Quantum cryptography: public key distribution and coin tossing

From MaRDI portal
Publication:477162

DOI10.1016/j.tcs.2014.05.025zbMath1306.81030arXiv2003.06557OpenAlexW2015179126WikidataQ29011667 ScholiaQ29011667MaRDI QIDQ477162

Gilles Brassard, Charles H. Bennett

Publication date: 2 December 2014

Published in: Theoretical Computer Science (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/2003.06557



Related Items

Multiparty quantum sealed-bid auction using single photons as message carrier, Quantum key distribution using continuous-variable non-Gaussian states, Quantum authencryption with two-photon entangled states for off-line communicants, A novel quantum blind signature scheme with four-particle GHZ states, On entanglement-assisted quantum codes achieving the entanglement-assisted Griesmer bound, Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach, Quantum state representation based on combinatorial Laplacian matrix of star-relevant graph, Attacks on quantum key distribution protocols that employ non-ITS authentication, Efficient multi-party quantum key agreement by cluster states, Quantum key distribution based on interferometry and interaction-free measurement, An immune quantum communication model for dephasing noise using four-qubit cluster state, Quantum theory is an information theory. The operational framework and the axioms, Generation of entangled coherent-squeezed states: their entanglement and nonclassical properties, Which verification qubits perform best for secure communication in noisy channel?, On conclusive eavesdropping and measures of mutual information in quantum key distribution, Hyper CNOT and hyper Bell-state analysis assisted by quantum dots in double-side optical microcavities, A novel quantum blind signature scheme with four-particle cluster states, Secure quantum private comparison protocol based on the entanglement swapping between three-particle W-class state and Bell state, Security of a semi-quantum protocol where reflections contribute to the secret key, Efficient multiparty quantum key agreement protocol based on commutative encryption, Collusive attacks to ``circle-type multi-party quantum key agreement protocols, Controlled quantum secure direct communication by entanglement distillation or generalized measurement, A graph theoretical approach to states and unitary operations, An enhanced proposal on decoy-state measurement device-independent quantum key distribution, Study on the security of the authentication scheme with key recycling in QKD, Novel classical post-processing for quantum key distribution-based quantum private query, Authenticated semi-quantum key distributions without classical channel, Quantum private query based on single-photon interference, Quantum cloning attacks against PUF-based quantum authentication systems, The statistical fluctuation analysis for the measurement-device-independent quantum key distribution with heralded single-photon sources, Efficient quantum dialogue using entangled states and entanglement swapping without information leakage, Continuous-variable quantum identity authentication based on quantum teleportation, Quantum cloning disturbed by thermal Davies environment, Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system, Fault-tolerant quantum blind signature protocols against collective noise, Trojan horse attack free fault-tolerant quantum key distribution protocols using GHZ states, Security analysis of an arbitrated quantum signature scheme with Bell states, Quantum dialogue protocols immune to collective noise, Attack and improvements of fair quantum blind signature schemes, Quantum private comparison against decoherence noise, A quantum protocol for millionaire problem with Bell states, Cryptanalysis of an inter-bank e-payment protocol based on quantum proxy blind signature, Multiparty quantum key agreement with single particles, Efficient arbitrated quantum signature and its proof of security, A quantum secure direct communication protocol using entangled modified spin coherent states, Editors' introduction: The third life of quantum logic: Quantum logic inspired by quantum computing, Reexamination of arbitrated quantum signature: the impossible and the possible, Fault tolerant deterministic quantum communications using GHZ states over collective-noise channels, Efficient bidirectional quantum secure communication with two-photon entanglement, Fault-tolerate quantum private comparison based on GHZ states and ECC, The impossibility of non-signaling privacy amplification, On the impossibility of non-static quantum bit commitment between two parties, New quantum private comparison protocol using EPR pairs, Perfect state distinguishability and computational speedups with postselected closed timelike curves, Thwarting intercept-and-resend attack on Zhang's quantum secret sharing using collective rotation noises, A protocol for the quantum private comparison of equality with \(\chi \)-type state, A modified quantum key distribution without public announcement bases against photon-number-splitting attack, Practical quantum bit commitment protocol, New quantum private comparison protocol using \(\chi \)-type state, Quantum key agreement against collective decoherence, Geometric discord of non-X-structured state under decoherence channels, Quantum computation: a tutorial, Quantum key distribution in large scale quantum network assisted by classical routing information, Quantum-assisted QD-CFS signatures, Symmetric quantum fully homomorphic encryption with perfect security, Quantum simultaneous secret distribution with dense coding by using cluster states, Cryptanalysis and improvement of three-particle deterministic secure and high bit-rate direct quantum communication protocol, Quantum deniable authentication protocol, Fault-tolerant high-capacity quantum key distribution over a collective-noise channel using extended unitary operations, Direct proof of security of Wegman-Carter authentication with partially known key, Two-party quantum key agreement with four-qubit cluster states, Analysis of counterfactual quantum key distribution using error-correcting theory, Multi-party quantum private comparison protocol based on \(d\)-dimensional entangled states, An arbitrated quantum signature with Bell states, Cryptanalysis of a sessional blind signature based on quantum cryptography, Forgery attack on one-time proxy signature and the improvement, Multi-party quantum state sharing of an arbitrary multi-qubit state via \(\chi\)-type entangled states, Orthogonal-state-based deterministic secure quantum communication without actual transmission of the message qubits, Quantum key distribution using sequential weak values, Two-step orthogonal-state-based protocol of quantum secure direct communication with the help of order-rearrangement technique, Two-step efficient quantum dialogue with three-particle entangled W state, A two-state entanglement based quantum single sign-on protocol, Security of a sessional blind signature based on quantum cryptograph, Dynamic quantum secret sharing protocol based on GHZ state, A practical protocol for three-party authenticated quantum key distribution, Multi-party quantum private comparison protocol with \(n\)-level entangled states, Reexamining the security of fair quantum blind signature schemes, Restricted attacks on semi-quantum key distribution protocols, Quantum identity authentication based on ping-pong technique without entanglements, Quantum oblivious transfer with relaxed constraints on the receiver, Semiquantum key distribution without invoking the classical party's measurement capability, A novel protocol for multiparty quantum key management, A new quantum blind signature with unlinkability, Quantum Boolean image denoising, A comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocols, Fault-tolerant controlled deterministic secure quantum communication using EPR states against collective noise, Quantum secure direct communication of digital and analog signals using continuum coherent states, Detecting relay attacks on RFID communication systems using quantum bits, Contexts, systems and modalities: a new ontology for quantum mechanics, A search for quantum coin-flipping protocols using optimization techniques, Quantum information capsule and information delocalization by entanglement in multiple-qubit systems, Twin-field quantum key distribution based on twisted photon, Statistics attack on ``quantum private comparison with a malicious third party and its improvement, Unconditionally secure multi-party quantum commitment scheme, Security analysis with improved design of post-confirmation mechanism for quantum sealed-bid auction with single photons, Arbitrated quantum signature of quantum messages with a semi-honest arbitrator, Semi-quantum dialogue based on single photons, An improved arbitrated quantum scheme with Bell states, Fiber optics protocols for quantum communication, Minimum disclosure proofs of knowledge, Density matrix in quantum mechanics and distinctness of ensembles having the same compressed density matrix, The limitations of nice mutually unbiased bases, New field of cryptography: DNA