| Publication | Date of Publication | Type |
|---|
Collective Attack and Improvement on “Mediated Semi‐Quantum Key Distribution Using Single Photons” Annalen der Physik | 2023-11-14 | Paper |
Mediated Semi‐Quantum Key Distribution Using Single Photons Annalen der Physik | 2023-11-06 | Paper |
Mediated Semi‐Quantum Key Distribution Without Invoking Quantum Measurement Annalen der Physik | 2023-10-25 | Paper |
Three-party authenticated lightweight quantum key distribution without pre-shared key between participants Quantum Information Processing | 2023-09-18 | Paper |
Measure-resend authenticated semi-quantum key distribution with single photons Quantum Information Processing | 2023-01-18 | Paper |
Efficient semi-quantum private comparison using single photons Quantum Information Processing | 2022-12-08 | Paper |
Collusion attack and counterattack on the quantum key agreement via non-maximally entangled cluster states International Journal of Theoretical Physics | 2021-11-05 | Paper |
On the controlled cyclic quantum teleportation of an arbitrary two-qubit entangled state by using a ten-qubit entangled state International Journal of Theoretical Physics | 2020-02-28 | Paper |
Improvement on: ``Cryptanalysis and improvement of a multiparty quantum direct secret sharing of classical messages with Bell states and Bell measurements International Journal of Theoretical Physics | 2019-09-03 | Paper |
Improving the security of `High-capacity quantum summation with single photons in both polarization and spatial-mode degrees of freedom' International Journal of Theoretical Physics | 2019-09-03 | Paper |
Double CNOT attack on ``Quantum key distribution with limited classical Bob International Journal of Quantum Information | 2019-05-03 | Paper |
Semi-quantum key distribution robust against combined collective noise International Journal of Theoretical Physics | 2019-05-03 | Paper |
Secure quantum communication scheme for six-qubit decoherence-free states International Journal of Theoretical Physics | 2019-05-03 | Paper |
Statistics attack on ``quantum private comparison with a malicious third party and its improvement Quantum Information Processing | 2018-11-07 | Paper |
Six-qubit decoherence-free state measurement method and its application to development of authenticated quantum secure direct communication protocol International Journal of Theoretical Physics | 2018-11-06 | Paper |
Double C-NOT attack and counterattack on 'three-step semi-quantum secure direct communication protocol' Quantum Information Processing | 2018-11-05 | Paper |
Multiparty quantum private comparison with almost dishonest third parties for strangers Quantum Information Processing | 2018-02-27 | Paper |
Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing Quantum Information Processing | 2018-02-26 | Paper |
Improvement of ``Novel multiparty quantum key agreement protocol with GHZ states International Journal of Theoretical Physics | 2018-02-05 | Paper |
Authenticated semi-quantum key distribution protocol using Bell states Quantum Information Processing | 2017-11-21 | Paper |
Comment on A practical protocol for three-party authenticated quantum key distribution Quantum Information Processing | 2017-11-09 | Paper |
Controlled quantum dialogue using cluster states Quantum Information Processing | 2017-11-09 | Paper |
On ``A new quantum blind signature with unlinkability Quantum Information Processing | 2017-10-24 | Paper |
Fault-tolerant controlled deterministic secure quantum communication using EPR states against collective noise Quantum Information Processing | 2017-03-06 | Paper |
Trojan horse attack free fault-tolerant quantum key distribution protocols using GHZ states International Journal of Theoretical Physics | 2016-11-08 | Paper |
Authenticated semi-quantum key distributions without classical channel Quantum Information Processing | 2016-10-27 | Paper |
Quantum dialogue protocols over collective noise using entanglement of GHZ state Quantum Information Processing | 2016-10-27 | Paper |
Controlled quantum dialogue robust against conspiring users Quantum Information Processing | 2016-10-27 | Paper |
Provably secure extended chaotic map-based three-party key agreement protocols using password authentication Nonlinear Dynamics | 2016-10-19 | Paper |
Multi-party quantum private comparison protocol with an almost-dishonest third party using GHZ states International Journal of Theoretical Physics | 2016-07-05 | Paper |
Comments on two group signatures Information Processing Letters | 2016-06-16 | Paper |
An efficient quantum private comparison of equality over collective-noise channels International Journal of Theoretical Physics | 2016-06-09 | Paper |
Arbitrated unconditionally secure authentication scheme with multi-senders Information Processing Letters | 2016-06-09 | Paper |
Quantum entanglement establishment between two strangers Quantum Information Processing | 2016-04-04 | Paper |
Authenticated semi-quantum direct communication protocols using Bell states Quantum Information Processing | 2016-04-01 | Paper |
