Tzonelih Hwang

From MaRDI portal
Person:175949

Available identifiers

zbMath Open hwang.tzonelihMaRDI QIDQ175949

List of research outcomes





PublicationDate of PublicationType
Collective Attack and Improvement on “Mediated Semi‐Quantum Key Distribution Using Single Photons”2023-11-14Paper
Mediated Semi‐Quantum Key Distribution Using Single Photons2023-11-06Paper
Mediated Semi‐Quantum Key Distribution Without Invoking Quantum Measurement2023-10-25Paper
Three-party authenticated lightweight quantum key distribution without pre-shared key between participants2023-09-18Paper
Measure-resend authenticated semi-quantum key distribution with single photons2023-01-18Paper
Efficient semi-quantum private comparison using single photons2022-12-08Paper
Collusion attack and counterattack on the quantum key agreement via non-maximally entangled cluster states2021-11-05Paper
On the controlled cyclic quantum teleportation of an arbitrary two-qubit entangled state by using a ten-qubit entangled state2020-02-28Paper
Improvement on: ``Cryptanalysis and improvement of a multiparty quantum direct secret sharing of classical messages with Bell states and Bell measurements2019-09-03Paper
Improving the security of `High-capacity quantum summation with single photons in both polarization and spatial-mode degrees of freedom'2019-09-03Paper
Double CNOT attack on “Quantum key distribution with limited classical Bob”2019-05-03Paper
Semi-quantum key distribution robust against combined collective noise2019-05-03Paper
Secure quantum communication scheme for six-qubit decoherence-free states2019-05-03Paper
Statistics attack on ``quantum private comparison with a malicious third party and its improvement2018-11-07Paper
Six-qubit decoherence-free state measurement method and its application to development of authenticated quantum secure direct communication protocol2018-11-06Paper
Double C-NOT attack and counterattack on 'three-step semi-quantum secure direct communication protocol'2018-11-05Paper
Multiparty quantum private comparison with almost dishonest third parties for strangers2018-02-27Paper
Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing2018-02-26Paper
Improvement of ``Novel multiparty quantum key agreement protocol with GHZ states2018-02-05Paper
Authenticated semi-quantum key distribution protocol using Bell states2017-11-21Paper
Comment on A practical protocol for three-party authenticated quantum key distribution2017-11-09Paper
Controlled quantum dialogue using cluster states2017-11-09Paper
On ``A new quantum blind signature with unlinkability2017-10-24Paper
Fault-tolerant controlled deterministic secure quantum communication using EPR states against collective noise2017-03-06Paper
Trojan horse attack free fault-tolerant quantum key distribution protocols using GHZ states2016-11-08Paper
Authenticated semi-quantum key distributions without classical channel2016-10-27Paper
Quantum dialogue protocols over collective noise using entanglement of GHZ state2016-10-27Paper
Controlled quantum dialogue robust against conspiring users2016-10-27Paper
Provably secure extended chaotic map-based three-party key agreement protocols using password authentication2016-10-19Paper
Multi-party quantum private comparison protocol with an almost-dishonest third party using GHZ states2016-07-05Paper
Comments on two group signatures2016-06-16Paper
An efficient quantum private comparison of equality over collective-noise channels2016-06-09Paper
Arbitrated unconditionally secure authentication scheme with multi-senders2016-06-09Paper
Quantum entanglement establishment between two strangers2016-04-04Paper
Authenticated semi-quantum direct communication protocols using Bell states2016-04-01Paper
Multi-controller quantum teleportation with remote rotation and its applications2016-04-01Paper
Probabilistic authenticated quantum dialogue2016-04-01Paper
Multi-party quantum private comparison with an almost-dishonest third party2015-12-09Paper
(t,m) THRESHOLD AND GENERALIZED ID-BASED CONFERENCE KEY DISTRIBUTION SYSTEM2015-11-13Paper
(t,n) THRESHOLD-MULTISIGNATURE SCHEME AND GENERALIZED-MULTISIGNATURE SCHEME WHERE SUSPECTED FORGERY IMPLIES TRACEABILITY OF ADVERSARIAL SHAREHOLDERS2015-11-13Paper
Intercept-and-resend attack on controlled bidirectional quantum direct communication and its improvement2015-10-19Paper
Authenticated quantum dialogue based on Bell states2015-07-08Paper
Controlled probabilistic quantum key distribution using a ground state2015-04-13Paper
Efficient quantum dialogue using single photons2015-01-23Paper
Forgery attack on one-time proxy signature and the improvement2014-12-12Paper
Multiparty controlled quantum secure direct communication based on quantum search algorithm2014-12-05Paper
Controlled remote state preparation protocols via AKLT states2014-12-05Paper
Trojan horse attack free fault-tolerant quantum key distribution protocols2014-06-13Paper
EFFICIENT KEY CONSTRUCTION ON SEMI-QUANTUM SECRET SHARING PROTOCOLS2014-04-29Paper
Attacks and improvement on ``Quantum direct communication with mutual authentication2014-04-08Paper
Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels2014-04-08Paper
Measure-and-resend attack and improvement on ``A scheme to share information via employing discrete algorithm to quantum states2014-04-08Paper