cryptography, The problem of mutually unbiased bases in dimension 6, Mutually orthogonal Latin squares and mutually unbiased bases in dimensions of odd prime power MOLS and mubs in odd prime power dimensions, An efficient protocol for the secure multi-party quantum summation, A new scheme on improving the performance of the quantum key distribution with two-intensity weak coherent light, A new quantum sealed-bid auction protocol with secret order in post-confirmation, Secure communication in the twin paradox, Multi-party quantum private comparison with an almost-dishonest third party, Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement, A scheme for secure quantum communication network with authentication using GHZ-like states and cluster states controlled teleportation, Comment on: ``Secure direct communication based on ping-pong protocol, Quantum cryptography beyond quantum key distribution, On the security of the ping-pong protocol, Extensible router for a quantum key distribution network, Scheme for assisted cloning an unknown arbitrary three-qubit state, On information-theoretic characterizations of physical theories, A protocol for quantum energy distribution, Bohmian trajectories and the ether: where does the analogy fail?, On local realism and commutativity, Quantum protocols for untrusted computations, Threshold quantum secure direct communication without entanglement, A multiparty quantum proxy group signature scheme for the entangled-state message with quantum Fourier transform, Multiparty quantum secure direct communication immune to collective noise, Quantum identity authentication without entanglement, Sequential quantum secret sharing in noisy environments, Secure quantum network coding based on quantum homomorphic message authentication, An improved multidimensional reconciliation algorithm for continuous-variable quantum key distribution, Two quantum protocols for secure Hamming distance computation, Quantum communication protocols as a benchmark for programmable quantum computers, Protection of quantum dialogue affected by quantum field, Maximally entangled states in discrete and Gaussian regimes, Derivative of the disturbance with respect to information from quantum measurements, Analysis of atmospheric effects on satellite-based quantum communication: a comparative study, Longer distance continuous variable quantum key distribution protocol with photon subtraction at the receiver, Two-party quantum key agreement over a collective noisy channel, New quantum key agreement protocols based on cluster states, A new \(n\)-party quantum secret sharing model based on multiparty entangled states, Quantum dialogue protocol with continuous-variable single-mode squeezed states, Practical covert quantum key distribution with decoy-state method, Cryptanalysis and improvement in controlled quantum dialogue using cluster states, Threshold proxy quantum signature scheme with threshold shared verification, Effect of quantum noise on deterministic joint remote state preparation of a qubit state via a GHZ channel, A noise immunity controlled quantum teleportation protocol, Classical-quantum arbitrarily varying wiretap channel: Ahlswede dichotomy, positivity, resources, super-activation, Two-party quantum key agreement against collective noise, Quantum homomorphic signature based on Bell-state measurement, Quantum private comparison based on \(\chi\)-type entangled states, Deterministic joint remote preparation of arbitrary four-qubit cluster-type state using EPR pairs, Multi-party quantum steganography, A quantum multi-proxy weak blind signature scheme based on entanglement swapping, Optimal symmetric ternary quantum encryption schemes, Efficient schemes of joint remote state preparation for two-qubit equatorial states, Cryptanalysis and improvement on ``Robust EPR-pairs-based quantum secure communication with authentication resisting collective noise, An anonymous surveying protocol via Greenberger-Horne-Zeilinger states, Cryptanalysis of controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad, Fault-tolerant remote quantum entanglement establishment for secure quantum communications, Robust quantum private queries, The modeling library of eavesdropping methods in quantum cryptography protocols by model checking, Multi-proxy strong blind quantum signature scheme, Deterministic joint remote preparation of a four-qubit cluster-type state via GHZ states, Sharing the quantum state and the classical information simultaneously, Semi-regular relative difference sets with large forbidden subgroups, D-concurrence bounds for pair coherent states, Decoy-state quantum key distribution for the heralded pair coherent state photon source with intensity fluctuations, Entanglement of dipolar coupling spins, Revisiting the security of secure direct communication based on ping-pong protocol, Quantum cryptography, Encryption of covert information into multiple statistical distributions, Why the quantum?, Intercept-resend-measure attack towards quantum private comparison protocol using genuine four-particle entangled states and its improvement, Analysis and improvement of large payload bidirectional quantum secure direct communication without information leakage, Secure quantum dialogue protocol based on four-qubit cluster state, Efficient entanglement concentration of nonlocal two-photon polarization-time-bin hyperentangled states, Multi-party measurement-device-independent quantum key distribution based on cluster states, Multiparty quantum English auction scheme using single photons as message carrier, Novel multi-party quantum key agreement protocol with G-like states and Bell states, Semi-quantum secure direct communication scheme based on Bell states, Anti-noise bidirectional quantum steganography protocol with large payload, Efficient bidirectional quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom, A quantum single sign-on protocol based on GHZ states, Dimension formula for induced maximal faces of separable states and genuine entanglement, Quantum key agreement protocols with four-qubit cluster states, Fault-tolerant authenticated quantum dialogue using logical Bell states, A real quantum designated verifier signature scheme, Secure direct communication based on ping-pong protocol, Teleportation as a quantum computation., Quantum model of computations: Underlying principles and achievements, Quantum mechanics is about quantum information, One-way functions imply secure computation in a quantum world, Quantum private magnitude comparison, A quantum public-key cryptosystem without quantum channels between any two users based on quantum teleportation, Efficient quantum dialogue using a photon in double degrees of freedom, A general access architecture for blockchain-based semi-quantum 6G wireless communication and its application, Multi-party semi-quantum key agreement protocol based on the four-qubit cluster states, Perfect state transfer in Grover walks between states associated to vertices of a graph, The Wigner function negative value domains and energy function poles of the polynomial oscillator, Effect of noise in the quantum bidirectional direct communication protocol using non-maximally entangled states, Multiparty multicast schemes for remote state preparation of complex coefficient quantum states via partially entangled channels, The influence of counter rotating terms on the entanglement dynamics of two dipole-coupled qutrits interacting with a two-mode field: intensity-dependent coupling approach, Authenticated QKD based on orthogonal states, A quantum aggregate signature scheme based on quantum teleportation using four-qubit cluster state, \((t,n)\) Threshold quantum secret sharing using rotation operation, Quantumness of pure-state ensembles via coherence of Gram matrix based on generalized \(\alpha\)-\(z\)-relative Rényi entropy, On mutually unbiased unitary bases in prime-dimensional Hilbert spaces, Quantum key agreement with Bell states and cluster states under collective noise channels, Quantum e-commerce: a comparative study of possible protocols for online shopping and other tasks related to e-commerce, Semi-quantum identification, Optimization parameter prediction-based XGBoost of TF-QKD, Efficient chain-encryption-based quantum signature scheme with semi-trusted arbitrator, Average measurement-dependent symmetric discord, Secure communications based on sending-or-not-sending strategy, An improved quantum network communication model based on compressed tensor network states, Measurement device-independent quantum secure direct communication with user authentication, Quantum secure two-party Euclidean distance computation based on mutually unbiased bases, Single-state multi-party semiquantum key agreement protocol based on multi-particle GHZ entangled states, Conditions that enable a player to surely win in sequential quantum games, A secure cross-chain transaction model based on quantum multi-signature, Mutual authentication quantum key agreement protocol based on Bell states, Quantum verifiable protocol for secure modulo zero-sum randomness, Several new constructions of mutually unbiased bases derived from functions over finite