Trojan-horse attacks on quantum key distribution with classical bob
From MaRDI portal
Publication:2018186
DOI10.1007/s11128-014-0872-1zbMath1311.81103OpenAlexW2023085948MaRDI QIDQ2018186
Qianqian Zhao, Si-Jia Sun, Yu-Guang Yang
Publication date: 13 April 2015
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-014-0872-1
Related Items (26)
Authenticated semi-quantum direct communication protocols using Bell states ⋮ Quantum private query with perfect user privacy against a joint-measurement attack ⋮ Improvement of a quantum broadcasting multiple blind signature scheme based on quantum teleportation ⋮ Semiquantum secure direct communication using EPR pairs ⋮ Semi-quantum cryptography ⋮ Semi-quantum private comparison based on Bell states ⋮ Advanced semi-quantum secure direct communication protocol based on Bell states against flip attack ⋮ Efficient and secure semi-quantum secure direct communication protocol against double CNOT attack ⋮ Multi‐Party Semi‐Quantum Key Distribution Protocol With Four‐Particle Cluster States ⋮ Three Attacks on the Mediated Semi‐Quantum Key Distribution without Invoking Quantum Measurement ⋮ Two semi-quantum key distribution protocols with G-like states ⋮ Semi-quantum key distribution using qudit systems and security proof ⋮ A \((w, t, n)\)-weighted threshold dynamic quantum secret sharing scheme with cheating identification ⋮ Fault-tolerant semiquantum key distribution over a collective-dephasing noise channel ⋮ Semiquantum key distribution without invoking the classical party's measurement capability ⋮ Semi-quantum key distribution protocols with GHZ states ⋮ The modeling library of eavesdropping methods in quantum cryptography protocols by model checking ⋮ Multiparty semi-quantum secret sharing with \(d\)-level single-particle states ⋮ Three-party semi-quantum key agreement protocol ⋮ Circular Semi-Quantum Secret Sharing Using Single Particles ⋮ Cryptanalysis and improvement of Ye et al's quantum private comparison protocol ⋮ Cryptanalysis of Zhang et al's quantum private comparison and the improvement ⋮ Two semi-quantum direct communication protocols with mutual authentication based on Bell states ⋮ A new \((w, t, n)\)-weighted threshold quantum secret sharing scheme based on two-qubit system ⋮ Cheating identifiable \((k, n)\) threshold quantum secret sharing scheme ⋮ Multi-party quantum key agreement with four-qubit cluster states
Cites Work
- Unnamed Item
- Quantum cryptography: public key distribution and coin tossing
- Eavesdropping on the two-way quantum communication protocols with invisible photons
- Quantum Key Distribution with Classical Bob
- Quantum cryptography based on Bell’s theorem
- Quantum secret sharing with classical Bobs
- Quantum cryptography
This page was built for publication: Trojan-horse attacks on quantum key distribution with classical bob