Three Attacks on the Mediated Semi‐Quantum Key Distribution without Invoking Quantum Measurement
From MaRDI portal
Publication:6068611
DOI10.1002/andp.202000251OpenAlexW3041332398MaRDI QIDQ6068611
Nan-Run Zhou, Xiangfu Zou, Zhenbang Rong
Publication date: 13 November 2023
Published in: Annalen der Physik (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1002/andp.202000251
quantum key distributionsemi-quantum key distributioncollective attacksmeasurement attacksmodification attacks
Cites Work
- Security of a semi-quantum protocol where reflections contribute to the secret key
- Authenticated semi-quantum key distributions without classical channel
- Eavesdropping in semiquantum key distribution protocol
- Exponentially more concise quantum recognition of non-RMM regular languages
- Restricted attacks on semi-quantum key distribution protocols
- Semiquantum key distribution without invoking the classical party's measurement capability
- Application of distributed semi-quantum computing model in phase estimation
- Promise problems solved by quantum and classical finite automata
- Multi-party semi-quantum key agreement with delegating quantum computation
- A proof of the security of quantum key distribution
- Authenticated semi-quantum key distribution protocol using Bell states
- Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing
- Fault-tolerant semiquantum key distribution over a collective-dephasing noise channel
- Semi-quantum key distribution robust against combined collective noise
- Semi-quantum key distribution protocols with GHZ states
- Security of a single-state semi-quantum key distribution protocol
- Trojan-horse attacks on quantum key distribution with classical bob
- Cryptanalysis on authenticated semi-quantum key distribution protocol using Bell states
- Semiquantum key distribution
- Quantum Key Distribution with Classical Bob
- RELATION BETWEEN INFORMATION AND DISTURBANCE IN QUANTUM KEY DISTRIBUTION PROTOCOL WITH CLASSICAL ALICE
- Unconditional security in quantum cryptography
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography without Bell’s theorem
- Measurement-device-independent semiquantum key distribution
- Generalized privacy amplification
- Quantum secret sharing with classical Bobs
- QUANTUM KEY DISTRIBUTION WITH CLASSICAL ALICE
This page was built for publication: Three Attacks on the Mediated Semi‐Quantum Key Distribution without Invoking Quantum Measurement