Restricted attacks on semi-quantum key distribution protocols
From MaRDI portal
Publication:488185
DOI10.1007/S11128-014-0802-2zbMATH Open1305.81064OpenAlexW2050618241MaRDI QIDQ488185FDOQ488185
Authors: Walter O. Krawec
Publication date: 23 January 2015
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-014-0802-2
Recommendations
- Security of a single-state semi-quantum key distribution protocol
- Single-state semi-quantum key distribution protocol and its security proof
- Semiquantum key distribution
- Semi-quantum key distribution protocols with GHZ states
- Semi-quantum key distribution with single photons in both polarization and spatial-mode degrees of freedom
Cites Work
- Quantum cryptography: public key distribution and coin tossing
- Authenticated semi-quantum key distribution protocol using Bell states
- Semiquantum key distribution
- Quantum key distribution with classical Bob
- Chaos for a class of complex epidemiological models
- Relation between information and disturbance in quantum key distribution protocol with classical alice
- Semiquantum secret sharing using two-particle entangled state
- Quantum secret sharing with classical Bobs
- QUANTUM KEY DISTRIBUTION WITH CLASSICAL ALICE
- Efficient key construction on semi-quantum secret sharing protocols
- Eavesdropping in semiquantum key distribution protocol
Cited In (42)
- Semiquantum secure direct communication using EPR pairs
- Eavesdropping in semiquantum key distribution protocol
- On the security of semi-device-independent QKD protocols
- Quantum key distribution with quantum walks
- Three-party semi-quantum key agreement protocol
- Efficient semiquantum key distribution without entanglement
- Measure-resend semi-quantum private comparison without entanglement
- Efficient semi-quantum private comparison without using entanglement resource and pre-shared key
- Semi-quantum digital signature protocol based on Einstein-Podolsky-Rosen steering
- Multiparty semi-quantum secret sharing with \(d\)-level single-particle states
- Three-party semi-quantum protocol for deterministic secure quantum dialogue based on GHZ states
- Advanced semi-quantum secure direct communication protocol based on Bell states against flip attack
- Semiquantum key distribution using initial states in only one basis without the classical user measuring
- Two semi-quantum key distribution protocols with G-like states
- Security of a single-state semi-quantum key distribution protocol
- Security of a semi-quantum protocol where reflections contribute to the secret key
- Cryptanalysis and improvement of the semi-quantum secret sharing protocol
- Semi-quantum identification
- Semiquantum key distribution without invoking the classical party's measurement capability
- Semi-quantum dialogue based on single photons
- Qutrit-based semi-quantum key distribution protocol
- Three Attacks on the Mediated Semi‐Quantum Key Distribution without Invoking Quantum Measurement
- A note on quantum related-key attacks
- Security analysis for single-state circular mediated semi-quantum key distribution
- Semi-quantum cryptography
- Title not available (Why is that?)
- Semiquantum key distribution
- Sifting attacks in finite-size quantum key distribution
- Efficient and secure semi-quantum secure direct communication protocol against double CNOT attack
- Intercept-resend attacks on semi-quantum secret sharing and the improvements
- Multi‐Party Semi‐Quantum Key Distribution Protocol With Four‐Particle Cluster States
- Efficient semi-quantum private comparison using single photons
- Quantum and semi-quantum blind signature schemes based on entanglement swapping
- Single-state semi-quantum key distribution protocol and its security proof
- Efficient mediated semi-quantum key distribution
- Fault-tolerant semiquantum key distribution over a collective-dephasing noise channel
- Semi-quantum key distribution protocols with GHZ states
- Semi-quantum private comparison based on Bell states
- Semi-quantum private comparison protocol of size relation with \(d\)-dimensional Bell states
- Circular semi-quantum secret sharing using single particles
- Semi-quantum key distribution using qudit systems and security proof
- Semi-quantum key distribution with single photons in both polarization and spatial-mode degrees of freedom
This page was built for publication: Restricted attacks on semi-quantum key distribution protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q488185)