Restricted attacks on semi-quantum key distribution protocols
From MaRDI portal
Recommendations
- Security of a single-state semi-quantum key distribution protocol
- Single-state semi-quantum key distribution protocol and its security proof
- Semiquantum key distribution
- Semi-quantum key distribution protocols with GHZ states
- Semi-quantum key distribution with single photons in both polarization and spatial-mode degrees of freedom
Cites work
- Authenticated semi-quantum key distribution protocol using Bell states
- Chaos for a class of complex epidemiological models
- Eavesdropping in semiquantum key distribution protocol
- Efficient key construction on semi-quantum secret sharing protocols
- QUANTUM KEY DISTRIBUTION WITH CLASSICAL ALICE
- Quantum cryptography: public key distribution and coin tossing
- Quantum key distribution with classical Bob
- Quantum secret sharing with classical Bobs
- Relation between information and disturbance in quantum key distribution protocol with classical alice
- Semiquantum key distribution
- Semiquantum secret sharing using two-particle entangled state
Cited in
(42)- Three-party semi-quantum protocol for deterministic secure quantum dialogue based on GHZ states
- Semi-quantum key distribution protocols with GHZ states
- Semiquantum key distribution using initial states in only one basis without the classical user measuring
- Semiquantum secure direct communication using EPR pairs
- Efficient semiquantum key distribution without entanglement
- Security analysis for single-state circular mediated semi-quantum key distribution
- Semi-quantum digital signature protocol based on Einstein-Podolsky-Rosen steering
- Efficient semi-quantum private comparison using single photons
- Semi-quantum identification
- Three Attacks on the Mediated Semi‐Quantum Key Distribution without Invoking Quantum Measurement
- Qutrit-based semi-quantum key distribution protocol
- Quantum and semi-quantum blind signature schemes based on entanglement swapping
- On the security of semi-device-independent QKD protocols
- Quantum key distribution with quantum walks
- Semiquantum key distribution
- Eavesdropping in semiquantum key distribution protocol
- Efficient mediated semi-quantum key distribution
- Semiquantum key distribution without invoking the classical party's measurement capability
- Two semi-quantum key distribution protocols with G-like states
- Single-state semi-quantum key distribution protocol and its security proof
- Efficient semi-quantum private comparison without using entanglement resource and pre-shared key
- Three-party semi-quantum key agreement protocol
- Sifting attacks in finite-size quantum key distribution
- Security of a single-state semi-quantum key distribution protocol
- Circular semi-quantum secret sharing using single particles
- Cryptanalysis and improvement of the semi-quantum secret sharing protocol
- Semi-quantum key distribution using qudit systems and security proof
- Semi-quantum private comparison based on Bell states
- Semi-quantum cryptography
- Semi-quantum private comparison protocol of size relation with \(d\)-dimensional Bell states
- Advanced semi-quantum secure direct communication protocol based on Bell states against flip attack
- Multi‐Party Semi‐Quantum Key Distribution Protocol With Four‐Particle Cluster States
- scientific article; zbMATH DE number 5320301 (Why is no real title available?)
- Measure-resend semi-quantum private comparison without entanglement
- Efficient and secure semi-quantum secure direct communication protocol against double CNOT attack
- Semi-quantum dialogue based on single photons
- Multiparty semi-quantum secret sharing with \(d\)-level single-particle states
- Semi-quantum key distribution with single photons in both polarization and spatial-mode degrees of freedom
- Intercept-resend attacks on semi-quantum secret sharing and the improvements
- Security of a semi-quantum protocol where reflections contribute to the secret key
- Fault-tolerant semiquantum key distribution over a collective-dephasing noise channel
- A note on quantum related-key attacks
This page was built for publication: Restricted attacks on semi-quantum key distribution protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q488185)