogue based on Bell states2015-07-08Paper
Controlled probabilistic quantum key distribution using a ground state2015-04-13Paper
Efficient quantum dialogue using single photons2015-01-23Paper
Forgery attack on one-time proxy signature and the improvement2014-12-12Paper
Multiparty controlled quantum secure direct communication based on quantum search algorithm2014-12-05Paper
Controlled remote state preparation protocols via AKLT states2014-12-05Paper
Trojan horse attack free fault-tolerant quantum key distribution protocols2014-06-13Paper
EFFICIENT KEY CONSTRUCTION ON SEMI-QUANTUM SECRET SHARING PROTOCOLS2014-04-29Paper
Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels2014-04-08Paper
Measure-and-resend attack and improvement on ``A scheme to share information via employing discrete algorithm to quantum states2014-04-08Paper
Attacks and improvement on ``Quantum direct communication with mutual authentication2014-04-08Paper
Comment on the ``Quantum private comparison protocol based on Bell entangled states2014-04-08Paper
Comment on ``Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise2014-02-25Paper
Fault tolerant authenticated quantum direct communication immune to collective noises2014-02-25Paper
Multiparty quantum remote control2014-02-25Paper
Man-in-the-middle attack on ``Quantum dialogue with authentication based on Bell states2013-11-22Paper
Provably secure three-party password-based authenticated key exchange protocol using Weil pairing2013-10-18Paper
Fault tolerant deterministic quantum communications using GHZ states over collective-noise channels2013-09-20Paper
Quantum dialogue protocols immune to collective noise2013-07-05Paper
Enhanced Multiparty Controlled QSDC Using GHZ State2013-06-07Paper
Multi-user private comparison protocol using GHZ class states2013-05-31Paper
Entanglement swapping of a GHZ state via a GHZ-like state2013-05-22Paper
Dynamic quantum secret sharing2013-02-28Paper
Enhancement on ``Quantum blind signature based on two-state vector formalism2013-02-28Paper
Improved QSDC protocol over a collective-dephasing noise channel2013-02-04Paper
Quantum secret sharing based on quantum search algorithm2013-01-11Paper
Quantum secret sharing using symmetric \(W\) state2013-01-10Paper
Enhancement of GAO's Multiparty Quantum Secret Sharing2012-09-26Paper
One-Way Quantum Authenticated Secure Communication Using Rotation Operation2012-09-26Paper
Controlled deterministic secure quantum communication based on quantum search algorithm2012-08-24Paper
Thwarting intercept-and-resend attack on Zhang's quantum secret sharing using collective rotation noises2012-06-20Paper
Revisiting Deng et al.'s multiparty quantum secret sharing protocol2012-03-09Paper
Comment on ``Quantum key distribution and quantum authentication based on entangled state2012-03-09Paper
https://portal.mardi4nfdi.de/entity/Q31042142011-12-19Paper
Improvement on ``quantum key agreement protocol with maximally entangled states2011-11-04Paper
Multiparty quantum secret sharing based on GHZ states2011-08-03Paper
Quantum Secret Sharing Using GHZ-Like State2011-06-30Paper
Teleportation of a pure EPR state via GHZ-like state2010-10-08Paper
TWO-WAY QUANTUM-BIT-STRING COMMITMENT2010-06-30Paper
Simple password-based three-party authenticated key exchange without server public keys2010-06-11Paper
THE ENHANCEMENT OF ZHOU et al.'s QUANTUM SECRET SHARING PROTOCOL2010-01-25Paper
Subliminal channels in the identity-based threshold ring signature2009-05-29Paper
SECURE DIRECT COMMUNICATION USING DETERMINISTIC BB84 PROTOCOL2008-10-17Paper
Efficient one-out-of-two quantum oblivious transfer based on four-coherent-state postselection protocol2008-10-08Paper
All-in-one group-oriented cryptosystem based on bilinear pairing2008-01-03Paper
https://portal.mardi4nfdi.de/entity/Q35942792007-08-07Paper
https://portal.mardi4nfdi.de/entity/Q35942802007-08-07Paper
SECURITY OF "ASYMMETRICAL QUANTUM KEY DISTRIBUTION PROTOCOL"2007-07-04Paper
Proxy-protected signature secure against the undelegated proxy signature attack2007-06-08Paper
On the unlinkability of randomization-enhanced Chaum's blind signature scheme2005-06-13Paper
On the traceability on RSA-based partially signature with low computation2005-02-22Paper
Improved authenticated multiple-key agreement protocol2004-08-06Paper
https://portal.mardi4nfdi.de/entity/Q44607062004-03-29Paper
https://portal.mardi4nfdi.de/entity/Q44577602004-03-25Paper
The security of two ID-based multisignature protocols for sequential and broadcasting architectures2002-08-04Paper
https://portal.mardi4nfdi.de/entity/Q27572612001-11-25Paper
\((t,m)\) threshold and generalized ID-based conference key distribution system2001-04-25Paper
https://portal.mardi4nfdi.de/entity/Q49450392000-08-24Paper
https://portal.mardi4nfdi.de/entity/Q38392032000-03-07Paper
https://portal.mardi4nfdi.de/entity/Q42510272000-02-15Paper
Remarks on Chang-Buehrer access control scheme in a hierarchy1999-04-12Paper
ON THE SECURITY OF PARK ET AL.'S KEY DISTRIBUTION PROTOCOL FOR DIGITAL MOBILE COMMUNICATIONS1998-11-18Paper
https://portal.mardi4nfdi.de/entity/Q43657391997-11-18Paper
https://portal.mardi4nfdi.de/entity/Q43417681997-09-17Paper
On the security of SPLICE/AS -- The authentication system in WIDE Internet1997-02-28Paper
Two attacks on Neuman-Stubblebine authentication protocols1997-02-28Paper
CONSPIRACY ATTACKS ON THE THRESHOLD RSA SIGNATURE SCHEME1996-02-20Paper
Key generation of algebraic-code cryptosystems1994-07-24Paper
Scheme for secure digital mobile communications based on symmetric key cryptography1994-05-29Paper
https://portal.mardi4nfdi.de/entity/Q40368911993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40320321993-05-03Paper
Attacks on Okamoto and Tanaka's one-way ID-based key distribution system1993-01-17Paper
Protocols for group oriented secret sharing1993-01-16Paper
Efficient ID-based key distribution with tamperfree devices1993-01-04Paper
On double-one matrices and double-zero matrices1992-09-27Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Tzonelih Hwang