A practical protocol for three-party authenticated quantum key distribution
From MaRDI portal
Publication:488178
DOI10.1007/S11128-014-0767-1zbMATH Open1305.81063OpenAlexW2063077266MaRDI QIDQ488178FDOQ488178
Authors: Yong-Cai Geng, Sumit K. Garg
Publication date: 23 January 2015
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-014-0767-1
Recommendations
- Comment on A practical protocol for three-party authenticated quantum key distribution
- A novel three-party mutual authentication quantum key agreement protocol with GHZ states
- Three-party authenticated lightweight quantum key distribution without pre-shared key between participants
- The three-party quantum key agreement protocol with quantum Fourier transform
- Three-party semi-quantum key agreement protocol
- Three-party quantum privacy comparison protocol based on classical-quantum authentication channel
- A one-round quantum mutual authenticated key agreement protocol with semi-honest server using three-particle entangled states
- Three-dimensional quantum key distribution in the presence of several eavesdroppers
quantum cryptographyquantum key distributionprovable securitystandard problem reductionthree-party key distribution protocol
Cites Work
- Quantum cryptography based on Bell’s theorem
- Error Correcting Codes in Quantum Theory
- Quantum cryptography: public key distribution and coin tossing
- New hash functions and their use in authentication and set equality
- Universal classes of hash functions
- Quantum cryptography without public announcement of bases
- Experimental quantum cryptography.
- Unconditional security in quantum cryptography
- UNITARY OPERATOR BASES
- Quantum cryptography using any two nonorthogonal states
- Generalized privacy amplification
- Quantum cryptography
- Theory of Cryptography
- The random oracle methodology, revisited.
- Privacy Amplification by Public Discussion
- Theory of Cryptography
- Security of quantum key distribution against all collective attacks
- Eavesdropper's optimal information in variations of Bennett-Brassard 1984 quantum key distribution in the coherent attacks
- A proof of the security of quantum key distribution
- On the power of two-party quantum cryptography
- Quantum key evolution and its applications
Cited In (12)
- Three-party quantum privacy comparison protocol based on classical-quantum authentication channel
- An efficient quantum scheme for private set intersection
- A one-round quantum mutual authenticated key agreement protocol with semi-honest server using three-particle entangled states
- A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement
- An efficient quantum identity authentication key agreement protocol without entanglement
- Semi-quantum-honest key agreement scheme with three-particle entangled states in cross-realm setting
- High-efficiency three-party quantum key agreement protocol with quantum dense coding and Bell states
- A novel quantum dragonfly multi-key exchange protocol beyond conventional attacks
- Three-Party Quantum Key Agreement Protocol Based on Continuous Variable Single-Mode Squeezed States*
- Comment on: ``Controlled mutual quantum entity authentication with an untrusted third party
- The quantum secret sharing schemes based on hyperstar access structures
- Comment on A practical protocol for three-party authenticated quantum key distribution
This page was built for publication: A practical protocol for three-party authenticated quantum key distribution
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q488178)