fields, Measurement-device-independent continuous variable semi-quantum key distribution protocol, Combating errors in propagation of orbital angular momentum modes of light in turbulent media, A privacy-preserving quantum sealed-bid auction protocol with EPR pairs, Conclusive multiparty quantum state sharing in amplitude-damping channel, Cheating identifiable \((k, n)\) threshold quantum secret sharing scheme, Security improvements for privacy-preserving quantum multiparty computation based on circular structure, Measurement-device-independent quantum key distribution with classical Bob and no joint measurement, Quantum public-key designated verifier signature, Cryptanalysis and improvement of a \((t, n)\) threshold group signature scheme, Bidirectional quantum teleportation using a five-qubit cluster state as a quantum channel, Teleportation of atomic external states on the internal degrees of freedom, Full separability of four-qubit GHZ and W mixed states in white noise, A secure quantum sealed-bid auction protocol based on quantum public key encryption, A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?, Quantum key distribution based on orthogonal state encoding, Leveraging the hardness of dihedral coset problem for quantum cryptography, Satellite-based phase-matching quantum key distribution, Quantum-assisted blockchain for IoT based on quantum signature, Afterpulse analysis for reference-frame-independent quantum key distribution, New quantum key agreement protocols based on Bell states, Process estimation in qubit systems: a quantum decision theory approach, Efficient semi-quantum private comparison using single photons, Three-party quantum secret sharing against collective noise, Security loopholes in the controlled quantum dialogue robust against conspiring users protocol, Multi-party quantum key agreement with four-qubit cluster states, Hierarchically controlling quantum teleportations, Linear optics-based entanglement concentration protocols for cluster-type entangled coherent state, Quantum multi-proxy blind signature based on cluster state, Quantum information transfer using weak measurements and any non-product resource state, Two-party secure semiquantum summation against the collective-dephasing noise, Efficient semiquantum key distribution based on single photons in both polarization and spatial-mode degrees of freedom, Security analysis and improvement of a semi-quantum private comparison protocol with three-particle G-like states, An efficient hybrid hash based privacy amplification algorithm for quantum key distribution, Multipartite mixed maximally entangled states: mixed states with entanglement 1, Estimating security of the quantum key distribution from the guesswork, Reference-frame-independent quantum key distribution with modified coherent states, Hide and seek with quantum resources: new and modified protocols for quantum steganography, Efficient generation protocol for the three-level logical entangled states, Quantum permutation pad for universal quantum-safe cryptography, Quantum private magnitude comparison based on maximum operation, Continuous variable controlled quantum conference, Efficient semiquantum key distribution without entanglement, High efficiency postprocessing for continuous-variable quantum key distribution: using all raw keys for parameter estimation and key extraction, High-dimensional quantum key distribution based on qudits transmission with quantum Fourier transform, Recovery from an eavesdropping attack on a qubit of a graph state, Individual attacks with generalized discrimination and inadequacy of some information measures, Modeling and simulation of practical quantum secure communication network, Multi-party quantum privacy comparison of size based on \(d\)-level GHZ states, Improving the performance of four-intensity decoy-state measurement-device-independent quantum key distribution via heralded pair-coherent sources, Quantum blind signature scheme for supply chain financial, Controlled secure direct quantum communication inspired scheme for quantum identity authentication, Multiparty quantum private comparison based on quantum walks, Provably secure arbitrated-quantum signature, Satellite-based continuous-variable quantum key distribution under the Earth's gravitational field, Multiparty blind quantum computation protocol with deterministic mutual identity authentication, Model checking for entanglement swapping, W-state-based semi-quantum private comparison, Quantum signature without classical private key, Verifiable multi-dimensional (t,n) threshold quantum secret sharing based on quantum walk, Ternary quantum key distribution protocol based on Hadamard gate, Quantum identity authentication scheme based on quantum walks on graphs with IBM quantum cloud platform, Quantum identity authentication based on round robin differencial phase shift communication line, Detector-device-independent quantum key agreement based on single-photon Bell state measurement, Novel controlled quantum dialogue protocols without information leakage, Three-party quantum secure direct communication protocol with adaptive capacity, An improved algorithm for computing hitting probabilities of quantum walks, An efficient semi-quantum private comparison protocol based on entanglement swapping of four-particle cluster state and Bell state, Multi-party quantum secret sharing protocol based on GHZ states entanglement swapping, Giffen paradoxes in quantum market games, Splitting information securely with entanglement, A new protocol and lower bounds for quantum coin flipping, Advanced unambiguous state discrimination attack and countermeasure strategy in a practical B92 QKD system, Clauser-Horne-Shimony-Holt versus three-party pseudo-telepathy: on the optimal number of samples in device-independent quantum private query, Multi-party quantum key agreement with five-qubit brown states, Recurrent neural network approach to quantum signal: coherent state restoration for continuous-variable quantum key distribution, Composable security of unidimensional continuous-variable quantum key distribution, Security of the Bennett-Brassard quantum key distribution protocol against collective attacks, Multi-party quantum private comparison based on the entanglement swapping of \(d\)-level cat states and \(d\)-level Bell states, Quantum private comparison employing single-photon interference, Authenticated semi-quantum key distribution protocol using Bell states, Quantum cryptography over non-Markovian channels, Quantum coordinated multi-point communication based on entanglement swapping, Semiquantum secure direct communication using EPR pairs, Comment on A practical protocol for three-party authenticated quantum key distribution, Quantum key agreement protocols with single photon in both polarization and spatial-mode degrees of freedom, Effect of noise on deterministic joint remote preparation of an arbitrary two-qubit state, Practical entanglement concentration of nonlocal polarization-spatial hyperentangled states with linear optics, Controller-independent bidirectional quantum direct communication, Analyses and improvement of a broadcasting multiple blind signature scheme based on quantum GHZ entanglement, Improved eavesdropping detection strategy in quantum direct communication protocol based on five-particle cluster state, Quantum private comparison based on GHZ entangled states, Improved QSDC protocol over a collective-dephasing noise channel, Comment on ``Quantum secure direct communication with authentication expansion using single photons, Common entanglement witnesses and their characteristics, Quantum communication with photon-added coherent states, Quantum secure direct communication with optimal quantum superdense coding by using general four-qubit states, Multi-party quantum secret sharing with the single-particle quantum state to encode the information, Quantum private comparison protocol with \(d\)-dimensional Bell states, Splitting a quantum secret without the assistance of entanglements, Efficient entanglement channel construction schemes for a theoretical quantum network model with \(d\)-level system, Security of ping-pong protocol based on pairs of completely entangled qudits, Controlled remote state preparation of arbitrary two and three qubit states via the Brown state, Public and private resource trade-offs for a quantum channel, Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue, Unified quantum no-go theorems and transforming of quantum pure states in a restricted set, Two-way QKD with single-photon-added coherent states, Quantum private comparison protocol based on the entanglement swapping between \(\chi ^+\) state and W-class state, Measurement device-independent quantum dialogue, Effect of quantum noise on deterministic remote state preparation of an arbitrary two-particle state via various quantum entangled channels, Experimental realization of quantum cheque using a five-qubit quantum computer, More circulant graphs exhibiting pretty good state transfer, Physical-layer security analysis of PSK quantum-noise randomized cipher in optically amplified links, Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing, Authenticated