| Publication | Date of Publication | Type |
|---|
| Generalized constructions of highly non-linear multi-output Boolean functions | 2024-09-18 | Paper |
Sharing genuine entanglement of generalized tripartite states by multiple sequential observers International Journal of Theoretical Physics | 2024-02-02 | Paper |
Quantum alternating operator ansatz for solving the minimum exact cover problem Physica A | 2023-09-08 | Paper |
Quantum algorithm for unsupervised anomaly detection Physica A | 2023-08-07 | Paper |
A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion Information Security Practice and Experience | 2023-06-30 | Paper |
Quantum discriminative canonical correlation analysis Quantum Information Processing | 2023-05-23 | Paper |
Using entanglement more efficiently in distinguishing orthogonal product states by LOCC Quantum Information Processing | 2023-01-05 | Paper |
Effects of measurement dependence on 1-parameter family of Bell tests Quantum Information Processing | 2022-11-28 | Paper |
Practical decoy-state quantum private queries against joint-measurement attack under weak coherent pulse sources Quantum Information Processing | 2022-11-24 | Paper |
Quantum mean centering for block-encoding-based quantum algorithm Physica A | 2022-11-11 | Paper |
Controlling the key by choosing the detection bits in quantum cryptographic protocols Science China Information Sciences | 2022-10-28 | Paper |
Quantum algorithms for anomaly detection using amplitude estimation Physica A | 2022-09-06 | Paper |
| scientific article; zbMATH DE number 7480455 (Why is no real title available?) | 2022-02-23 | Paper |
| Implementations of the improved AKS primality testing algorithm | 2022-02-22 | Paper |
| scientific article; zbMATH DE number 7478142 (Why is no real title available?) | 2022-02-22 | Paper |
| scientific article; zbMATH DE number 7478079 (Why is no real title available?) | 2022-02-22 | Paper |
| scientific article; zbMATH DE number 7478080 (Why is no real title available?) | 2022-02-22 | Paper |
Cryptanalysis of a multi-party quantum key agreement protocol with single particles Quantum Information Processing | 2020-06-16 | Paper |
A new protocol for quantum private query against joint-measurement attack International Journal of Theoretical Physics | 2019-09-03 | Paper |
Quantum-resistant identity-based signature with message recovery and proxy delegation Symmetry | 2019-07-10 | Paper |
A novel pairing-free certificateless authenticated key agreement protocol with provable security Frontiers of Computer Science | 2019-05-28 | Paper |
Cryptanalysis and improvement of a certificateless encryption scheme in the standard model Frontiers of Computer Science | 2019-05-28 | Paper |
Practical covert quantum key distribution with decoy-state method Quantum Information Processing | 2019-03-15 | Paper |
The critical detection efficiency for closing the detection loophole of some modified Bell inequalities Quantum Information Processing | 2019-03-15 | Paper |
Certificateless public key encryption scheme with hybrid problems and its application to Internet of things Mathematical Problems in Engineering | 2019-02-08 | Paper |
Attribute-based fuzzy identity access control in multicloud computing environments Soft Computing | 2018-10-23 | Paper |
Perfect quantum multiple-unicast network coding protocol Quantum Information Processing | 2018-08-07 | Paper |
Local indistinguishability of multipartite orthogonal product bases Quantum Information Processing | 2018-02-27 | Paper |
A unified view of consistent functions Soft Computing | 2018-02-27 | Paper |
Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing Soft Computing | 2018-02-27 | Paper |
Cryptanalysis and improvement of a certificateless aggregate signature scheme Information Sciences | 2017-05-16 | Paper |
Rough approximations based on bisimulations International Journal of Approximate Reasoning | 2017-01-19 | Paper |
| scientific article; zbMATH DE number 6672421 (Why is no real title available?) | 2017-01-06 | Paper |
Public Key Encryption with Authorized Keyword Search Information Security and Privacy | 2016-09-02 | Paper |
Certificateless proxy multi-signature Information Sciences | 2016-07-11 | Paper |
On bounding entangling rates and mixing rates in some special cases International Journal of Theoretical Physics | 2016-06-09 | Paper |
