Trojan-horse attacks on quantum key distribution with classical bob

From MaRDI portal
Publication:2018186

DOI10.1007/s11128-014-0872-1zbMath1311.81103OpenAlexW2023085948MaRDI QIDQ2018186

Qianqian Zhao, Si-Jia Sun, Yu-Guang Yang

Publication date: 13 April 2015

Published in: Quantum Information Processing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s11128-014-0872-1




Related Items (26)

Authenticated semi-quantum direct communication protocols using Bell statesQuantum private query with perfect user privacy against a joint-measurement attackImprovement of a quantum broadcasting multiple blind signature scheme based on quantum teleportationSemiquantum secure direct communication using EPR pairsSemi-quantum cryptographySemi-quantum private comparison based on Bell statesAdvanced semi-quantum secure direct communication protocol based on Bell states against flip attackEfficient and secure semi-quantum secure direct communication protocol against double CNOT attackMulti‐Party Semi‐Quantum Key Distribution Protocol With Four‐Particle Cluster StatesThree Attacks on the Mediated Semi‐Quantum Key Distribution without Invoking Quantum MeasurementTwo semi-quantum key distribution protocols with G-like statesSemi-quantum key distribution using qudit systems and security proofA \((w, t, n)\)-weighted threshold dynamic quantum secret sharing scheme with cheating identificationFault-tolerant semiquantum key distribution over a collective-dephasing noise channelSemiquantum key distribution without invoking the classical party's measurement capabilitySemi-quantum key distribution protocols with GHZ statesThe modeling library of eavesdropping methods in quantum cryptography protocols by model checkingMultiparty semi-quantum secret sharing with \(d\)-level single-particle statesThree-party semi-quantum key agreement protocolCircular Semi-Quantum Secret Sharing Using Single ParticlesCryptanalysis and improvement of Ye et al's quantum private comparison protocolCryptanalysis of Zhang et al's quantum private comparison and the improvementTwo semi-quantum direct communication protocols with mutual authentication based on Bell statesA new \((w, t, n)\)-weighted threshold quantum secret sharing scheme based on two-qubit systemCheating identifiable \((k, n)\) threshold quantum secret sharing schemeMulti-party quantum key agreement with four-qubit cluster states



Cites Work


This page was built for publication: Trojan-horse attacks on quantum key distribution with classical bob