Qiaoyan Wen

From MaRDI portal
(Redirected from Person:265420)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Generalized constructions of highly non-linear multi-output Boolean functions2024-09-18Paper
Sharing genuine entanglement of generalized tripartite states by multiple sequential observers
International Journal of Theoretical Physics
2024-02-02Paper
Quantum alternating operator ansatz for solving the minimum exact cover problem
Physica A
2023-09-08Paper
Quantum algorithm for unsupervised anomaly detection
Physica A
2023-08-07Paper
A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion
Information Security Practice and Experience
2023-06-30Paper
Quantum discriminative canonical correlation analysis
Quantum Information Processing
2023-05-23Paper
Using entanglement more efficiently in distinguishing orthogonal product states by LOCC
Quantum Information Processing
2023-01-05Paper
Effects of measurement dependence on 1-parameter family of Bell tests
Quantum Information Processing
2022-11-28Paper
Practical decoy-state quantum private queries against joint-measurement attack under weak coherent pulse sources
Quantum Information Processing
2022-11-24Paper
Quantum mean centering for block-encoding-based quantum algorithm
Physica A
2022-11-11Paper
Controlling the key by choosing the detection bits in quantum cryptographic protocols
Science China Information Sciences
2022-10-28Paper
Quantum algorithms for anomaly detection using amplitude estimation
Physica A
2022-09-06Paper
scientific article; zbMATH DE number 7480455 (Why is no real title available?)2022-02-23Paper
Implementations of the improved AKS primality testing algorithm2022-02-22Paper
scientific article; zbMATH DE number 7478142 (Why is no real title available?)2022-02-22Paper
scientific article; zbMATH DE number 7478079 (Why is no real title available?)2022-02-22Paper
scientific article; zbMATH DE number 7478080 (Why is no real title available?)2022-02-22Paper
Cryptanalysis of a multi-party quantum key agreement protocol with single particles
Quantum Information Processing
2020-06-16Paper
A new protocol for quantum private query against joint-measurement attack
International Journal of Theoretical Physics
2019-09-03Paper
Quantum-resistant identity-based signature with message recovery and proxy delegation
Symmetry
2019-07-10Paper
A novel pairing-free certificateless authenticated key agreement protocol with provable security
Frontiers of Computer Science
2019-05-28Paper
Cryptanalysis and improvement of a certificateless encryption scheme in the standard model
Frontiers of Computer Science
2019-05-28Paper
Practical covert quantum key distribution with decoy-state method
Quantum Information Processing
2019-03-15Paper
The critical detection efficiency for closing the detection loophole of some modified Bell inequalities
Quantum Information Processing
2019-03-15Paper
Certificateless public key encryption scheme with hybrid problems and its application to Internet of things
Mathematical Problems in Engineering
2019-02-08Paper
Attribute-based fuzzy identity access control in multicloud computing environments
Soft Computing
2018-10-23Paper
Perfect quantum multiple-unicast network coding protocol
Quantum Information Processing
2018-08-07Paper
Local indistinguishability of multipartite orthogonal product bases
Quantum Information Processing
2018-02-27Paper
A unified view of consistent functions
Soft Computing
2018-02-27Paper
Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing
Soft Computing
2018-02-27Paper
Cryptanalysis and improvement of a certificateless aggregate signature scheme
Information Sciences
2017-05-16Paper
Rough approximations based on bisimulations
International Journal of Approximate Reasoning
2017-01-19Paper
scientific article; zbMATH DE number 6672421 (Why is no real title available?)2017-01-06Paper
Public Key Encryption with Authorized Keyword Search
Information Security and Privacy
2016-09-02Paper
Certificateless proxy multi-signature
Information Sciences
2016-07-11Paper
On bounding entangling rates and mixing rates in some special cases
International Journal of Theoretical Physics
2016-06-09Paper