communication from quantum readout of pufs, Hierarchical joint remote state preparation in noisy environment, Quantum solution to a class of two-party private summation problems, Cryptanalysis and improvement of efficient quantum dialogue using entangled states and entanglement swapping without information leakage, The security problems in some novel arbitrated quantum signature protocols, Cryptanalysis and improvement of the semi-quantum secret sharing protocol, Fault-tolerant semiquantum key distribution over a collective-dephasing noise channel, Quantum teleportation and Grover's algorithm without the wavefunction, Deriving the correctness of quantum protocols in the probabilistic logic for quantum programs, Cryptanalysis and improvement of a quantum private set intersection protocol, Asymmetric quantum dialogue in noisy environment, New passive decoy-state quantum key distribution with thermal distributed parametric down-conversion source, Fundamental finite key limits for one-way information reconciliation in quantum key distribution, Hyperentanglement concentration for polarization-spatial-time-bin hyperentangled photon systems with linear optics, Parameter optimization in biased decoy-state quantum key distribution with both source errors and statistical fluctuations, Controlled bidirectional remote preparation of three-qubit state, Online evolution reconstruction from a single measurement record with random time intervals for quantum communication, Allowed region and optimal measurement for information versus disturbance in quantum measurements, Three-party quantum secure direct communication against collective noise, Implementation of quantum key distribution network simulation module in the network simulator NS-3, An improved proposal on the practical quantum key distribution with biased basis, Position-based coding and convex splitting for private communication over quantum channels, Improvements of quantum private comparison protocol based on cluster states, Security analysis of measurement-device-independent quantum key distribution in collective-rotation noisy environment, An efficient and secure arbitrary \(N\)-party quantum key agreement protocol using Bell states, Multi-party quantum key agreement without entanglement, Verifiable quantum encryption and its practical applications, Semi-quantum private comparison using single photons, Multiparty sealed-bid auction protocol based on the correlation of four-particle entangled state, Semi-quantum key distribution robust against combined collective noise, Semi-quantum key distribution protocols with GHZ states, New probabilistic quantum key distribution protocol, Multiparty quantum key agreement with four-qubit symmetric W state, Secure quantum communication scheme for six-qubit decoherence-free states, Measure-resend semi-quantum private comparison without entanglement, New quantum key distribution scheme based on random hybrid quantum channel with EPR pairs and GHZ states, A choreographed distributed electronic voting scheme, Offline arbitrated quantum blind dual-signature protocol with better performance in resisting existential forgery attack, An arbitrated proxy blind signature based on hyper entanglement analysis, Quantum identity authentication scheme of vehicular ad-hoc networks, Polarization-multiplexed quadrature amplitude modulation for continuous-variable quantum key distribution, Robust high capability QKD-based database private query, Multiparty quantum key agreement protocol with entanglement swapping, Analyzing and revising quantum dialogue without information leakage based on the entanglement swapping between any two Bell states and the shared secret Bell state, Multiparty quantum key agreement based on three-photon entanglement with unidirectional qubit transmission, Cryptanalysis and improvement of a multiparty quantum direct secret sharing of classical messages with Bell states and Bell measurements, Quantum bit commitment and the reality of the quantum state, Quantum-chaotic cryptography, Deterministic MDI QKD with two secret bits per shared entangled pair, Security of BB84 with weak randomness and imperfect qubit encoding, HILA5: on reliability, reconciliation, and error correction for Ring LWE encryption, Distributed quantum programming, Computing with quanta -- impacts of quantum theory on computation., PSPACE has constant-round quantum interactive proof systems, Rank two bipartite bound entangled states do not exist, High-dimensional deterministic multiparty quantum secret sharing without unitary operations, Quantum authenticated direct communication using Bell states, A quantum protocol for \((t,n)\)-threshold identity authentication based on Greenberger-Horne-Zeilinger states, Quantum private communication with an anonymous sender, Improving key rate of optical fiber quantum key distribution system based on channel tomography, Improved secure multiparty computation with a dishonest majority via quantum means, Quantum secure direct communication based on four-Qubit cluster states, Perspectives on entangled nuclear particle pairs generation and manipulation in quantum communication and cryptography systems, Comment on ``High-dimensional deterministic multiparty quantum secret sharing without unitary operations, Comment on quantum private comparison protocols with a semi-honest third party, Efficient quantum private comparison employing single photons and collective detection, Bipartite coherent-state quantum key distribution with strong reference pulse, Multi-party quantum key agreement with Bell states and Bell measurements, Multi-user private comparison protocol using GHZ class states, Tight bounds for the eavesdropping collective attacks on general CV-QKD protocols that involve non-maximally entanglement, Cryptanalysis of a new circular quantum secret sharing protocol for remote agents, Holographic quantum tasks with input and output regions, Multi-party traveling-mode quantum key agreement protocols immune to collusive attack, Cryptanalysis of secret sharing with a single \(d\)-level quantum system, Kak's three-stage protocol of secure quantum communication revisited: hitherto unknown strengths and weaknesses of the protocol, New scheme for measurement-device-independent quantum key distribution, Tunable multi-party high-capacity quantum key distribution based on \(m\)-generalized Fibonacci sequences using Golden coding, Two authenticated quantum dialogue protocols based on three-particle entangled states, Secure multi-party quantum summation based on quantum Fourier transform, Security of a single-state semi-quantum key distribution protocol, Two-party quantum key agreement protocols under collective noise channel, Establishing rational networking using the DL04 quantum secure direct communication protocol, Controlled mutual quantum entity authentication with an untrusted third party, Quantum conference, A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement, Self-assisted complete analysis of three-photon hyperentangled Greenberger-Horne-Zeilinger states with nitrogen-vacancy centers in microcavities, Implementation of a hybrid scheme for coherent plug-and-play quantum key distribution, Rational protocol of quantum secure multi-party computation, Decoherence can help quantum cryptographic security, Quantum-chaotic key distribution in optical networks: from secrecy to implementation with logistic map, Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution, Everlasting multi-party computation, Security proof for round-robin differential phase shift QKD, Multi-party quantum private comparison of size relation with \(d\)-level single-particle states, Monitoring the intercept-resend attack with the weak measurement model, The effect of quantum noise on two different deterministic remote state preparation of an arbitrary three-particle state protocols, Quantum key distribution with quantum walks, Comment on ``A novel quantum deniable authentication protocol without entanglement, X states of the same spectrum and entanglement as all two-qubit states, Decoy-state reference-frame-independent quantum key distribution with the single-photon-added coherent source, Construction of quantum gates for concatenated Greenberger-Horne-Zeilinger-type logic qubit, Quantum games: a review of the history, current state, and interpretation, A new multi-party quantum private comparison protocol based on circle model, Semi-quantum bi-signature scheme based on W states, Quantum privacy-preserving price E-negotiation, Annular controlled teleportation, New public-key quantum signature scheme with quantum one-way function, An axiomatization for quantum processes to unifying quantum and classical computing, Quantum anonymous voting protocol with the privacy protection of the candidate, Probabilistic process algebra to unifying quantum and classical computing in closed systems, Multiparty semi-quantum secret sharing with \(d\)-level single-particle states, A novel pure entangled state based two-party quantum private comparison protocol, Semi-quantum key agreement and private comparison protocols using Bell states, An efficient quantum sealed bidding auction