On the Power of Two-Party Quantum Cryptography
From MaRDI portal
Publication:3650686
DOI10.1007/978-3-642-10366-7_5zbMath1267.81129arXiv0902.4036OpenAlexW1929070925MaRDI QIDQ3650686
Louis Salvail, Miroslava Sotáková, Christian Schaffner
Publication date: 15 December 2009
Published in: Advances in Cryptology – ASIACRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/0902.4036
Quantum information, communication, networks (quantum-theoretic aspects) (81P45) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (7)
A protocol for the secure two-party quantum scalar product ⋮ A practical protocol for three-party authenticated quantum key distribution ⋮ Coherent attack on oblivious transfer based on single-qubit rotations ⋮ Efficient simulation of random states and random unitaries ⋮ Cryptanalysis and improvement of Wu–Cai–Wu–Zhang’s quantum private comparison protocol ⋮ Quantum private comparison protocol without a third party ⋮ Secure quantum weak oblivious transfer against individual measurements
This page was built for publication: On the Power of Two-Party Quantum Cryptography