Construction of a class of quantum Boolean functions based on the Hadamard matrix
Acta Mathematicae Applicatae Sinica. English Series
2016-05-04Paper
Determination of locally perfect discrimination for two-qubit unitary operations
Quantum Information Processing
2016-04-04Paper
Local distinguishability of maximally entangled states in canonical form
Quantum Information Processing
2015-11-11Paper
Perfect discrimination of projective measurements with the rank of all projectors being one
Quantum Information Processing
2015-08-11Paper
A lattice-based signcryption scheme without random oracles
Frontiers of Computer Science
2015-08-05Paper
A unified definition of consistent functions
Fundamenta Informaticae
2015-06-26Paper
General bounds for quantum discord and discord distance
Quantum Information Processing
2015-06-05Paper
Bound on local unambiguous discrimination between multipartite quantum states
Quantum Information Processing
2015-04-13Paper
Privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks
Computational & Mathematical Methods in Medicine
2015-03-16Paper
Novel multiparty quantum key agreement protocol with GHZ states
Quantum Information Processing
2015-01-09Paper
Eavesdropping on multiparty quantum secret sharing scheme based on the phase shift operations
International Journal of Theoretical Physics
2014-12-11Paper
Semi-loss-tolerant strong quantum coin-flipping protocol using quantum non-demolition measurement
Quantum Information Processing
2014-12-05Paper
Efficient secure multiparty computation protocol for sequencing problem over insecure channel
Mathematical Problems in Engineering
2014-10-13Paper
Quantum key agreement with EPR pairs and single-particle measurements
Quantum Information Processing
2014-06-13Paper
One-way LOCC indistinguishability of maximally entangled states
Quantum Information Processing
2014-06-13Paper
The general theory of three-party quantum secret sharing protocols over phase-damping channels
Quantum Information Processing
2014-04-08Paper
Cheat sensitive quantum bit commitment via pre- and post-selected quantum states
Quantum Information Processing
2014-04-08Paper
Quantum private comparison protocol based on entanglement swapping of \(d\)-level Bell states
Quantum Information Processing
2014-02-25Paper
GLS: new class of generalized Legendre sequences with optimal arithmetic cross-correlation
RAIRO - Theoretical Informatics and Applications
2014-02-24Paper
Quantum private comparison protocol with the random rotation
International Journal of Theoretical Physics
2013-11-22Paper
A novel remote user authentication and key agreement scheme for mobile client-server environment
Applied Mathematics & Information Sciences
2013-08-08Paper
Multiparty quantum key agreement with single particles
Quantum Information Processing
2013-07-05Paper
Discrete-time interacting quantum walks and quantum hash schemes
Quantum Information Processing
2013-07-05Paper
Analysis of the two-particle controlled interacting quantum walks
Quantum Information Processing
2013-07-05Paper
Operations on soft sets revisited
Journal of Applied Mathematics
2013-06-14Paper
Three-Tangle for High-Rank Mixed States
Communications in Theoretical Physics
2013-06-04Paper
A watermark strategy for quantum images based on quantum Fourier transform
Quantum Information Processing
2013-05-31Paper
A quantum watermark protocol
International Journal of Theoretical Physics
2013-04-08Paper
Improved secure multiparty computation with a dishonest majority via quantum means
International Journal of Theoretical Physics
2013-04-08Paper
Participant attack and improvement to multiparty quantum secret sharing based on GHZ states
International Journal of Theoretical Physics
2013-04-08Paper
Splitting a quantum secret without the assistance of entanglements
Quantum Information Processing
2013-03-04Paper
Cryptanalysis of the QSDC protocol without using perfect quantum channel
International Journal of Quantum Information
2013-02-11Paper
scientific article; zbMATH DE number 6129823 (Why is no real title available?)2013-01-24Paper
Dynamic quantum secret sharing
Physics Letters. A
2013-01-22Paper
