Man-in-the-middle attack on ``Quantum dialogue with authentication based on Bell states
DOI10.1007/S10773-013-1614-3zbMATH Open1276.81039OpenAlexW2053556789MaRDI QIDQ382835FDOQ382835
Authors: Tzu-Han Lin, Ching-Ying Lin, Tzonelih Hwang
Publication date: 22 November 2013
Published in: International Journal of Theoretical Physics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10773-013-1614-3
Recommendations
- Quantum dialogue with authentication based on Bell states
- Authenticated quantum dialogue based on Bell states
- A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY
- Vulnerability of ``a novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography
- Cryptanalysis on authenticated semi-quantum key distribution protocol using Bell states
man-in-the-middle attackquantum dialogueinformation leakagebidirectional quantum secure communication
Cryptography (94A60) Quantum coherence, entanglement, quantum correlations (81P40) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
Cited In (13)
- An authenticated quantum dialog protocol with three-particle entangled states using subset of intersection method
- New secure quantum dialogue protocols over collective noisy channels
- Probabilistic authenticated quantum dialogue
- Quantum dialogue with authentication based on Bell states
- Two authenticated quantum dialogue protocols based on three-particle entangled states
- Vulnerability of ``a novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography
- Authenticated quantum dialogue protocol based on four-particle entangled states
- Authenticated quantum dialogue based on Bell states
- Authentication of quantum secure communication under noise
- Quantum dialogue protocols over collective noise using entanglement of GHZ state
- Fault-tolerant authenticated quantum dialogue using logical Bell states
- A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY
- Comment on ``Quantum key distribution and quantum authentication based on entangled state
This page was built for publication: Man-in-the-middle attack on ``Quantum dialogue with authentication based on Bell states
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q382835)