Comment on ``Quantum key distribution and quantum authentication based on entangled state
DOI10.1007/S10773-011-0768-0zbMATH Open1238.81089OpenAlexW1969989889MaRDI QIDQ763281FDOQ763281
Authors: Toung-Shang Wei, Chia-Wei Tsai, Tzonelih Hwang
Publication date: 9 March 2012
Published in: International Journal of Theoretical Physics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10773-011-0768-0
Recommendations
- Quantum key distribution and quantum authentication based on entangled state
- Revisiting quantum authentication scheme based on entanglement swapping
- Comment on ``A novel quantum deniable authentication protocol without entanglement
- QUANTUM AUTHENTICATION USING ENTANGLED STATES
- Man-in-the-middle attack on ``Quantum dialogue with authentication based on Bell states
Cryptography (94A60) Quantum coherence, entanglement, quantum correlations (81P40) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Quantum cryptography using any two nonorthogonal states
- Quantum identity authentication based on ping-pong technique for photons
- QUANTUM AUTHENTICATION USING ENTANGLED STATES
- Quantum Key Distribution Scheme with High Efficiency
- Quantum key distribution and quantum authentication based on entangled state
Cited In (13)
- Improved secure multiparty computation with a dishonest majority via quantum means
- Comment on ``A novel quantum deniable authentication protocol without entanglement
- Fault-tolerate quantum private comparison based on GHZ states and ECC
- Quantum deniable authentication protocol
- Revisiting quantum authentication scheme based on entanglement swapping
- Comment on ``Quantum secure direct communication with authentication expansion using single photons
- Quantum key distribution and quantum authentication based on entangled state
- Quantum identity authentication without entanglement
- Response to: ``Comment on: ``Controlled mutual quantum entity authentication with an untrusted third party'
- Reply to: ``Comment on: `Exposed-key weakness of \(\alpha \eta \)' [Phys. Lett. A 370 (2007) 131] [Phys. Lett. A 372 (2008) 7091]
- Reply to: ``Comment on: `Efficient high-capacity quantum secret sharing with two-photon entanglement' [Phys. Lett. A 372 (2008) 1957] [\textit{F. G. Deng} et al. Phys. Lett. A 373, No. 3., 396-398 (2009)]
- Cryptanalysis and improvement of a multi-user quantum communication network using \(\chi\)-type entangled states
- Comment on A practical protocol for three-party authenticated quantum key distribution
This page was built for publication: Comment on ``Quantum key distribution and quantum authentication based on entangled state
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q763281)