Double C-NOT attack and counterattack on 'three-step semi-quantum secure direct communication protocol'
From MaRDI portal
Publication:1993819
DOI10.1007/s11128-018-1953-3zbMath1448.81281OpenAlexW2808130593WikidataQ129708714 ScholiaQ129708714MaRDI QIDQ1993819
Tzonelih Hwang, Jun Gu, Po-hua Lin
Publication date: 5 November 2018
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-018-1953-3
Quantum information, communication, networks (quantum-theoretic aspects) (81P45) Quantum cryptography (quantum-theoretic aspects) (81P94) Quantum gates (81P65)
Related Items (24)
Semi-quantum cryptography ⋮ Two-party quantum key agreement against collective noisy channel ⋮ Advanced semi-quantum secure direct communication protocol based on Bell states against flip attack ⋮ Efficient and secure semi-quantum secure direct communication protocol against double CNOT attack ⋮ Mediated Semi‐Quantum Key Distribution Using Single Photons ⋮ Cryptanalysis and improvement of semi-quantum dialogue with Bell entangled states ⋮ Semi-quantum secure direct communication using entanglement ⋮ Semi-quantum secure direct communication against collective-dephasing noise ⋮ High-capacity measurement-device-independent quantum secure direct communication ⋮ Decoy-state quantum private query protocol with two-way communication ⋮ Mediated semi-quantum secure direct communication ⋮ Cryptanalysis and improvement in semi-quantum private comparison based on Bell states ⋮ Three-party semi-quantum protocol for deterministic secure quantum dialogue based on GHZ states ⋮ Two single-state semi-quantum secure direct communication protocols based on single photons ⋮ Multiparty semiquantum key agreement without entanglement ⋮ Controlled deterministic secure semi-quantum communication ⋮ Controlled bidirectional quantum secure direct communication protocol based on Grover’s algorithm ⋮ Quantum sealed-bid Vickrey auction protocol with semi-quantum bidders ⋮ Semiquantum secure direct communication with authentication based on single-photons ⋮ Cluster-state-based quantum secret sharing for users with different abilities ⋮ Improved semi-quantum key distribution with two almost-classical users ⋮ Multi-party semi-quantum secure direct communication using Greenberger-Horne-Zeilinger states ⋮ Intercept-and-resend attack and improvement of semiquantum secure direct communication using EPR pairs ⋮ Semi-quantum voting protocol
Cites Work
- Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing
- Fault-tolerant semiquantum key distribution over a collective-dephasing noise channel
- Semiquantum key distribution
- Quantum Key Distribution with Classical Bob
- SEMIQUANTUM SECRET SHARING USING TWO-PARTICLE ENTANGLED STATE
- Mediated Semi‐Quantum Key Distribution Without Invoking Quantum Measurement
This page was built for publication: Double C-NOT attack and counterattack on 'three-step semi-quantum secure direct communication protocol'