Trojan-horse attacks on quantum key distribution with classical bob
From MaRDI portal
Publication:2018186
DOI10.1007/S11128-014-0872-1zbMATH Open1311.81103OpenAlexW2023085948MaRDI QIDQ2018186FDOQ2018186
Authors: Yu-Guang Yang, Si-Jia Sun, Qianqian Zhao
Publication date: 13 April 2015
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-014-0872-1
Recommendations
- scientific article; zbMATH DE number 2112484
- Trojan horse attack free fault-tolerant quantum key distribution protocols
- Double CNOT attack on ``Quantum key distribution with limited classical Bob
- A practical Trojan horse for Bell-inequality-based quantum cryptography
- Quantum key distribution with classical Bob
Cites Work
- Quantum cryptography based on Bell’s theorem
- Title not available (Why is that?)
- Quantum cryptography: public key distribution and coin tossing
- Quantum Key Distribution with Classical Bob
- Quantum cryptography
- Eavesdropping on the two-way quantum communication protocols with invisible photons
- Quantum secret sharing with classical Bobs
Cited In (30)
- Semiquantum secure direct communication using EPR pairs
- Cheating identifiable \((k, n)\) threshold quantum secret sharing scheme
- Authenticated semi-quantum direct communication protocols using Bell states
- Verifiable quantum protocol for dynamic secure multiparty summation based on homomorphic encryption
- Three-party semi-quantum key agreement protocol
- Two semi-quantum direct communication protocols with mutual authentication based on Bell states
- Multiparty semi-quantum secret sharing with \(d\)-level single-particle states
- Advanced semi-quantum secure direct communication protocol based on Bell states against flip attack
- Two semi-quantum key distribution protocols with G-like states
- Circular Semi-Quantum Secret Sharing Using Single Particles
- Quantum private query with perfect user privacy against a joint-measurement attack
- Cryptanalysis of Zhang et al's quantum private comparison and the improvement
- Semiquantum key distribution without invoking the classical party's measurement capability
- Three Attacks on the Mediated Semi‐Quantum Key Distribution without Invoking Quantum Measurement
- Semi-quantum cryptography
- Title not available (Why is that?)
- Improvement of a quantum broadcasting multiple blind signature scheme based on quantum teleportation
- Trojan horse attack free fault-tolerant quantum key distribution protocols using GHZ states
- Efficient and secure semi-quantum secure direct communication protocol against double CNOT attack
- Multi‐Party Semi‐Quantum Key Distribution Protocol With Four‐Particle Cluster States
- A \((w, t, n)\)-weighted threshold dynamic quantum secret sharing scheme with cheating identification
- Trojan horse attack free fault-tolerant quantum key distribution protocols
- Cryptanalysis and improvement of Ye et al's quantum private comparison protocol
- Fault-tolerant semiquantum key distribution over a collective-dephasing noise channel
- Semi-quantum key distribution protocols with GHZ states
- Semi-quantum private comparison based on Bell states
- The modeling library of eavesdropping methods in quantum cryptography protocols by model checking
- Multi-party quantum key agreement with four-qubit cluster states
- A new \((w, t, n)\)-weighted threshold quantum secret sharing scheme based on two-qubit system
- Semi-quantum key distribution using qudit systems and security proof
This page was built for publication: Trojan-horse attacks on quantum key distribution with classical bob
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2018186)