Comment on the ``Quantum private comparison protocol based on Bell entangled states2014-04-08Paper
Multiparty quantum remote control2014-02-25Paper
Comment on ``Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise2014-02-25Paper
Fault tolerant authenticated quantum direct communication immune to collective noises2014-02-25Paper
Man-in-the-middle attack on ``Quantum dialogue with authentication based on Bell states2013-11-22Paper
Provably secure three-party password-based authenticated key exchange protocol using Weil pairing2013-10-18Paper
Fault tolerant deterministic quantum communications using GHZ states over collective-noise channels2013-09-20Paper
Quantum dialogue protocols immune to collective noise2013-07-05Paper
Enhanced Multiparty Controlled QSDC Using GHZ State2013-06-07Paper
Multi-user private comparison protocol using GHZ class states2013-05-31Paper
Entanglement swapping of a GHZ state via a GHZ-like state2013-05-22Paper
Enhancement on ``Quantum blind signature based on two-state vector formalism2013-02-28Paper
Dynamic quantum secret sharing2013-02-28Paper
Improved QSDC protocol over a collective-dephasing noise channel2013-02-04Paper
Quantum secret sharing based on quantum search algorithm2013-01-11Paper
Quantum secret sharing using symmetric \(W\) state2013-01-10Paper
One-way quantum authenticated secure communication using rotation operation2012-09-26Paper
Enhancement of Gao's multiparty quantum secret sharing2012-09-26Paper
Controlled deterministic secure quantum communication based on quantum search algorithm2012-08-24Paper
Thwarting intercept-and-resend attack on Zhang's quantum secret sharing using collective rotation noises2012-06-20Paper
New quantum private comparison protocol using EPR pairs2012-05-31Paper
Revisiting Deng et al.'s multiparty quantum secret sharing protocol2012-03-09Paper
Comment on ``Quantum key distribution and quantum authentication based on entangled state2012-03-09Paper
https://portal.mardi4nfdi.de/entity/Q31042142011-12-19Paper
Improvement on ``quantum key agreement protocol with maximally entangled states2011-11-04Paper
Multiparty quantum secret sharing based on GHZ states2011-08-03Paper
Quantum Secret Sharing Using GHZ-Like State2011-06-30Paper
Teleportation of a pure EPR state via GHZ-like state2010-10-08Paper
TWO-WAY QUANTUM-BIT-STRING COMMITMENT2010-06-30Paper
Simple password-based three-party authenticated key exchange without server public keys2010-06-11Paper
THE ENHANCEMENT OF ZHOU et al.'s QUANTUM SECRET SHARING PROTOCOL2010-01-25Paper
Subliminal channels in the identity-based threshold ring signature2009-05-29Paper
SECURE DIRECT COMMUNICATION USING DETERMINISTIC BB84 PROTOCOL2008-10-17Paper
Efficient one-out-of-two quantum oblivious transfer based on four-coherent-state postselection protocol2008-10-08Paper
All-in-one group-oriented cryptosystem based on bilinear pairing2008-01-03Paper
https://portal.mardi4nfdi.de/entity/Q35942792007-08-07Paper
https://portal.mardi4nfdi.de/entity/Q35942802007-08-07Paper
SECURITY OF "ASYMMETRICAL QUANTUM KEY DISTRIBUTION PROTOCOL"2007-07-04Paper
Proxy-protected signature secure against the undelegated proxy signature attack2007-06-08Paper
On the unlinkability of randomization-enhanced Chaum's blind signature scheme2005-06-13Paper
On the traceability on RSA-based partially signature with low computation2005-02-22Paper
Improved authenticated multiple-key agreement protocol2004-08-06Paper
https://portal.mardi4nfdi.de/entity/Q44607062004-03-29Paper
https://portal.mardi4nfdi.de/entity/Q44577602004-03-25Paper
The security of two ID-based multisignature protocols for sequential and broadcasting architectures2002-08-04Paper
https://portal.mardi4nfdi.de/entity/Q27572612001-11-25Paper
\((t,m)\) threshold and generalized ID-based conference key distribution system2001-04-25Paper
https://portal.mardi4nfdi.de/entity/Q49450392000-08-24Paper
https://portal.mardi4nfdi.de/entity/Q38392032000-03-07Paper
https://portal.mardi4nfdi.de/entity/Q42510272000-02-15Paper
Remarks on Chang-Buehrer access control scheme in a hierarchy1999-04-12Paper
ON THE SECURITY OF PARK ET AL.'S KEY DISTRIBUTION PROTOCOL FOR DIGITAL MOBILE COMMUNICATIONS1998-11-18Paper
https://portal.mardi4nfdi.de/entity/Q43657391997-11-18Paper
https://portal.mardi4nfdi.de/entity/Q43417681997-09-17Paper
On the security of SPLICE/AS -- The authentication system in WIDE Internet1997-02-28Paper
Two attacks on Neuman-Stubblebine authentication protocols1997-02-28Paper
CONSPIRACY ATTACKS ON THE THRESHOLD RSA SIGNATURE SCHEME1996-02-20Paper
Key generation of algebraic-code cryptosystems1994-07-24Paper
Scheme for secure digital mobile communications based on symmetric key cryptography1994-05-29Paper
https://portal.mardi4nfdi.de/entity/Q40368911993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40320321993-05-03Paper
Attacks on Okamoto and Tanaka's one-way ID-based key distribution system1993-01-17Paper
Protocols for group oriented secret sharing1993-01-16Paper
Efficient ID-based key distribution with tamperfree devices1993-01-04Paper
On double-one matrices and double-zero matrices1992-09-27Paper

Research outcomes over time

This page was built for person: Tzonelih Hwang