Tzonelih Hwang

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Collective Attack and Improvement on “Mediated Semi‐Quantum Key Distribution Using Single Photons”
Annalen der Physik
2023-11-14Paper
Mediated Semi‐Quantum Key Distribution Using Single Photons
Annalen der Physik
2023-11-06Paper
Mediated Semi‐Quantum Key Distribution Without Invoking Quantum Measurement
Annalen der Physik
2023-10-25Paper
Three-party authenticated lightweight quantum key distribution without pre-shared key between participants
Quantum Information Processing
2023-09-18Paper
Measure-resend authenticated semi-quantum key distribution with single photons
Quantum Information Processing
2023-01-18Paper
Efficient semi-quantum private comparison using single photons
Quantum Information Processing
2022-12-08Paper
Collusion attack and counterattack on the quantum key agreement via non-maximally entangled cluster states
International Journal of Theoretical Physics
2021-11-05Paper
On the controlled cyclic quantum teleportation of an arbitrary two-qubit entangled state by using a ten-qubit entangled state
International Journal of Theoretical Physics
2020-02-28Paper
Improvement on: ``Cryptanalysis and improvement of a multiparty quantum direct secret sharing of classical messages with Bell states and Bell measurements
International Journal of Theoretical Physics
2019-09-03Paper
Improving the security of `High-capacity quantum summation with single photons in both polarization and spatial-mode degrees of freedom'
International Journal of Theoretical Physics
2019-09-03Paper
Double CNOT attack on ``Quantum key distribution with limited classical Bob
International Journal of Quantum Information
2019-05-03Paper
Semi-quantum key distribution robust against combined collective noise
International Journal of Theoretical Physics
2019-05-03Paper
Secure quantum communication scheme for six-qubit decoherence-free states
International Journal of Theoretical Physics
2019-05-03Paper
Statistics attack on ``quantum private comparison with a malicious third party and its improvement
Quantum Information Processing
2018-11-07Paper
Six-qubit decoherence-free state measurement method and its application to development of authenticated quantum secure direct communication protocol
International Journal of Theoretical Physics
2018-11-06Paper
Double C-NOT attack and counterattack on 'three-step semi-quantum secure direct communication protocol'
Quantum Information Processing
2018-11-05Paper
Multiparty quantum private comparison with almost dishonest third parties for strangers
Quantum Information Processing
2018-02-27Paper
Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing
Quantum Information Processing
2018-02-26Paper
Improvement of ``Novel multiparty quantum key agreement protocol with GHZ states
International Journal of Theoretical Physics
2018-02-05Paper
Authenticated semi-quantum key distribution protocol using Bell states
Quantum Information Processing
2017-11-21Paper
Comment on A practical protocol for three-party authenticated quantum key distribution
Quantum Information Processing
2017-11-09Paper
Controlled quantum dialogue using cluster states
Quantum Information Processing
2017-11-09Paper
On ``A new quantum blind signature with unlinkability
Quantum Information Processing
2017-10-24Paper
Fault-tolerant controlled deterministic secure quantum communication using EPR states against collective noise
Quantum Information Processing
2017-03-06Paper
Trojan horse attack free fault-tolerant quantum key distribution protocols using GHZ states
International Journal of Theoretical Physics
2016-11-08Paper
Authenticated semi-quantum key distributions without classical channel
Quantum Information Processing
2016-10-27Paper
Quantum dialogue protocols over collective noise using entanglement of GHZ state
Quantum Information Processing
2016-10-27Paper
Controlled quantum dialogue robust against conspiring users
Quantum Information Processing
2016-10-27Paper
Provably secure extended chaotic map-based three-party key agreement protocols using password authentication
Nonlinear Dynamics
2016-10-19Paper
Multi-party quantum private comparison protocol with an almost-dishonest third party using GHZ states
International Journal of Theoretical Physics
2016-07-05Paper
Comments on two group signatures
Information Processing Letters
2016-06-16Paper
An efficient quantum private comparison of equality over collective-noise channels
International Journal of Theoretical Physics
2016-06-09Paper
Arbitrated unconditionally secure authentication scheme with multi-senders
Information Processing Letters
2016-06-09Paper
Quantum entanglement establishment between two strangers
Quantum Information Processing
2016-04-04Paper
Authenticated semi-quantum direct communication protocols using Bell states