scheme based on the correlation of genuine five-qubit entangled state, Improved entanglement-purification protocol using three Werner states and LOCC, Protecting single-photon entanglement with imperfect single-photon source, Trojan-horse attacks on quantum key distribution with classical bob, A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes, Efficient controlled quantum secure direct communication based on GHZ-like states, Controlled probabilistic quantum key distribution using a ground state, Private database queries using one quantum state, Quantum private information retrieval has linear communication complexity, A quantum dialogue protocol in discrete-time quantum walk based on hyperentangled states, Geometric Rényi divergence and its applications in quantum channel capacities, Schmidt rank constraints in quantum information theory, Efficient simulation of random states and random unitaries, Oblivious transfer is in MiniQCrypt, Quantum secure multi-party summation based on Grover's search algorithm, Efficient quantum private comparison based on entanglement swapping of Bell states, Quantum dialogue protocol based on Bell entangled states and single photons, Quantum secure direct communication with mutual authentication using a single basis, Multi-party quantum key agreement protocol with authentication, A lightweight semi-quantum E-payment protocol based on blockchain, New constructions for quantum money and its application, Dynamic multi-party quantum key agreement protocol based on commutative encryption, Leakage-resilient key exchange and two-seed extractors, Dual bounds for the positive definite functions approach to mutually unbiased bases, Combining quantum key distribution with chaotic systems for free-space optical communications, Necessary conditions on effective quantum entanglement catalysts, An efficient semi-quantum private comparison without pre-shared keys, Improved and practical proposal for measurement device independent quantum dialogue, Quantum teleportation of a \(N\)-qubit entangled state by using a \((N+1)\)-qubit cluster state, Construction of a family of positive but not completely positive map for the detection of bound entangled states, Semi-device-independent quantum key agreement protocol, A cost-effective quantum protocol for secure multi-party multiplication, Cluster-state-based quantum secret sharing for users with different abilities, Verifiable user quantum session key agreement protocol for smart home environment, Secure two-party integer comparison protocol without any third party, Quantum identity authentication in the orthogonal-state-encoding QKD system, Controlled SWAP attack and improved quantum encryption of arbitrated quantum signature schemes, Efficient quantum private comparison protocol based on the entanglement swapping between four-qubit cluster state and extended Bell state, Zero transfer in continuous-time quantum walks, Quantum protocols for secure multi-party summation, Error correction in quantum cryptography based on artificial neural networks, Creating photonic GHZ and W states via quantum walk, Enhancing the performance of the measurement-device-independent quantum key distribution with heralded pair-coherent sources, Controlled dense coding using generalized GHZ-type state in a noisy network, Improvement of information leakage resistant quantum dialogue with single photons in both polarization and spatial-mode degrees of freedom, Private comparison protocol for multiple semi-quantum users based on Bell states, Controlled quantum secure direct communication with authentication based on quantum search algorithm, Effects of quantum noises on \(\chi\) state-based quantum steganography protocol, Measurement-device-independent quantum key agreement against collective noisy channel, Quantum \((t,n)\) threshold proxy blind signature scheme based on Bell states, Multi-party quantum key agreement protocol for detection of collusive attacks in each sub-circle segment by headers, Mutually unbiased maximally entangled bases in tripartite quantum systems, Deterministic secure quantum communication against collective noise, Analysis of a tripartite entanglement distribution switch, Device independent quantum key distribution using three-party pseudo-telepathy, Generalized approach for analysing quantum key distribution experiments, Improvements on: ``Multi-party quantum key agreement protocol with Bell states and single particles, Unidimensional continuous-variable quantum key distribution based on basis-encoding coherent states protocol, Quantum private comparison protocol based on four-particle GHZ states, Two-qubit quantum state sharing protocol based on Bell state, Two semi-quantum key distribution protocols with G-like states, The three-party quantum key agreement protocol with quantum Fourier transform, Three-party quantum key injection scheme with W states, Semi-quantum private query protocol without invoking the measurement capability of classical user, Quantum protocol for privacy preserving Hamming distance problem of DNA sequences, Analyzing and improving the secure quantum dialogue protocol based on four-qubit cluster state, Multi-party semi-quantum secure direct communication protocol with cluster states, Improvement of high-capacity three-party quantum secret sharing with single photons in both the polarization and the spatial-mode degrees of freedom, Multi-secret sharing model based on Hermite interpolation polynomial and quantum graph state, On well-founded and recursive coalgebras, Entropy accumulation, Reference-frame-independent quantum key distribution in uplink and downlink free-space channel, Multi-user quantum private query protocol, Quantum science and quantum technology, Being a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitives, Holographic scattering requires a connected entanglement wedge, Unambiguous discrimination of nonorthogonal entangled quantum states in cavity QED, Non-classicality created by quantum channels with indefinite causal order, Verifying quantum communication protocols with ground bisimulation, A framework for quantum-classical cryptographic translation, Quantum secure multiparty summation based on the phase shifting operation of \(d\)-level quantum system and its application, Quantum key agreement protocol based on quantum search algorithm, A one-round quantum mutual authenticated key agreement protocol with semi-honest server using three-particle entangled states, A novel practical quantum secure direct communication protocol, Multi-party quantum key distribution protocol with new Bell states encoding mode, Electronic voting scheme based on a quantum ring signature, Quantum spin half algebra and generalized Megrelishvili protocol for confidentiality of digital images, Quantum correlations through spin coherent states, Quantum key agreement via non-maximally entangled cluster states, Bidirectional controlled quantum teleportation via two pairs of Bell states, Two-party quantum private comparison with four-particle entangled states, Controlled bidirectional quantum secure direct communication with six-qubit entangled states, Gram matrices of mixed-state ensembles, Semi-quantum mutual identity authentication using Bell states, Controlled quantum dialogue with five-qubit entangled states, Quasi-deterministic secure quantum communication using non-maximally entangled states, Verifiable quantum key exchange with authentication, On eavesdropping strategy for symmetric coherent states quantum cryptography using heterodyne measurement, Models of quantum computation and quantum programming languages, On the measurement basis choice for the detection of intercept-resend attack towards the transmission of GHZ states, Designing secure quantum key agreement protocols against dishonest participants, Improvement on `Multiparty quantum key agreement with four-qubit symmetric W state', Strong privacy-preserving two-party scalar product quantum protocol, A relational time-symmetric framework for analyzing the quantum computational speedup, A secret information preservation scheme based on four-qubit entangled state, Security analysis of particular quantum proxy blind signature against the forgery attack, Tripartite layered quantum key distribution scheme with a symmetrical key structure, Fault tolerant multi-party authenticated quantum conference against collective noise, Identity-based quantum designated verifier signature, Speech encryption algorithm based on nonorthogonal quantum state with hyperchaotic keystreams, Key establishment à la Merkle in a quantum world, Quantum computing: survey and analysis, A novel quantum group proxy blind signature scheme based on five-qubit entangled state, A proxy blind signature scheme of quantum information transmission in two-particle state, Practical security analysis of self-referenced CV-QKD system in the presence of polarization aberration, Multi-party quantum key distribution protocol without information leakage, High-efficiency three-party quantum key agreement protocol with quantum dense coding and Bell states, Multiparty quantum computation for summation and multiplication with mutually unbiased bases, Two