Comment on ``Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair
Physical Review A
2013-01-19Paper
Remote preparation of a six-particle entangled cluster-type state
International Journal of Theoretical Physics
2013-01-10Paper
Deterministic secure quantum communication with collective detection using single photons
International Journal of Theoretical Physics
2013-01-10Paper
Information-theoretic measures associated with rough set approximations
Information Sciences
2012-10-25Paper
Semi-loss-tolerant strong coin flipping protocol using EPR pairs
(available as arXiv preprint)
2012-10-21Paper
Entropy and co-entropy of a covering approximation space
International Journal of Approximate Reasoning
2012-09-11Paper
On the joint 2-adic complexity of binary multisequences
RAIRO. Theoretical Informatics and Applications
2012-08-27Paper
On the joint 2-adic complexity of binary multisequences
RAIRO. Theoretical Informatics and Applications
2012-08-27Paper
A note on communicating between information systems based on including degrees
International Journal of General Systems
2012-08-20Paper
On the construction of multi-output Boolean functions with optimal algebraic immunity
Science China Information Sciences
2012-08-17Paper
Eavesdropping and improvement to multiparty quantum secret sharing with collective eavesdropping-check
International Journal of Theoretical Physics
2012-07-17Paper
Quantum private comparison using genuine four-particle entangled states
International Journal of Theoretical Physics
2012-07-17Paper
Affine braid groups: a better platform than braid groups for cryptology?
Applicable Algebra in Engineering, Communication and Computing
2012-06-20Paper
Security of a kind of quantum secret sharing with single photons2011-12-19Paper
scientific article; zbMATH DE number 5989869 (Why is no real title available?)2011-12-19Paper
Cryptanalysis and improvement of multiparty quantum secret sharing schemes
Physics Letters. A
2011-11-30Paper
Comment on: ``Efficient high-capacity quantum secret sharing with two-photon entanglement [Phys. Lett. A 372 (2008) 1957]
Physics Letters. A
2011-11-30Paper
Comment on: ``Three-party quantum secure direct communication based on GHZ states
Physics Letters. A
2011-09-06Paper
Fault-tolerant quantum secret sharing against collective noise
Physica Scripta
2011-07-25Paper
Multiparty controlled quantum secure direct communication with phase encryption
International Journal of Quantum Information
2011-07-13Paper
Robust quantum secure direct communication over collective rotating channel
Communications in Theoretical Physics
2011-06-30Paper
An economical scheme for cloning an unknown \(M\)-qudit equatorial-like state with assistance
Communications in Theoretical Physics
2011-06-30Paper
Homomorphisms between fuzzy information systems revisited
Applied Mathematics Letters
2011-06-28Paper
Revisiting the security of secure direct communication based on ping-pong protocol
Quantum Information Processing
2011-06-16Paper
Robust multiparty quantum secret sharing against participant forcible manipulation
Communications in Theoretical Physics
2011-05-20Paper
Perfect teleportation, superdense coding via a kind of \(W\)-class state
International Journal of Quantum Information
2011-05-18Paper
Verifiable quantum \((k,n)\)-threshold secret key sharing
International Journal of Theoretical Physics
2011-04-05Paper
Improving the security of controlled quantum secure direct communication by using four particle cluster states against an attack with fake entangled particles
International Journal of Theoretical Physics
2011-03-17Paper
Quantum key distribution by constructing nonorthogonal states with Bell states
International Journal of Modern Physics B
2011-02-03Paper
A two-step channel-encrypting quantum key distribution protocol
International Journal of Quantum Information
2011-01-20Paper
One-time pads cannot be used to improve the efficiency of quantum communication
Physics Letters. A
2011-01-20Paper
scientific article; zbMATH DE number 5830825 (Why is no real title available?)2011-01-03Paper
An efficient protocol for the secure multi-party quantum summation
International Journal of Theoretical Physics