Quantum Information Processing
2016-04-01Paper
Multi-controller quantum teleportation with remote rotation and its applications
Quantum Information Processing
2016-04-01Paper
Probabilistic authenticated quantum dialogue
Quantum Information Processing
2016-04-01Paper
Multi-party quantum private comparison with an almost-dishonest third party
Quantum Information Processing
2015-12-09Paper
\((t,m)\) Threshold and generalized ID-based conference key distribution system
Cryptologia
2015-11-13Paper
\((t,n)\) Threshold-multisignature scheme and generalized-multisignature scheme where suspected forgery implies traceability of adversarial shareholders
Cryptologia
2015-11-13Paper
Intercept-and-resend attack on controlled bidirectional quantum direct communication and its improvement
Quantum Information Processing
2015-10-19Paper
Authenticated quantum dialogue based on Bell states
International Journal of Theoretical Physics
2015-07-08Paper
Controlled probabilistic quantum key distribution using a ground state
Quantum Information Processing
2015-04-13Paper
Efficient quantum dialogue using single photons
Quantum Information Processing
2015-01-23Paper
Forgery attack on one-time proxy signature and the improvement
Quantum Information Processing
2014-12-12Paper
Multiparty controlled quantum secure direct communication based on quantum search algorithm
Quantum Information Processing
2014-12-05Paper
Controlled remote state preparation protocols via AKLT states
Quantum Information Processing
2014-12-05Paper
Trojan horse attack free fault-tolerant quantum key distribution protocols
Quantum Information Processing
2014-06-13Paper
Efficient key construction on semi-quantum secret sharing protocols
International Journal of Quantum Information
2014-04-29Paper
Attacks and improvement on ``Quantum direct communication with mutual authentication
International Journal of Theoretical Physics
2014-04-08Paper
Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels
Quantum Information Processing
2014-04-08Paper
Measure-and-resend attack and improvement on ``A scheme to share information via employing discrete algorithm to quantum states
International Journal of Theoretical Physics
2014-04-08Paper
Comment on the ``Quantum private comparison protocol based on Bell entangled states
International Journal of Theoretical Physics
2014-04-08Paper
Multiparty quantum remote control
Quantum Information Processing
2014-02-25Paper
Comment on ``Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise
Quantum Information Processing
2014-02-25Paper
Fault tolerant authenticated quantum direct communication immune to collective noises
Quantum Information Processing
2014-02-25Paper
Man-in-the-middle attack on ``Quantum dialogue with authentication based on Bell states
International Journal of Theoretical Physics
2013-11-22Paper
Provably secure three-party password-based authenticated key exchange protocol using Weil pairing
IEE Proceedings. Communications
2013-10-18Paper
Fault tolerant deterministic quantum communications using GHZ states over collective-noise channels
Quantum Information Processing
2013-09-20Paper
Quantum dialogue protocols immune to collective noise
Quantum Information Processing
2013-07-05Paper
Enhanced multiparty controlled QSDC using GHZ state
Communications in Theoretical Physics
2013-06-07Paper
Multi-user private comparison protocol using GHZ class states
Quantum Information Processing
2013-05-31Paper
Entanglement swapping of a GHZ state via a GHZ-like state
Physica Scripta
2013-05-22Paper
Enhancement on ``Quantum blind signature based on two-state vector formalism
Quantum Information Processing
2013-02-28Paper
Dynamic quantum secret sharing
Quantum Information Processing
2013-02-28Paper
Improved QSDC protocol over a collective-dephasing noise channel
International Journal of Theoretical Physics
2013-02-04Paper
Quantum secret sharing based on quantum search algorithm
International Journal of Theoretical Physics
2013-01-11Paper
Quantum secret sharing using symmetric \(W\) state
International Journal of Theoretical Physics
2013-01-10Paper
One-way quantum authenticated secure communication using rotation operation
Communications in Theoretical Physics
2012-09-26Paper
Enhancement of Gao's multiparty quantum secret sharing
Communications in Theoretical Physics
2012-09-26Paper
Controlled deterministic secure quantum communication based on quantum search algorithm
International Journal of Theoretical Physics
2012-08-24Paper
Thwarting intercept-and-resend attack on Zhang's quantum secret sharing using collective rotation noises
Quantum Information Processing
2012-06-20Paper
New quantum private comparison protocol using EPR pairs
Quantum Information Processing
2012-05-31Paper
Revisiting Deng et al.'s multiparty quantum secret sharing protocol
International Journal of Theoretical Physics