Construction of a class of quantum Boolean functions based on the Hadamard matrix Acta Mathematicae Applicatae Sinica. English Series | 2016-05-04 | Paper |
Determination of locally perfect discrimination for two-qubit unitary operations Quantum Information Processing | 2016-04-04 | Paper |
Local distinguishability of maximally entangled states in canonical form Quantum Information Processing | 2015-11-11 | Paper |
Perfect discrimination of projective measurements with the rank of all projectors being one Quantum Information Processing | 2015-08-11 | Paper |
A lattice-based signcryption scheme without random oracles Frontiers of Computer Science | 2015-08-05 | Paper |
A unified definition of consistent functions Fundamenta Informaticae | 2015-06-26 | Paper |
General bounds for quantum discord and discord distance Quantum Information Processing | 2015-06-05 | Paper |
Bound on local unambiguous discrimination between multipartite quantum states Quantum Information Processing | 2015-04-13 | Paper |
Privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks Computational & Mathematical Methods in Medicine | 2015-03-16 | Paper |
Novel multiparty quantum key agreement protocol with GHZ states Quantum Information Processing | 2015-01-09 | Paper |
Eavesdropping on multiparty quantum secret sharing scheme based on the phase shift operations International Journal of Theoretical Physics | 2014-12-11 | Paper |
Semi-loss-tolerant strong quantum coin-flipping protocol using quantum non-demolition measurement Quantum Information Processing | 2014-12-05 | Paper |
Efficient secure multiparty computation protocol for sequencing problem over insecure channel Mathematical Problems in Engineering | 2014-10-13 | Paper |
Quantum key agreement with EPR pairs and single-particle measurements Quantum Information Processing | 2014-06-13 | Paper |
One-way LOCC indistinguishability of maximally entangled states Quantum Information Processing | 2014-06-13 | Paper |
The general theory of three-party quantum secret sharing protocols over phase-damping channels Quantum Information Processing | 2014-04-08 | Paper |
Cheat sensitive quantum bit commitment via pre- and post-selected quantum states Quantum Information Processing | 2014-04-08 | Paper |
Quantum private comparison protocol based on entanglement swapping of \(d\)-level Bell states Quantum Information Processing | 2014-02-25 | Paper |
GLS: new class of generalized Legendre sequences with optimal arithmetic cross-correlation RAIRO - Theoretical Informatics and Applications | 2014-02-24 | Paper |
Quantum private comparison protocol with the random rotation International Journal of Theoretical Physics | 2013-11-22 | Paper |
A novel remote user authentication and key agreement scheme for mobile client-server environment Applied Mathematics & Information Sciences | 2013-08-08 | Paper |
Multiparty quantum key agreement with single particles Quantum Information Processing | 2013-07-05 | Paper |
Discrete-time interacting quantum walks and quantum hash schemes Quantum Information Processing | 2013-07-05 | Paper |
Analysis of the two-particle controlled interacting quantum walks Quantum Information Processing | 2013-07-05 | Paper |
Operations on soft sets revisited Journal of Applied Mathematics | 2013-06-14 | Paper |
Three-Tangle for High-Rank Mixed States Communications in Theoretical Physics | 2013-06-04 | Paper |
A watermark strategy for quantum images based on quantum Fourier transform Quantum Information Processing | 2013-05-31 | Paper |
A quantum watermark protocol International Journal of Theoretical Physics | 2013-04-08 | Paper |
Improved secure multiparty computation with a dishonest majority via quantum means International Journal of Theoretical Physics | 2013-04-08 | Paper |
Participant attack and improvement to multiparty quantum secret sharing based on GHZ states International Journal of Theoretical Physics | 2013-04-08 | Paper |
Splitting a quantum secret without the assistance of entanglements Quantum Information Processing | 2013-03-04 | Paper |
Cryptanalysis of the QSDC protocol without using perfect quantum channel International Journal of Quantum Information | 2013-02-11 | Paper |
| scientific article; zbMATH DE number 6129823 (Why is no real title available?) | 2013-01-24 | Paper |
Dynamic quantum secret sharing Physics Letters. A | 2013-01-22 | Paper |
