Notice: Unexpected clearActionName after getActionName already called in /var/www/html/includes/context/RequestContext.php on line 338
Qiao-Yan Wen - MaRDI portal

Qiao-Yan Wen

From MaRDI portal
(Redirected from Person:429772)
Person:265420

Available identifiers

zbMath Open wen.qiaoyanMaRDI QIDQ265420

List of research outcomes

PublicationDate of PublicationType
Sharing genuine entanglement of generalized tripartite states by multiple sequential observers2024-02-02Paper
Quantum alternating operator ansatz for solving the minimum exact cover problem2023-09-08Paper
Quantum algorithm for unsupervised anomaly detection2023-08-07Paper
A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion2023-06-30Paper
Quantum discriminative canonical correlation analysis2023-05-23Paper
Using entanglement more efficiently in distinguishing orthogonal product states by LOCC2023-01-05Paper
Effects of measurement dependence on 1-parameter family of Bell tests2022-11-28Paper
Practical decoy-state quantum private queries against joint-measurement attack under weak coherent pulse sources2022-11-24Paper
Quantum mean centering for block-encoding-based quantum algorithm2022-11-11Paper
Controlling the key by choosing the detection bits in quantum cryptographic protocols2022-10-28Paper
Quantum algorithms for anomaly detection using amplitude estimation2022-09-06Paper
https://portal.mardi4nfdi.de/entity/Q50337392022-02-23Paper
https://portal.mardi4nfdi.de/entity/Q50327152022-02-22Paper
https://portal.mardi4nfdi.de/entity/Q50355012022-02-22Paper
https://portal.mardi4nfdi.de/entity/Q50355932022-02-22Paper
https://portal.mardi4nfdi.de/entity/Q50355942022-02-22Paper
Cryptanalysis of a multi-party quantum key agreement protocol with single particles2020-06-16Paper
A new protocol for quantum private query against joint-measurement attack2019-09-03Paper
Quantum-resistant identity-based signature with message recovery and proxy delegation2019-07-10Paper
A novel pairing-free certificateless authenticated key agreement protocol with provable security2019-05-28Paper
Cryptanalysis and improvement of a certificateless encryption scheme in the standard model2019-05-28Paper
Practical covert quantum key distribution with decoy-state method2019-03-15Paper
The critical detection efficiency for closing the detection loophole of some modified Bell inequalities2019-03-15Paper
Certificateless public key encryption scheme with hybrid problems and its application to Internet of things2019-02-08Paper
Attribute-based fuzzy identity access control in multicloud computing environments2018-10-23Paper
Perfect quantum multiple-unicast network coding protocol2018-08-07Paper
A unified view of consistent functions2018-02-27Paper
Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing2018-02-27Paper
Local indistinguishability of multipartite orthogonal product bases2018-02-27Paper
Cryptanalysis and improvement of a certificateless aggregate signature scheme2017-05-16Paper
Rough approximations based on bisimulations2017-01-19Paper
https://portal.mardi4nfdi.de/entity/Q29513652017-01-06Paper
Public Key Encryption with Authorized Keyword Search2016-09-02Paper
Certificateless proxy multi-signature2016-07-11Paper
On bounding entangling rates and mixing rates in some special cases2016-06-09Paper
Construction of a class of quantum Boolean functions based on the Hadamard matrix2016-05-04Paper
Determination of locally perfect discrimination for two-qubit unitary operations2016-04-04Paper
Local distinguishability of maximally entangled states in canonical form2015-11-11Paper
Perfect discrimination of projective measurements with the rank of all projectors being one2015-08-11Paper
A lattice-based signcryption scheme without random oracles2015-08-05Paper
A Unified Definition of Consistent Functions2015-06-26Paper
General bounds for quantum discord and discord distance2015-06-05Paper
Bound on local unambiguous discrimination between multipartite quantum states2015-04-13Paper
Privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks2015-03-16Paper
Novel multiparty quantum key agreement protocol with GHZ states2015-01-09Paper
Eavesdropping on multiparty quantum secret sharing scheme based on the phase shift operations2014-12-11Paper
Semi-loss-tolerant strong quantum coin-flipping protocol using quantum non-demolition measurement2014-12-05Paper
Efficient secure multiparty computation protocol for sequencing problem over insecure channel2014-10-13Paper
Quantum key agreement with EPR pairs and single-particle measurements2014-06-13Paper
One-way LOCC indistinguishability of maximally entangled states2014-06-13Paper
The general theory of three-party quantum secret sharing protocols over phase-damping channels2014-04-08Paper
Cheat sensitive quantum bit commitment via pre- and post-selected quantum states2014-04-08Paper
Quantum private comparison protocol based on entanglement swapping of \(d\)-level Bell states2014-02-25Paper
GLS: New class of generalized Legendre sequences with optimal arithmetic cross-correlation2014-02-24Paper
Quantum private comparison protocol with the random rotation2013-11-22Paper
A novel remote user authentication and key agreement scheme for mobile client-server environment2013-08-08Paper
Discrete-time interacting quantum walks and quantum hash schemes2013-07-05Paper
Analysis of the two-particle controlled interacting quantum walks2013-07-05Paper
Multiparty quantum key agreement with single particles2013-07-05Paper
Operations on soft sets revisited2013-06-14Paper
Three-Tangle for High-Rank Mixed States2013-06-04Paper
A watermark strategy for quantum images based on quantum Fourier transform2013-05-31Paper
A quantum watermark protocol2013-04-08Paper
Improved secure multiparty computation with a dishonest majority via quantum means2013-04-08Paper
Participant attack and improvement to multiparty quantum secret sharing based on GHZ states2013-04-08Paper
Splitting a quantum secret without the assistance of entanglements2013-03-04Paper
CRYPTANALYSIS OF THE QSDC PROTOCOL WITHOUT USING PERFECT QUANTUM CHANNEL2013-02-11Paper
https://portal.mardi4nfdi.de/entity/Q49013312013-01-24Paper
Dynamic quantum secret sharing2013-01-22Paper
Comment on “Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair”2013-01-19Paper
Remote preparation of a six-particle entangled cluster-type state2013-01-10Paper
Deterministic secure quantum communication with collective detection using single photons2013-01-10Paper
Information-theoretic measures associated with rough set approximations2012-10-25Paper
https://portal.mardi4nfdi.de/entity/Q31660342012-10-21Paper
Entropy and co-entropy of a covering approximation space2012-09-11Paper
On the joint 2-adic complexity of binary multisequences2012-08-27Paper
A note on communicating between information systems based on including degrees2012-08-20Paper
On the construction of multi-output Boolean functions with optimal algebraic immunity2012-08-17Paper
Eavesdropping and improvement to multiparty quantum secret sharing with collective eavesdropping-check2012-07-17Paper
Quantum private comparison using genuine four-particle entangled states2012-07-17Paper
Affine braid groups: a better platform than braid groups for cryptology?2012-06-20Paper
https://portal.mardi4nfdi.de/entity/Q31041962011-12-19Paper
https://portal.mardi4nfdi.de/entity/Q31042002011-12-19Paper
Cryptanalysis and improvement of multiparty quantum secret sharing schemes2011-11-30Paper
Comment on: ``Efficient high-capacity quantum secret sharing with two-photon entanglement [Phys. Lett. A 372 (2008) 1957]2011-11-30Paper
Comment on: ``Three-party quantum secure direct communication based on GHZ states2011-09-06Paper
Fault-tolerant quantum secret sharing against collective noise2011-07-25Paper
MULTIPARTY CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION WITH PHASE ENCRYPTION2011-07-13Paper
Robust Quantum Secure Direct Communication over Collective Rotating Channel2011-06-30Paper
An Economical Scheme for Cloning an Unknown M -Qudit Equatorial-Like State with Assistance2011-06-30Paper