semi-quantum direct communication protocols with mutual authentication based on Bell states, An efficient quantum private query protocol based on oracle and Grover iteration, A multi-party quantum key agreement protocol based on Shamir's secret sharing, Cryptanalysis and improvement of some quantum proxy blind signature schemes, A quantum sealed auction protocol based on secret sharing, Quantum Byzantine agreement with tripartite entangled states, Multi-party quantum key agreement protocol with Bell states and single particles, Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party, Quantum information: a brief overview and some mathematical aspects, Novel quantum encryption algorithm based on multiqubit quantum shift register and Hill cipher, Improved deterministic \(N\)-to-one joint remote preparation of an arbitrary qubit via EPR pairs, Cryptanalysis of a quantum proxy weak blind signature scheme, Fault-tolerant quantum secure direct communication protocol based on decoherence-free states, High-efficiency atomic entanglement concentration for quantum communication network assisted by cavity QED, Relativistic quantum private database queries, Toward secure communication using intra-particle entanglement, Quantum multi-party private comparison protocol using \(d\)-dimensional Bell states, A four-state entanglement based quantum single sign-on protocol, Symplectic spreads, planar functions, and mutually unbiased bases, Two-layer quantum key distribution, Quantum private comparison with a malicious third party, An arbitrated quantum signature protocol based on the chained CNOT operations encryption, A novel quantum deniable authentication protocol without entanglement, Efficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: different alternative approaches, Two-party quantum private comparison with five-qubit entangled states, A novel quantum proxy blind signature scheme, Pretty good state transfer on circulant graphs, The quantum steganography protocol via quantum noisy channels, Novel quantum proxy signature without entanglement, An efficient scheme of quantum wireless multi-hop communication using coefficient matrix, Experimental quantum cryptography., Quantum symmetrically-private information retrieval, Modulated entanglement evolution via correlated noises, Analysis of counterfactual quantum certificate authorization, Quantum private comparison protocol with linear optics, Multi-photon self-error-correction hyperentanglement distribution over arbitrary collective-noise channels, Cryptanalysis on authenticated semi-quantum key distribution protocol using Bell states, Schemes generating entangled states and entanglement swapping between photons and three-level atoms inside optical cavities for quantum communication, Refined entanglement concentration for electron-spin entangled cluster states with quantum-dot spins in optical microcavities, Quantum image processing?, Classical-quantum arbitrarily varying wiretap channel: common randomness assisted code and continuity, Teleportation-based continuous variable quantum cryptography, An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption, On ``A new quantum blind signature with unlinkability, Using Bernstein-Vazirani algorithm to attack block ciphers, Authenticated semi-quantum key distribution without entanglement, Quantum designated verifier signature based on Bell states, Supervised learning with a quantum classifier using multi-level systems, Semi-quantum cryptography, Two-party quantum key agreement against collective noisy channel, Practical quantum digital signature with configurable decoy states, High-capacity (2,3) threshold quantum secret sharing based on asymmetric quantum lossy channels, Efficient and secure dynamic quantum secret sharing protocol based on Bell states, Arbitrated quantum signature scheme with quantum teleportation by using two three-qubit GHZ states, The performance of three-intensity decoy-state measurement-device-independent quantum key distribution, Quantum anonymous ranking and selection with verifiability, Simple analysis of security of the BB84 quantum key distribution protocol, Semi-quantum private comparison based on Bell states, Quantum teleportation with mutually unbiased bases, Continuous variable direct secure quantum communication using Gaussian states, Controller-independent quantum bidirectional communication using non-maximally entangled states, Coding in the entanglement domain, Quantum sampling and entropic uncertainty, A generic quantum protocol for one-sided secure two-party classical computations, Information hiding method based on quantum image by using Bell states, Quantum key distribution with no shared reference frame, Decoy-state round-robin differential-phase-shift quantum key distribution with source errors, Predicting optimal parameters with random forest for quantum key distribution, Quantum algorithm for solving hyperelliptic curve discrete logarithm problem, Efficient semi-quantum private comparison without using entanglement resource and pre-shared key, Measure-resend authenticated semi-quantum key distribution with single photons, Improvements on: ``Secure multi-party quantum summation based on quantum Fourier transform, Correlance and discordance: computable measures of nonlocal correlation, Finite-key security analysis of the 1-decoy state QKD protocol with a leaky intensity modulator, Asymptotic security analysis of teleportation-based quantum cryptography, On the continuity of quantum correlation quantifiers, Quantum mutual information and quantumness vectors for multiqubit systems, A unitary operator construction solution based on Pauli group for maximal dense coding with a class of symmetric states, Quantum public-key signature scheme based on asymmetric quantum encryption with trapdoor information, Comments on the ``Efficient quantum multi-proxy signature, Quantum multiparty cryptosystems based on a homomorphic random basis encryption, Quantum direct communication protocols using discrete-time quantum walk, Nonclassical photon statistics and bipartite entanglement generation of excited coherent states, Comprehensive high-speed reconciliation for continuous-variable quantum key distribution, Improved multiparty quantum private comparison based on quantum homomorphic encryption, Qutrit-based semi-quantum key distribution protocol, The phase matching quantum key distribution protocol with 3-state systems, Bidirectional teleportation for underwater quantum communications, Security analysis and improvement of a quantum multi-signature protocol, Prefixed-threshold real-time selection for correlated turbulent channel model for quantum key distribution with modulating retro-reflectors, High-dimensional measurement-device-independent quantum secure direct communication, Decoherence of a two-level system in a coherent superposition of two dephasing environments, Quantum public-key encryption schemes based on conjugate coding, Multiple-pulse phase-matching quantum key distribution, A novel three-party quantum secret sharing scheme based on Bell state sequential measurements with application in quantum image sharing, Multiparty simultaneous quantum identity authentication with secret sharing, Entanglement of the antisymmetric state, Improving the security of arbitrated quantum signature against the forgery attack, Expansible quantum secret sharing network, Improvements on ``multiparty quantum key agreement with single particles, Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels, The general theory of three-party quantum secret sharing protocols over phase-damping channels, Introduction to special issue on quantum cryptography, Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise, Asymmetric ``4+2 protocol for quantum key distribution with finite resources, Cheat sensitive quantum bit commitment via pre- and post-selected quantum states, Measure-and-resend attack and improvement on ``A scheme to share information via employing discrete algorithm to quantum states, High-capacity quantum summation with single photons in both polarization and spatial-mode degrees of freedom, Long term confidentiality: a survey, Quantum private comparison of equality protocol without a third party, Quantum secret sharing for general access structures based on multiparticle entanglements, The correlation conversion property of quantum channels, An arbitrated quantum signature scheme with fast signing and verifying, Quantum key agreement with EPR pairs and single-particle measurements, Trojan horse attack free fault-tolerant quantum key distribution protocols, Optimal multipartite entanglement concentration of electron-spin states based on charge detection and projection measurements, Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes, Key-leakage evaluation of authentication in quantum key distribution with finite resources, Checking noise correlations for safer two-way quantum key distribution, Probabilistic bisimulations for quantum processes, A novel quantum group signature scheme without using entangled states, Applications of quantum cryptographic switch: various tasks related to controlled quantum communication can be performed using Bell