2012-03-09Paper
Comment on ``Quantum key distribution and quantum authentication based on entangled state
International Journal of Theoretical Physics
2012-03-09Paper
Probabilistic quantum key distribution2011-12-19Paper
Improvement on ``quantum key agreement protocol with maximally entangled states
International Journal of Theoretical Physics
2011-11-04Paper
Multiparty quantum secret sharing based on GHZ states
Physica Scripta
2011-08-03Paper
Quantum secret sharing using GHZ-like state
Communications in Theoretical Physics
2011-06-30Paper
Teleportation of a pure EPR state via GHZ-like state
International Journal of Theoretical Physics
2010-10-08Paper
Two-way quantum-bit-string commitment
International Journal of Modern Physics B
2010-06-30Paper
Simple password-based three-party authenticated key exchange without server public keys
Information Sciences
2010-06-11Paper
The enhancement of Zhou et al.'s quantum secret sharing protocol
International Journal of Modern Physics C
2010-01-25Paper
Subliminal channels in the identity-based threshold ring signature
International Journal of Computer Mathematics
2009-05-29Paper
SECURE DIRECT COMMUNICATION USING DETERMINISTIC BB84 PROTOCOL
International Journal of Modern Physics C
2008-10-17Paper
Efficient one-out-of-two quantum oblivious transfer based on four-coherent-state postselection protocol
Physica Scripta
2008-10-08Paper
All-in-one group-oriented cryptosystem based on bilinear pairing
Information Sciences
2008-01-03Paper
scientific article; zbMATH DE number 5177767 (Why is no real title available?)2007-08-07Paper
scientific article; zbMATH DE number 5177768 (Why is no real title available?)2007-08-07Paper
SECURITY OF "ASYMMETRICAL QUANTUM KEY DISTRIBUTION PROTOCOL"
International Journal of Modern Physics C
2007-07-04Paper
Proxy-protected signature secure against the undelegated proxy signature attack
Computers and Electrical Engineering
2007-06-08Paper
On the unlinkability of randomization-enhanced Chaum's blind signature scheme
Applied Mathematics and Computation
2005-06-13Paper
On the traceability on RSA-based partially signature with low computation
Applied Mathematics and Computation
2005-02-22Paper
Improved authenticated multiple-key agreement protocol
Computers & Mathematics with Applications
2004-08-06Paper
scientific article; zbMATH DE number 2063048 (Why is no real title available?)2004-03-29Paper
scientific article; zbMATH DE number 2061978 (Why is no real title available?)2004-03-25Paper
The security of two ID-based multisignature protocols for sequential and broadcasting architectures
Information Processing Letters
2002-08-04Paper
scientific article; zbMATH DE number 1676658 (Why is no real title available?)2001-11-25Paper
\((t,m)\) threshold and generalized ID-based conference key distribution system
Applied Mathematics and Computation
2001-04-25Paper
scientific article; zbMATH DE number 1420967 (Why is no real title available?)2000-08-24Paper
scientific article; zbMATH DE number 1189400 (Why is no real title available?)2000-03-07Paper
scientific article; zbMATH DE number 1304300 (Why is no real title available?)2000-02-15Paper
Remarks on Chang-Buehrer access control scheme in a hierarchy
Computers & Mathematics with Applications
1999-04-12Paper
ON THE SECURITY OF PARK ET AL.'S KEY DISTRIBUTION PROTOCOL FOR DIGITAL MOBILE COMMUNICATIONS
Cryptologia
1998-11-18Paper
scientific article; zbMATH DE number 1088914 (Why is no real title available?)1997-11-18Paper
scientific article; zbMATH DE number 1024074 (Why is no real title available?)1997-09-17Paper
On the security of SPLICE/AS -- The authentication system in WIDE Internet
Information Processing Letters
1997-02-28Paper
Two attacks on Neuman-Stubblebine authentication protocols
Information Processing Letters
1997-02-28Paper
CONSPIRACY ATTACKS ON THE THRESHOLD RSA SIGNATURE SCHEME
Cryptologia
1996-02-20Paper
Key generation of algebraic-code cryptosystems
Computers & Mathematics with Applications
1994-07-24Paper
Scheme for secure digital mobile communications based on symmetric key cryptography
Information Processing Letters
1994-05-29Paper
scientific article; zbMATH DE number 177047 (Why is no real title available?)1993-05-18Paper
scientific article; zbMATH DE number 151930 (Why is no real title available?)1993-05-03Paper
Attacks on Okamoto and Tanaka's one-way ID-based key distribution system
Information Processing Letters
1993-01-17Paper
Protocols for group oriented secret sharing
Information Processing Letters
1993-01-16Paper
Efficient ID-based key distribution with tamperfree devices
Information Processing Letters
1993-01-04Paper
On double-one matrices and double-zero matrices
Linear and Multilinear Algebra
1992-09-27Paper


Research outcomes over time


This page was built for person: Tzonelih Hwang