Homomorphisms between fuzzy information systems revisited2011-06-28Paper
Revisiting the security of secure direct communication based on ping-pong protocol2011-06-16Paper
Robust Multiparty Quantum Secret Sharing against Participant Forcible Manipulation2011-05-20Paper
PERFECT TELEPORTATION, SUPERDENSE CODING VIA A KIND OF W-CLASS STATE2011-05-18Paper
Verifiable quantum \((k,n)\)-threshold secret key sharing2011-04-05Paper
Improving the security of controlled quantum secure direct communication by using four particle cluster states against an attack with fake entangled particles2011-03-17Paper
QUANTUM KEY DISTRIBUTION BY CONSTRUCTING NONORTHOGONAL STATES WITH BELL STATES2011-02-03Paper
One-time pads cannot be used to improve the efficiency of quantum communication2011-01-20Paper
A TWO-STEP CHANNEL-ENCRYPTING QUANTUM KEY DISTRIBUTION PROTOCOL2011-01-20Paper
https://portal.mardi4nfdi.de/entity/Q30615642011-01-03Paper
An efficient protocol for the secure multi-party quantum summation2010-12-21Paper
https://portal.mardi4nfdi.de/entity/Q30521652010-11-05Paper
Threshold quantum cryptograph based on Grover's algorithm2010-10-28Paper
Quantum key distribution without alternative measurements and rotations2010-09-27Paper
Some improved results on communication between information systems2010-09-08Paper
An improved semantically-secure identity-based signcryption scheme in the standard model2010-05-27Paper
A New Solution to Detectable Byzantine Agreement Problem2010-04-13Paper
On the information-splitting essence of two types of quantum key distribution protocols2010-03-01Paper
Secure quantum private comparison2010-02-12Paper
REEXAMINING THE SECURITY OF THE RECONSTRUCTION PHASE OF THE HILLERY-BUZĚK-BERTHIAUME QUANTUM SECRET-SHARING PROTOCOL2010-01-28Paper
Threshold Multiparty Controlled Teleportation of Arbitrary m -Qubit Quantum Information2010-01-26Paper
THRESHOLD MULTIPARTY QUANTUM-INFORMATION SPLITTING VIA QUANTUM CHANNEL ENCRYPTION2009-10-28Paper
https://portal.mardi4nfdi.de/entity/Q31816562009-10-12Paper
https://portal.mardi4nfdi.de/entity/Q53216622009-07-22Paper
An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement2009-02-16Paper
New Constructions of Large Binary Sequences Family with Low Correlation2009-01-15Paper
https://portal.mardi4nfdi.de/entity/Q35386572008-11-24Paper
CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION WITH W STATE2008-11-17Paper
CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION WITH QUANTUM ENCRYPTION2008-11-03Paper
Improving the security of multiparty quantum secret sharing against an attack with a fake signal2008-10-29Paper
Threshold quantum secret sharing between multi-party and multi-party2008-10-16Paper
Threshold proxy quantum signature scheme with threshold shared verification2008-09-23Paper
https://portal.mardi4nfdi.de/entity/Q35226282008-09-03Paper
QUANTUM CIRCUITS FOR PROBABILISTIC ENTANGLEMENT TELEPORTATION VIA A PARTIALLY ENTANGLED PAIR2008-05-20Paper
Multiparty simultaneous quantum identity authentication with secret sharing2008-05-07Paper
https://portal.mardi4nfdi.de/entity/Q54328732007-12-18Paper
An efficient quantum secret sharing protocol with orthogonal product states2007-08-20Paper
Improved authenticated multi-key agreement protocol2007-06-01Paper
An identity-based strong designated verifier proxy signature scheme2007-06-01Paper
Applied Cryptography and Network Security2007-05-02Paper
QUANTUM KEY DISTRIBUTION BASED ON ENTANGLEMENT SWAPPING BETWEEN TWO BELL STATES2007-03-21Paper
ON THE AUTOMORPHISM GROUPS OF A FAMILY OF BINARY QUANTUM ERROR-CORRECTING CODES2007-03-14Paper
Construction of nonbinary quantum cyclic codes by using graph method2007-02-20Paper
Information Security and Cryptology2006-11-14Paper
Cryptology and Network Security2006-11-14Paper
Resilient Functions with Good Cryptographic Properties2005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q56983422005-10-27Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Qiao-Yan Wen