Semi-quantum key distribution protocols with GHZ states
From MaRDI portal
Publication:1740821
DOI10.1007/s10773-018-3875-3zbMath1412.81084OpenAlexW2889114124MaRDI QIDQ1740821
Kong-Ni Zhu, Nan-Run Zhou, Xiao-Jun Wen, Yun-Qian Wang
Publication date: 3 May 2019
Published in: International Journal of Theoretical Physics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10773-018-3875-3
Cryptography (94A60) Quantum coherence, entanglement, quantum correlations (81P40) Quantum information, communication, networks (quantum-theoretic aspects) (81P45) Quantum coding (general) (81P70) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items
Quantum secure direct communication against collective noise based on W states ⋮ Semi-quantum cryptography ⋮ Advanced semi-quantum secure direct communication protocol based on Bell states against flip attack ⋮ Three Attacks on the Mediated Semi‐Quantum Key Distribution without Invoking Quantum Measurement ⋮ Bell‐GHZ Measurement‐Device‐Independent Quantum Key Distribution ⋮ Dynamic hierarchical quantum secret sharing with general access structure ⋮ Quantum private comparison protocol based on four-particle GHZ states ⋮ Two semi-quantum key distribution protocols with G-like states ⋮ Resource-saving quantum key distribution based on three-photon matrix product states ⋮ Three-party quantum key injection scheme with W states ⋮ Fault tolerant controlled quantum dialogue with logical Brown states against collective noise ⋮ Authenticated semi-quantum secret sharing based on GHZ-type states ⋮ Semi-quantum bi-signature scheme based on W states ⋮ Three-party semi-quantum key agreement protocol ⋮ Fault tolerant multi-party authenticated quantum conference against collective noise ⋮ Efficient semiquantum key distribution based on single photons in both polarization and spatial-mode degrees of freedom
Cites Work
- Security of a semi-quantum protocol where reflections contribute to the secret key
- Authenticated semi-quantum key distributions without classical channel
- Eavesdropping in semiquantum key distribution protocol
- Quantum cryptography: public key distribution and coin tossing
- Restricted attacks on semi-quantum key distribution protocols
- Semiquantum key distribution without invoking the classical party's measurement capability
- A proof of the security of quantum key distribution
- Authenticated semi-quantum key distribution protocol using Bell states
- Quantum identity authentication with single photon
- Efficient quantum private communication based on dynamic control code sequence
- Trojan-horse attacks on quantum key distribution with classical bob
- New quantum dialogue protocol based on continuous-variable two-mode squeezed vacuum states
- Cryptanalysis on authenticated semi-quantum key distribution protocol using Bell states
- Semiquantum key distribution
- QUANTUM IDENTITY AUTHENTICATION USING GAUSSIAN-MODULATED SQUEEZED STATES
- Quantum Key Distribution with Classical Bob
- Unconditional security in quantum cryptography
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography using any two nonorthogonal states
- Measurement-device-independent semiquantum key distribution
- QUANTUM KEY DISTRIBUTION WITH CLASSICAL ALICE
- Mediated Semi‐Quantum Key Distribution Without Invoking Quantum Measurement