Comment on ``Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair Physical Review A | 2013-01-19 | Paper |
Remote preparation of a six-particle entangled cluster-type state International Journal of Theoretical Physics | 2013-01-10 | Paper |
Deterministic secure quantum communication with collective detection using single photons International Journal of Theoretical Physics | 2013-01-10 | Paper |
Information-theoretic measures associated with rough set approximations Information Sciences | 2012-10-25 | Paper |
Semi-loss-tolerant strong coin flipping protocol using EPR pairs (available as arXiv preprint) | 2012-10-21 | Paper |
Entropy and co-entropy of a covering approximation space International Journal of Approximate Reasoning | 2012-09-11 | Paper |
On the joint 2-adic complexity of binary multisequences RAIRO. Theoretical Informatics and Applications | 2012-08-27 | Paper |
On the joint 2-adic complexity of binary multisequences RAIRO. Theoretical Informatics and Applications | 2012-08-27 | Paper |
A note on communicating between information systems based on including degrees International Journal of General Systems | 2012-08-20 | Paper |
On the construction of multi-output Boolean functions with optimal algebraic immunity Science China Information Sciences | 2012-08-17 | Paper |
Eavesdropping and improvement to multiparty quantum secret sharing with collective eavesdropping-check International Journal of Theoretical Physics | 2012-07-17 | Paper |
Quantum private comparison using genuine four-particle entangled states International Journal of Theoretical Physics | 2012-07-17 | Paper |
Affine braid groups: a better platform than braid groups for cryptology? Applicable Algebra in Engineering, Communication and Computing | 2012-06-20 | Paper |
| Security of a kind of quantum secret sharing with single photons | 2011-12-19 | Paper |
| scientific article; zbMATH DE number 5989869 (Why is no real title available?) | 2011-12-19 | Paper |
Cryptanalysis and improvement of multiparty quantum secret sharing schemes Physics Letters. A | 2011-11-30 | Paper |
Comment on: ``Efficient high-capacity quantum secret sharing with two-photon entanglement [Phys. Lett. A 372 (2008) 1957] Physics Letters. A | 2011-11-30 | Paper |
Comment on: ``Three-party quantum secure direct communication based on GHZ states Physics Letters. A | 2011-09-06 | Paper |
Fault-tolerant quantum secret sharing against collective noise Physica Scripta | 2011-07-25 | Paper |
Multiparty controlled quantum secure direct communication with phase encryption International Journal of Quantum Information | 2011-07-13 | Paper |
Robust quantum secure direct communication over collective rotating channel Communications in Theoretical Physics | 2011-06-30 | Paper |
An economical scheme for cloning an unknown \(M\)-qudit equatorial-like state with assistance Communications in Theoretical Physics | 2011-06-30 | Paper |
Homomorphisms between fuzzy information systems revisited Applied Mathematics Letters | 2011-06-28 | Paper |
Revisiting the security of secure direct communication based on ping-pong protocol Quantum Information Processing | 2011-06-16 | Paper |
Robust multiparty quantum secret sharing against participant forcible manipulation Communications in Theoretical Physics | 2011-05-20 | Paper |
Perfect teleportation, superdense coding via a kind of \(W\)-class state International Journal of Quantum Information | 2011-05-18 | Paper |
Verifiable quantum \((k,n)\)-threshold secret key sharing International Journal of Theoretical Physics | 2011-04-05 | Paper |
Improving the security of controlled quantum secure direct communication by using four particle cluster states against an attack with fake entangled particles International Journal of Theoretical Physics | 2011-03-17 | Paper |
Quantum key distribution by constructing nonorthogonal states with Bell states International Journal of Modern Physics B | 2011-02-03 | Paper |
A two-step channel-encrypting quantum key distribution protocol International Journal of Quantum Information | 2011-01-20 | Paper |
One-time pads cannot be used to improve the efficiency of quantum communication Physics Letters. A | 2011-01-20 | Paper |
| scientific article; zbMATH DE number 5830825 (Why is no real title available?) | 2011-01-03 | Paper |
An efficient protocol for the secure multi-party quantum summation International Journal of Theoretical Physics | 2010-12-21 | Paper |
