Verifiable quantum encryption and its practical applications
From MaRDI portal
Publication:1705099
DOI10.1007/S10773-016-3263-9zbMATH Open1390.81132OpenAlexW2567139561WikidataQ121596897 ScholiaQ121596897MaRDI QIDQ1705099FDOQ1705099
Authors: Run-hua Shi
Publication date: 14 March 2018
Published in: International Journal of Theoretical Physics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10773-016-3263-9
Recommendations
- Security aspects of practical quantum cryptography
- Applied quantum cryptography
- Practical quantum cryptography: secrecy capacity and privacy amplification
- Quantum fully homomorphic encryption with verification
- Quantum key distribution: from principles to practicalities
- Quantum cryptography
- Quantum cryptography
- Quantum cryptography
quantum cryptographysecure multi-party computationsecure scalar productverifiable quantum encryption
Cites Work
- Title not available (Why is that?)
- Quantum cryptography: public key distribution and coin tossing
- Novel image encryption/decryption based on quantum Fourier transform and double phase encoding
- Title not available (Why is that?)
- Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels
- Quantum secret sharing
- Arbitrated quantum signature scheme with continuous-variable coherent states
- Quantum image encryption based on generalized Arnold transform and double random-phase encoding
- An arbitrated quantum signature protocol based on the chained CNOT operations encryption
- Quantum counting: algorithm and error distribution
- A protocol for the secure two-party quantum scalar product
Cited In (8)
- On the optimality of quantum encryption schemes
- Quantum encryption with certified deletion
- Title not available (Why is that?)
- Quantum-Secure Coin-Flipping and Applications
- Bit-oriented quantum public key probabilistic encryption schemes
- Practical quantum bit commitment protocol
- Continuous-variable quantum computing and its applications to cryptography
- Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication
This page was built for publication: Verifiable quantum encryption and its practical applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1705099)