Multi-controller quantum teleportation with remote rotation and its applications Quantum Information Processing | 2016-04-01 | Paper |
Probabilistic authenticated quantum dialogue Quantum Information Processing | 2016-04-01 | Paper |
Multi-party quantum private comparison with an almost-dishonest third party Quantum Information Processing | 2015-12-09 | Paper |
\((t,m)\) Threshold and generalized ID-based conference key distribution system Cryptologia | 2015-11-13 | Paper |
\((t,n)\) Threshold-multisignature scheme and generalized-multisignature scheme where suspected forgery implies traceability of adversarial shareholders Cryptologia | 2015-11-13 | Paper |
Intercept-and-resend attack on controlled bidirectional quantum direct communication and its improvement Quantum Information Processing | 2015-10-19 | Paper |
Authenticated quantum dialogue based on Bell states International Journal of Theoretical Physics | 2015-07-08 | Paper |
Controlled probabilistic quantum key distribution using a ground state Quantum Information Processing | 2015-04-13 | Paper |
Efficient quantum dialogue using single photons Quantum Information Processing | 2015-01-23 | Paper |
Forgery attack on one-time proxy signature and the improvement Quantum Information Processing | 2014-12-12 | Paper |
Multiparty controlled quantum secure direct communication based on quantum search algorithm Quantum Information Processing | 2014-12-05 | Paper |
Controlled remote state preparation protocols via AKLT states Quantum Information Processing | 2014-12-05 | Paper |
Trojan horse attack free fault-tolerant quantum key distribution protocols Quantum Information Processing | 2014-06-13 | Paper |
Efficient key construction on semi-quantum secret sharing protocols International Journal of Quantum Information | 2014-04-29 | Paper |
Attacks and improvement on ``Quantum direct communication with mutual authentication International Journal of Theoretical Physics | 2014-04-08 | Paper |
Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels Quantum Information Processing | 2014-04-08 | Paper |
Measure-and-resend attack and improvement on ``A scheme to share information via employing discrete algorithm to quantum states International Journal of Theoretical Physics | 2014-04-08 | Paper |
Comment on the ``Quantum private comparison protocol based on Bell entangled states International Journal of Theoretical Physics | 2014-04-08 | Paper |
Multiparty quantum remote control Quantum Information Processing | 2014-02-25 | Paper |
Comment on ``Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise Quantum Information Processing | 2014-02-25 | Paper |
Fault tolerant authenticated quantum direct communication immune to collective noises Quantum Information Processing | 2014-02-25 | Paper |
Man-in-the-middle attack on ``Quantum dialogue with authentication based on Bell states International Journal of Theoretical Physics | 2013-11-22 | Paper |
Provably secure three-party password-based authenticated key exchange protocol using Weil pairing IEE Proceedings. Communications | 2013-10-18 | Paper |
Fault tolerant deterministic quantum communications using GHZ states over collective-noise channels Quantum Information Processing | 2013-09-20 | Paper |
Quantum dialogue protocols immune to collective noise Quantum Information Processing | 2013-07-05 | Paper |
Enhanced multiparty controlled QSDC using GHZ state Communications in Theoretical Physics | 2013-06-07 | Paper |
Multi-user private comparison protocol using GHZ class states Quantum Information Processing | 2013-05-31 | Paper |
Entanglement swapping of a GHZ state via a GHZ-like state Physica Scripta | 2013-05-22 | Paper |
Enhancement on ``Quantum blind signature based on two-state vector formalism Quantum Information Processing | 2013-02-28 | Paper |
Dynamic quantum secret sharing Quantum Information Processing | 2013-02-28 | Paper |
Improved QSDC protocol over a collective-dephasing noise channel International Journal of Theoretical Physics | 2013-02-04 | Paper |
Quantum secret sharing based on quantum search algorithm International Journal of Theoretical Physics | 2013-01-11 | Paper |
Quantum secret sharing using symmetric \(W\) state International Journal of Theoretical Physics | 2013-01-10 | Paper |
One-way quantum authenticated secure communication using rotation operation Communications in Theoretical Physics | 2012-09-26 | Paper |
Enhancement of Gao's multiparty quantum secret sharing Communications in Theoretical Physics | 2012-09-26 | Paper |
Controlled deterministic secure quantum communication based on quantum search algorithm International Journal of Theoretical Physics | 2012-08-24 | Paper |
Thwarting intercept-and-resend attack on Zhang's quantum secret sharing using collective rotation noises Quantum Information Processing | 2012-06-20 | Paper |
New quantum private comparison protocol using EPR pairs Quantum Information Processing | 2012-05-31 | Paper |
Revisiting Deng et al.'s multiparty quantum secret sharing protocol International Journal of Theoretical Physics | 2012-03-09 | Paper |