2010-12-21Paper
An efficient identity-based multi-recipient signcryption scheme2010-11-05Paper
Threshold quantum cryptograph based on Grover's algorithm
Physics Letters. A
2010-10-28Paper
Quantum key distribution without alternative measurements and rotations
Physics Letters. A
2010-09-27Paper
Some improved results on communication between information systems
Information Sciences
2010-09-08Paper
An improved semantically-secure identity-based signcryption scheme in the standard model
Computers and Electrical Engineering
2010-05-27Paper
A New Solution to Detectable Byzantine Agreement Problem
Communications in Theoretical Physics
2010-04-13Paper
On the information-splitting essence of two types of quantum key distribution protocols
Physics Letters. A
2010-03-01Paper
Secure quantum private comparison
Physica Scripta
2010-02-12Paper
Reexamining the security of the reconstruction phase of the Hillery-Buzěk-Berthiaume quantum secret-sharing protocol
International Journal of Quantum Information
2010-01-28Paper
Threshold multiparty controlled teleportation of arbitrary \(m\)-qubit quantum information
Communications in Theoretical Physics
2010-01-26Paper
THRESHOLD MULTIPARTY QUANTUM-INFORMATION SPLITTING VIA QUANTUM CHANNEL ENCRYPTION
International Journal of Quantum Information
2009-10-28Paper
Security of quantum secret sharing with two-particle entanglement against individual attacks2009-10-12Paper
Quantum secret sharing with bidirectional authentication2009-07-22Paper
An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement
Journal of Physics A: Mathematical and Theoretical
2009-02-16Paper
New Constructions of Large Binary Sequences Family with Low Correlation
Information Security and Cryptology
2009-01-15Paper
Isometries and equivalences of quantum codes2008-11-24Paper
CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION WITH W STATE
International Journal of Quantum Information
2008-11-17Paper
CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION WITH QUANTUM ENCRYPTION
International Journal of Quantum Information
2008-11-03Paper
Improving the security of multiparty quantum secret sharing against an attack with a fake signal
Physics Letters. A
2008-10-29Paper
Threshold quantum secret sharing between multi-party and multi-party
Science in China. Series G
2008-10-16Paper
Threshold proxy quantum signature scheme with threshold shared verification
Science in China. Series G
2008-09-23Paper
A simple participant attack on the Bradler--Dusek protocol2008-09-03Paper
QUANTUM CIRCUITS FOR PROBABILISTIC ENTANGLEMENT TELEPORTATION VIA A PARTIALLY ENTANGLED PAIR
International Journal of Quantum Information
2008-05-20Paper
Multiparty simultaneous quantum identity authentication with secret sharing
Science in China. Series G
2008-05-07Paper
Construction of bent complementary functions family and its generalization2007-12-18Paper
An efficient quantum secret sharing protocol with orthogonal product states
Chinese Annals of Mathematics. Series B
2007-08-20Paper
Improved authenticated multi-key agreement protocol
Wuhan University Journal of Natural Sciences
2007-06-01Paper
An identity-based strong designated verifier proxy signature scheme
Wuhan University Journal of Natural Sciences
2007-06-01Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2007-05-02Paper
QUANTUM KEY DISTRIBUTION BASED ON ENTANGLEMENT SWAPPING BETWEEN TWO BELL STATES
International Journal of Quantum Information
2007-03-21Paper
ON THE AUTOMORPHISM GROUPS OF A FAMILY OF BINARY QUANTUM ERROR-CORRECTING CODES
International Journal of Quantum Information
2007-03-14Paper
Construction of nonbinary quantum cyclic codes by using graph method
Science in China. Series F
2007-02-20Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper
Information Security and Cryptology
Lecture Notes in Computer Science
2006-11-14Paper
Resilient Functions with Good Cryptographic Properties
The International Series in Engineering and Computer Science
2005-11-02Paper
scientific article; zbMATH DE number 2219585 (Why is no real title available?)2005-10-27Paper


Research outcomes over time


This page was built for person: Qiaoyan Wen