Restricted attacks on semi-quantum key distribution protocols
From MaRDI portal
Publication:488185
DOI10.1007/S11128-014-0802-2zbMath1305.81064OpenAlexW2050618241MaRDI QIDQ488185
Publication date: 23 January 2015
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-014-0802-2
Related Items (34)
Security of a semi-quantum protocol where reflections contribute to the secret key ⋮ Semi-quantum digital signature protocol based on Einstein–Podolsky–Rosen steering ⋮ Semi-quantum dialogue based on single photons ⋮ Semiquantum secure direct communication using EPR pairs ⋮ Semi-quantum cryptography ⋮ Semi-quantum private comparison based on Bell states ⋮ Advanced semi-quantum secure direct communication protocol based on Bell states against flip attack ⋮ Efficient and secure semi-quantum secure direct communication protocol against double CNOT attack ⋮ Multi‐Party Semi‐Quantum Key Distribution Protocol With Four‐Particle Cluster States ⋮ Three Attacks on the Mediated Semi‐Quantum Key Distribution without Invoking Quantum Measurement ⋮ Efficient semi-quantum private comparison without using entanglement resource and pre-shared key ⋮ Two semi-quantum key distribution protocols with G-like states ⋮ Semi-quantum key distribution using qudit systems and security proof ⋮ Qutrit-based semi-quantum key distribution protocol ⋮ Semi-quantum private comparison protocol of size relation with \(d\)-dimensional Bell states ⋮ Security analysis for single-state circular mediated semi-quantum key distribution ⋮ Three-party semi-quantum protocol for deterministic secure quantum dialogue based on GHZ states ⋮ Cryptanalysis and improvement of the semi-quantum secret sharing protocol ⋮ Fault-tolerant semiquantum key distribution over a collective-dephasing noise channel ⋮ Semi-quantum key distribution with single photons in both polarization and spatial-mode degrees of freedom ⋮ Single-state semi-quantum key distribution protocol and its security proof ⋮ Semiquantum key distribution without invoking the classical party's measurement capability ⋮ Semi-quantum key distribution protocols with GHZ states ⋮ Measure-resend semi-quantum private comparison without entanglement ⋮ Security of a single-state semi-quantum key distribution protocol ⋮ Quantum key distribution with quantum walks ⋮ Multiparty semi-quantum secret sharing with \(d\)-level single-particle states ⋮ Three-party semi-quantum key agreement protocol ⋮ Circular Semi-Quantum Secret Sharing Using Single Particles ⋮ Quantum and semi-quantum blind signature schemes based on entanglement swapping ⋮ Efficient mediated semi-quantum key distribution ⋮ Semi-quantum identification ⋮ Efficient semi-quantum private comparison using single photons ⋮ Efficient semiquantum key distribution without entanglement
Cites Work
- Unnamed Item
- Eavesdropping in semiquantum key distribution protocol
- Quantum cryptography: public key distribution and coin tossing
- Authenticated semi-quantum key distribution protocol using Bell states
- Semiquantum key distribution
- Quantum Key Distribution with Classical Bob
- RELATION BETWEEN INFORMATION AND DISTURBANCE IN QUANTUM KEY DISTRIBUTION PROTOCOL WITH CLASSICAL ALICE
- SEMIQUANTUM SECRET SHARING USING TWO-PARTICLE ENTANGLED STATE
- Quantum secret sharing with classical Bobs
- QUANTUM KEY DISTRIBUTION WITH CLASSICAL ALICE
- EFFICIENT KEY CONSTRUCTION ON SEMI-QUANTUM SECRET SHARING PROTOCOLS
This page was built for publication: Restricted attacks on semi-quantum key distribution protocols