states and permutation of particles, A quantum optical firewall based on simple quantum devices, Two quantum direct communication protocols based on quantum search algorithm, Quantum Cryptography over Underground Optical Fibers, Quantum Key Distribution and String Oblivious Transfer in Noisy Channels, Single-photon sources–an introduction, Quantum group signature scheme based on controlled quantum teleportation, Quantum cryptography: Theoretical protocols for quantum key distribution and tests of selected commercial QKD systems in commercial fiber networks, Unconditional security in quantum cryptography, Unnamed Item, Turing, ciphers and quanta, Counterfactual quantum cryptography network with untrusted relay, Model-Checking Linear-Time Properties of Quantum Systems, Multidimensional Bell Inequalities and Quantum Cryptography, Computational Security of Quantum Encryption, Efficient Simulation for Quantum Message Authentication, A Practical Fuzzy Extractor for Continuous Features, A game-theoretic security framework for quantum cryptography: performance analysis and application, Novel reconciliation protocol based on spinal code for continuous-variable quantum key distribution, Relaxation process of a two-level system in a coherent superposition of two environments, Security analysis of measurement-device-independent quantum secure direct communication, Entangled states as robust and re-usable carriers of information, A novel coherence-based quantum steganalysis protocol, Ping-pong quantum key distribution with trusted noise: non-Markovian advantage, Searching for optimal quantum secret sharing scheme based on local distinguishability, Continuous variable B92 quantum key distribution protocol using single photon added and subtracted coherent states, Semi-quantum-honest key agreement scheme with three-particle entangled states in cross-realm setting, An efficient quantum identity authentication key agreement protocol without entanglement, Practical source-independent quantum random number generation with detector efficiency mismatch, Measurement-device-independent quantum dialogue based on hyperentanglement, Novel encoding-decoding procedure for quantum key distribution, Fault-tolerant blind quantum computing using GHZ states over depolarization channel, Quantum algorithm for quantum state discrimination via partial negation and weak measurement, Plug-and-play sending-or-not-sending twin-field quantum key distribution, Comment on: ``Controlled quantum secure direct communication with authentication protocol based on five-particle cluster state and classical XOR operation, Analysis of a high-dimensional extended B92 protocol, Contextuality-based quantum conferencing, Controlled quantum teleportation based on quantum walks, Phase-matching quantum key distribution based on heralded pair-coherent source, Optimized exploration of quantum circuits space based on sub-circuits equivalences, A class of protocols for multi-party quantum private comparison based on traveling mode, Mediated semi-quantum secure direct communication, Quantum network coding without loss of information, An improved QKD protocol without public announcement basis using periodically derived basis, A note on ``New quantum key agreement protocols based on Bell states, Quantum-based anonymity and secure veto, Comment on ``Protection of quantum dialogue affected by quantum field, Quantum dialogue mediated by EPR-type entangled coherent states, A quantum voting protocol using single-particle states, Device-independent quantum key distribution using random quantum states, Two schemes for generating four-photon cluster states based on quantum dot microcavity coupling systems, Quantum memories and error correction, A novel dynamic quantum secret sharing in high-dimensional quantum system, Feasible noiseless linear amplification for single-photon qudit and two-photon hyperentanglement encoded in three degrees of freedom, An optimal quantum error-correcting procedure using quantifier elimination, Efficient circular controlled quantum teleportation and broadcast schemes in the presence of quantum noises, One-round semi-quantum-honest key agreement scheme in MSTSA structure without entanglement, A novel quantum E-payment protocol based on blockchain, Improved statistical fluctuation analysis for twin-field quantum key distribution, Finite-key analysis of sending-or-not-sending twin-field quantum key distribution with intensity fluctuations, Quantum summation using \(d\)-level entanglement swapping, Quantum Bell states-based anonymous voting with anonymity trace, Entanglement-based quantum key distribution with untrusted third party, Quantum private comparison of size using \(d\)-level Bell states with a semi-honest third party, Detector blinding attacks on counterfactual quantum key distribution, Discrete-phase-randomized twin-field quantum key distribution without phase postselection in the test mode, Multi-party quantum summation without a third party based on \(d\)-dimensional Bell states, Information leakage resistant quantum dialogue with single photons in both polarization and spatial-mode degrees of freedom, Optimal quantum state transformations based on machine learning, An efficient semi-quantum secret sharing protocol of specific bits, Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security, A practical quantum designated verifier signature scheme for E-voting applications, Cryptanalysis and improvement of a semi-quantum private comparison protocol based on Bell states, Quantum secure multi-party summation protocol based on blind matrix and quantum Fourier transform, A novel quantum identity authentication protocol without entanglement and preserving pre-shared key information, Practical efficient 1-out-of-n quantum oblivious transfer protocol, Measurement-device-independent three-party quantum secure direct communication, Statistical fluctuation analysis for decoy-state quantum secure direct communication, Quantum entanglement versus skew information correlations in dipole-dipole system under KSEA and DM interactions, Secure software leasing without assumptions, An efficient controlled quantum secure direct communication and authentication by using four particle cluster states, Protocols for quantum binary voting, Unnamed Item, Geometry of the set of synchronous quantum correlations, Quantum walk public-key cryptographic system, Secure N-dimensional simultaneous dense coding and applications, Quantum direct communication protocol strengthening against Pavičić’s attack, Passive Decoy State Quantum Key Distribution, Efficiency of the Eavesdropping in B92 QKD Protocol with a QCM, Security of direct communication quantum channel with feedback, A Simpler Proof of the Existence of Quantum Weak Coin Flipping with Arbitrarily Small Bias, Authenticated multi-user quantum key distribution with single particles, Two-party quantum key agreement based on four-particle GHZ states, Homotopes of finite-dimensional algebras, Circular Semi-Quantum Secret Sharing Using Single Particles, Information Processing in Convex Operational Theories, Classical Knowledge for Quantum Security, Graphical Calculus for Quantum Key Distribution (Extended Abstract), Violation of Bell’s inequalities in a quantum realistic framework, Secure quantum communication with orthogonal states, Several foundational and information theoretic implications of Bell’s theorem, A New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public Keys, Classical Knowledge for Quantum Cryptographic Reasoning, Computational quantum key distribution (CQKD) on decentralized ledger and blockchain, Semantic security for quantum wiretap channels, Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange, Generalized XOR non-locality games with graph description on a square lattice, Passive decoy state phase matching quantum key distribution, Urban QKD test for phase and polarization encoding devices, Generalized polarization measurement and its connection with information energy, Cryptographic properties of the quantum hashing based on expander graphs, Encrypt me! A game-based approach to Bell inequalities and quantum cryptography, Recent advances in room temperature single-photon emitters, Quantum secure direct communication against collective noise based on W states, Significance of Bell states over four-qubit entangled states in quantum bidirectional direct communication protocols, Asymptotically optimal prepare-measure quantum key distribution protocol, Quantum attribute-based encryption: a comprehensive study, Semi-quantum ring signature protocol based on multi-particle GHZ state, On restoring a quantum state after the measurement, On postselective modifications of quantum observables, Exploring causality in braneworld/cutoff holography via holographic scattering, Parameter optimization in decoy-state phase-matching quantum key distribution, Significance of controller independent Bell state-based communication protocol, Quantum private comparison protocol based on multiple GHZ states in cross-domain environment, The hyperentanglement-based quantum secure direct communication protocol with single-photon measurement, Research on quantum dialogue