Trojan-horse attacks on quantum key distribution with classical bob
From MaRDI portal
Publication:2018186
Recommendations
- scientific article; zbMATH DE number 2112484
- Trojan horse attack free fault-tolerant quantum key distribution protocols
- Double CNOT attack on ``Quantum key distribution with limited classical Bob
- A practical Trojan horse for Bell-inequality-based quantum cryptography
- Quantum key distribution with classical Bob
Cites work
- scientific article; zbMATH DE number 1256737 (Why is no real title available?)
- Eavesdropping on the two-way quantum communication protocols with invisible photons
- Quantum cryptography
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography: public key distribution and coin tossing
- Quantum key distribution with classical Bob
- Quantum secret sharing with classical Bobs
Cited in
(31)- A new \((w, t, n)\)-weighted threshold quantum secret sharing scheme based on two-qubit system
- Semi-quantum key distribution protocols with GHZ states
- Semiquantum secure direct communication using EPR pairs
- Two semi-quantum direct communication protocols with mutual authentication based on Bell states
- Three Attacks on the Mediated Semi‐Quantum Key Distribution without Invoking Quantum Measurement
- A \((w, t, n)\)-weighted threshold dynamic quantum secret sharing scheme with cheating identification
- Semiquantum key distribution without invoking the classical party's measurement capability
- Two semi-quantum key distribution protocols with G-like states
- Double CNOT attack on ``Quantum key distribution with limited classical Bob
- Three-party semi-quantum key agreement protocol
- Circular semi-quantum secret sharing using single particles
- Semi-quantum key distribution using qudit systems and security proof
- Quantum private query with perfect user privacy against a joint-measurement attack
- Cryptanalysis of Zhang et al's quantum private comparison and the improvement
- Semi-quantum private comparison based on Bell states
- Trojan horse attack free fault-tolerant quantum key distribution protocols
- Semi-quantum cryptography
- Cheating identifiable \((k, n)\) threshold quantum secret sharing scheme
- Advanced semi-quantum secure direct communication protocol based on Bell states against flip attack
- The modeling library of eavesdropping methods in quantum cryptography protocols by model checking
- Multi‐Party Semi‐Quantum Key Distribution Protocol With Four‐Particle Cluster States
- Cryptanalysis and improvement of Ye et al's quantum private comparison protocol
- Improvement of a quantum broadcasting multiple blind signature scheme based on quantum teleportation
- Trojan horse attack free fault-tolerant quantum key distribution protocols using GHZ states
- Efficient and secure semi-quantum secure direct communication protocol against double CNOT attack
- Authenticated semi-quantum direct communication protocols using Bell states
- scientific article; zbMATH DE number 2112484 (Why is no real title available?)
- Multiparty semi-quantum secret sharing with \(d\)-level single-particle states
- Fault-tolerant semiquantum key distribution over a collective-dephasing noise channel
- Verifiable quantum protocol for dynamic secure multiparty summation based on homomorphic encryption
- Multi-party quantum key agreement with four-qubit cluster states
This page was built for publication: Trojan-horse attacks on quantum key distribution with classical bob
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2018186)