| An efficient identity-based multi-recipient signcryption scheme | 2010-11-05 | Paper |
Threshold quantum cryptograph based on Grover's algorithm Physics Letters. A | 2010-10-28 | Paper |
Quantum key distribution without alternative measurements and rotations Physics Letters. A | 2010-09-27 | Paper |
Some improved results on communication between information systems Information Sciences | 2010-09-08 | Paper |
An improved semantically-secure identity-based signcryption scheme in the standard model Computers and Electrical Engineering | 2010-05-27 | Paper |
A New Solution to Detectable Byzantine Agreement Problem Communications in Theoretical Physics | 2010-04-13 | Paper |
On the information-splitting essence of two types of quantum key distribution protocols Physics Letters. A | 2010-03-01 | Paper |
Secure quantum private comparison Physica Scripta | 2010-02-12 | Paper |
Reexamining the security of the reconstruction phase of the Hillery-Buzěk-Berthiaume quantum secret-sharing protocol International Journal of Quantum Information | 2010-01-28 | Paper |
Threshold multiparty controlled teleportation of arbitrary \(m\)-qubit quantum information Communications in Theoretical Physics | 2010-01-26 | Paper |
THRESHOLD MULTIPARTY QUANTUM-INFORMATION SPLITTING VIA QUANTUM CHANNEL ENCRYPTION International Journal of Quantum Information | 2009-10-28 | Paper |
| Security of quantum secret sharing with two-particle entanglement against individual attacks | 2009-10-12 | Paper |
| Quantum secret sharing with bidirectional authentication | 2009-07-22 | Paper |
An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement Journal of Physics A: Mathematical and Theoretical | 2009-02-16 | Paper |
New Constructions of Large Binary Sequences Family with Low Correlation Information Security and Cryptology | 2009-01-15 | Paper |
| Isometries and equivalences of quantum codes | 2008-11-24 | Paper |
CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION WITH W STATE International Journal of Quantum Information | 2008-11-17 | Paper |
CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION WITH QUANTUM ENCRYPTION International Journal of Quantum Information | 2008-11-03 | Paper |
Improving the security of multiparty quantum secret sharing against an attack with a fake signal Physics Letters. A | 2008-10-29 | Paper |
Threshold quantum secret sharing between multi-party and multi-party Science in China. Series G | 2008-10-16 | Paper |
Threshold proxy quantum signature scheme with threshold shared verification Science in China. Series G | 2008-09-23 | Paper |
| A simple participant attack on the Bradler--Dusek protocol | 2008-09-03 | Paper |
QUANTUM CIRCUITS FOR PROBABILISTIC ENTANGLEMENT TELEPORTATION VIA A PARTIALLY ENTANGLED PAIR International Journal of Quantum Information | 2008-05-20 | Paper |
Multiparty simultaneous quantum identity authentication with secret sharing Science in China. Series G | 2008-05-07 | Paper |
| Construction of bent complementary functions family and its generalization | 2007-12-18 | Paper |
An efficient quantum secret sharing protocol with orthogonal product states Chinese Annals of Mathematics. Series B | 2007-08-20 | Paper |
Improved authenticated multi-key agreement protocol Wuhan University Journal of Natural Sciences | 2007-06-01 | Paper |
An identity-based strong designated verifier proxy signature scheme Wuhan University Journal of Natural Sciences | 2007-06-01 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2007-05-02 | Paper |
QUANTUM KEY DISTRIBUTION BASED ON ENTANGLEMENT SWAPPING BETWEEN TWO BELL STATES International Journal of Quantum Information | 2007-03-21 | Paper |
ON THE AUTOMORPHISM GROUPS OF A FAMILY OF BINARY QUANTUM ERROR-CORRECTING CODES International Journal of Quantum Information | 2007-03-14 | Paper |
Construction of nonbinary quantum cyclic codes by using graph method Science in China. Series F | 2007-02-20 | Paper |
Cryptology and Network Security Lecture Notes in Computer Science | 2006-11-14 | Paper |
Information Security and Cryptology Lecture Notes in Computer Science | 2006-11-14 | Paper |
Resilient Functions with Good Cryptographic Properties The International Series in Engineering and Computer Science | 2005-11-02 | Paper |
| scientific article; zbMATH DE number 2219585 (Why is no real title available?) | 2005-10-27 | Paper |