Comment on ``Quantum key distribution and quantum authentication based on entangled state International Journal of Theoretical Physics | 2012-03-09 | Paper |
| Probabilistic quantum key distribution | 2011-12-19 | Paper |
Improvement on ``quantum key agreement protocol with maximally entangled states International Journal of Theoretical Physics | 2011-11-04 | Paper |
Multiparty quantum secret sharing based on GHZ states Physica Scripta | 2011-08-03 | Paper |
Quantum secret sharing using GHZ-like state Communications in Theoretical Physics | 2011-06-30 | Paper |
Teleportation of a pure EPR state via GHZ-like state International Journal of Theoretical Physics | 2010-10-08 | Paper |
Two-way quantum-bit-string commitment International Journal of Modern Physics B | 2010-06-30 | Paper |
Simple password-based three-party authenticated key exchange without server public keys Information Sciences | 2010-06-11 | Paper |
The enhancement of Zhou et al.'s quantum secret sharing protocol International Journal of Modern Physics C | 2010-01-25 | Paper |
Subliminal channels in the identity-based threshold ring signature International Journal of Computer Mathematics | 2009-05-29 | Paper |
SECURE DIRECT COMMUNICATION USING DETERMINISTIC BB84 PROTOCOL International Journal of Modern Physics C | 2008-10-17 | Paper |
Efficient one-out-of-two quantum oblivious transfer based on four-coherent-state postselection protocol Physica Scripta | 2008-10-08 | Paper |
All-in-one group-oriented cryptosystem based on bilinear pairing Information Sciences | 2008-01-03 | Paper |
| scientific article; zbMATH DE number 5177767 (Why is no real title available?) | 2007-08-07 | Paper |
| scientific article; zbMATH DE number 5177768 (Why is no real title available?) | 2007-08-07 | Paper |
SECURITY OF "ASYMMETRICAL QUANTUM KEY DISTRIBUTION PROTOCOL" International Journal of Modern Physics C | 2007-07-04 | Paper |
Proxy-protected signature secure against the undelegated proxy signature attack Computers and Electrical Engineering | 2007-06-08 | Paper |
On the unlinkability of randomization-enhanced Chaum's blind signature scheme Applied Mathematics and Computation | 2005-06-13 | Paper |
On the traceability on RSA-based partially signature with low computation Applied Mathematics and Computation | 2005-02-22 | Paper |
Improved authenticated multiple-key agreement protocol Computers & Mathematics with Applications | 2004-08-06 | Paper |
| scientific article; zbMATH DE number 2063048 (Why is no real title available?) | 2004-03-29 | Paper |
| scientific article; zbMATH DE number 2061978 (Why is no real title available?) | 2004-03-25 | Paper |
The security of two ID-based multisignature protocols for sequential and broadcasting architectures Information Processing Letters | 2002-08-04 | Paper |
| scientific article; zbMATH DE number 1676658 (Why is no real title available?) | 2001-11-25 | Paper |
\((t,m)\) threshold and generalized ID-based conference key distribution system Applied Mathematics and Computation | 2001-04-25 | Paper |
| scientific article; zbMATH DE number 1420967 (Why is no real title available?) | 2000-08-24 | Paper |
| scientific article; zbMATH DE number 1189400 (Why is no real title available?) | 2000-03-07 | Paper |
| scientific article; zbMATH DE number 1304300 (Why is no real title available?) | 2000-02-15 | Paper |
Remarks on Chang-Buehrer access control scheme in a hierarchy Computers & Mathematics with Applications | 1999-04-12 | Paper |
ON THE SECURITY OF PARK ET AL.'S KEY DISTRIBUTION PROTOCOL FOR DIGITAL MOBILE COMMUNICATIONS Cryptologia | 1998-11-18 | Paper |
| scientific article; zbMATH DE number 1088914 (Why is no real title available?) | 1997-11-18 | Paper |
| scientific article; zbMATH DE number 1024074 (Why is no real title available?) | 1997-09-17 | Paper |
On the security of SPLICE/AS -- The authentication system in WIDE Internet Information Processing Letters | 1997-02-28 | Paper |
Two attacks on Neuman-Stubblebine authentication protocols Information Processing Letters | 1997-02-28 | Paper |
CONSPIRACY ATTACKS ON THE THRESHOLD RSA SIGNATURE SCHEME Cryptologia | 1996-02-20 | Paper |
Key generation of algebraic-code cryptosystems Computers & Mathematics with Applications | 1994-07-24 | Paper |
Scheme for secure digital mobile communications based on symmetric key cryptography Information Processing Letters | 1994-05-29 | Paper |
| scientific article; zbMATH DE number 177047 (Why is no real title available?) | 1993-05-18 | Paper |
| scientific article; zbMATH DE number 151930 (Why is no real title available?) | 1993-05-03 | Paper |
Attacks on Okamoto and Tanaka's one-way ID-based key distribution system Information Processing Letters | 1993-01-17 | Paper |
Protocols for group oriented secret sharing Information Processing Letters | 1993-01-16 | Paper |
Efficient ID-based key distribution with tamperfree devices Information Processing Letters | 1993-01-04 | Paper |
On double-one matrices and double-zero matrices Linear and Multilinear Algebra | 1992-09-27 | Paper |