Cryptanalysis of a multiparty quantum key agreement protocol based on commutative encryption
From MaRDI portal
Publication:1700002
DOI10.1007/S11128-017-1647-2zbMath1381.81037OpenAlexW2733954498WikidataQ122498120 ScholiaQ122498120MaRDI QIDQ1700002
Publication date: 26 February 2018
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-017-1647-2
Related Items (9)
Multi-party quantum key agreement protocol for detection of collusive attacks in each sub-circle segment by headers ⋮ Cryptanalysis of multi-party quantum key agreement with five-qubit Brown states ⋮ Semi-honest three-party mutual authentication quantum key agreement protocol based on GHZ-like state ⋮ Secure multi-party quantum summation based on quantum Fourier transform ⋮ Two-party quantum key agreement protocols under collective noise channel ⋮ Dynamic multi-party quantum key agreement protocol based on commutative encryption ⋮ Long distance measurement-device-independent three-party quantum key agreement ⋮ Multi-party quantum key agreement with four-qubit cluster states ⋮ Detector-device-independent quantum key agreement based on single-photon Bell state measurement
Cites Work
- Efficient multi-party quantum key agreement by cluster states
- Efficient multiparty quantum key agreement protocol based on commutative encryption
- Multiparty quantum key agreement with single particles
- Two-party quantum key agreement with four-qubit cluster states
- Novel multiparty quantum key agreement protocol with GHZ states
- Improvement on ``quantum key agreement protocol with maximally entangled states
- Improvements on ``multiparty quantum key agreement with single particles
- Quantum key agreement with EPR pairs and single-particle measurements
- New directions in cryptography
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
This page was built for publication: Cryptanalysis of a multiparty quantum key agreement protocol based on commutative encryption