protocol based on the HHL Algorithm, Two intercept-and-resend attacks on a bidirectional quantum secure direct communication and its improvement, Enhanced quantum private comparison, Machine learning with neural networks for parameter optimization in twin-field quantum key distribution, Three-party authenticated lightweight quantum key distribution without pre-shared key between participants, The feasible hyper-encoding measurement-device-independent deterministic secure quantum communication protocol, Physical Limitations of Quantum Cryptographic Primitives or Optimal Bounds for Quantum Coin Flipping and Bit Commitment, Analysis of Boolean functions related to binary input binary output two-party nonlocal games, Semi-quantum key distribution using qudit systems and security proof, Unnamed Item, Asymmetric quantum codes with high code rates, Blind reconciliation based on inverse encoding of polar codes with adaptive step sizes for quantum key distribution, On the origin of nonclassicality in single systems, Quantum key distribution without the wavefunction, An asymmetric dynamic multiparty quantum secret sharing against active attacks, Quantum secret sharing with identity authentication based on Bell states, Quantum cryptography: Protecting our future networks with quantum mechanics, A quantum key distribution scheme based on tripartite entanglement and violation of CHSH inequality, Multi-party quantum summation without a trusted third party based on single particles, An efficient circle-type multiparty quantum key agreement protocol with single particles, Continuous variable controlled quantum dialogue and secure multiparty quantum computation, Measurement-device-independent quantum private query with qutrits, Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment, Modeling tripartite entanglement in quantum protocols using evolving entangled hypergraphs, Quantum Cryptography: Key Distribution and Beyond, Is Schrödinger's Cat Alive?, Simple and Tight Device-Independent Security Proofs, Converse bounds for quantum and private communication over Holevo–Werner channels, Nondeterministic noiseless amplification via non-symplectic phase space transformations, Two-way quantum key distribution in a uniformly distributed quantum space via a special mapping and its analytical security proofs, High-dimensional quantum key distribution using polarization-phase encoding: security analysis, Analysis of achievable distances of BB84 and KMB09 QKD protocols, Критерии секретности ключа, Quantum Key Distribution, Attack Strategies on QKD Protocols, Unconditionally secure quantum bit commitment based on the uncertainty principle, Necessary and sufficient conditions on measurements of quantum channels, Measurement-Based and Universal Blind Quantum Computation, Symbolic Bisimulation for Quantum Processes, A Less Known Side of Quantum Cryptography, Entanglement-assisted private communication over quantum broadcast channels, Preface, Preface, Error Thresholds for Arbitrary Pauli Noise, Passive attack to the controlled secure direct communication with seven-qubit entangled states protocol, David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware, Knapsack encoding for secured quantum key distribution protocol, Controlled quantum dialogue scheme based on different unspecific two-particle entangled state, A two-dimensional quantum key distribution protocol based on polarization-phase encoding, Participant attack and improving dynamic quantum secret sharing using d-dimensional GHZ state, Controlled bidirectional quantum secure direct communication protocol based on Grover’s algorithm, Efficient arbitrated quantum signature scheme without entangled states, Quantum cryptography, Two efficient measurement device independent quantum dialogue protocols, Cryptanalysis and improvement of Wu–Cai–Wu–Zhang’s quantum private comparison protocol, Security analysis of KXB10 QKD protocol with higher-dimensional quantum states, Cryptanalysis and improvement of the robust quantum dialogue protocols based on the entanglement swapping between any two logical Bell states and the shared auxiliary logical Bell state, Semiquantum secure direct communication with authentication based on single-photons, Multi-party quantum summation with a single d-level quantum system, Model Checking Omega-regular Properties for Quantum Markov Chains, Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network, Intercept/resend and translucent attacks on the quantum key distribution protocol based on the pre- and post-selection effect, Performance of reference-frame-independent quantum key distribution in underwater channel, Ququats as superposition of coherent states and their application in quantum information processing, Quantum cryptography based on Bell’s theorem, Unnamed Item, Unnamed Item, Some Open Problems in Information-Theoretic Cryptography, Pretty good state transfer on Cayley graphs over semi-dihedral groups, Environmental Effects on Nonlocal Correlations, Entanglement classification with algebraic geometry, Comment on ``Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise, Quantum private comparison protocol without a third party, Quantum Authentication and Encryption with Key Recycling, Quantum Authentication with Key Recycling, Quantum Key Recycling with 8-state encoding (The Quantum One-Time Pad is more interesting than we thought), Two-party quantum key agreement with five-particle entangled states, High-capacity quantum key distribution based on hyperentangled Bell states and hyper-encoding, Simple proof of security of the multiparty prepare and measure QKD, Semi-quantum secure direct communication against collective-dephasing noise, Cryptography from pseudorandom quantum states, Quantum commitments and signatures without one-way functions, Resource-saving quantum key distribution based on three-photon matrix product states, On the impossibility of key agreements from quantum random oracles, Performance of passive decoy-state quantum key distribution with mismatched local detectors, Quantum private comparison protocol based on 4D GHZ-like states, A secure centralized multi-party quantum key distribution protocol with new encoding mode, Spectral distribution of random matrices from mutually unbiased bases, Role of Steering Inequality in Quantum Key Distribution Protocol, Collusion resistant copy-protection for watermarkable functionalities, The asymmetric quantum cloning region, De Finetti theorems for quantum conditional probability distributions with symmetry, A quantum blockchain-enabled framework for secure private electronic medical records in Internet of medical things, General properties of quantum bit commitments (extended abstract), Public key encryption with secure key leasing, Hybrid bidirectional quantum communication protocol of two single-qubit states under noisy channels with memory, Quantum mutual implicit authentication key agreement protocol without entanglement with key recycling, Quantum designated multi-verifier signature, Quantum computationally predicate-binding commitments with application in quantum zero-knowledge arguments for NP, Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication, A quantum dialogue reduced by half unitary operations, Multiparty semiquantum key agreement with \(d\)-level single-particle states, Information leakage in a tree-type multiparty quantum key agreement protocol against collusive attacks, Quantum key distribution over noisy channels by the testing state method, Security loophole and improvement of quantum private query protocol based on W state, Quantum designated verifier signature scheme with semi-trusted third-party, Efficient multiparty quantum private comparison protocol based on single photons and rotation encryption, Multi-user semi-device independent quantum private query, Security analysis for single-state circular mediated semi-quantum key distribution, Quantifying the information distribution of quantum information masking, Quantum and semi-quantum lottery: strategies and advantages, Quantum key distribution scheme with key recycling in integrated optical network, Quantum and semi-quantum key distribution in networks, Security analysis and improvement of a blind semi-quantum signature, Perfect quantum state transfer on Cayley graphs over dicyclic groups, Categorical composable cryptography, Efficient fault-tolerant quantum dialogue protocols based on dictionary encoding without decoy photons, A dialogue protocol of quantum communication network based on cluster states, Quantum designated verifier signature without third party, Three-party quantum key agreement protocol based on logical four-particle cluster state to resist collective noise, A quantum key distribution on qudits using quantum operators, On the complete description of entangled systems. I: Exploring hidden variables and context communication cost in simulating quantum correlations, Cloning games: a general framework for unclonable primitives, Publicly-verifiable deletion via target-collapsing functions, Cryptography with certified deletion, Secure computation with shared EPR pairs (or: how to teleport in zero-knowledge), Unnamed Item



Cites Work