Semi-quantum identification
From MaRDI portal
Publication:2100851
DOI10.1007/s11128-019-2308-4zbMath1502.94046OpenAlexW2945713982MaRDI QIDQ2100851
Wei Bi, Kong-Ni Zhu, Nan-Run Zhou, Li-Hua Gong
Publication date: 25 November 2022
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-019-2308-4
quantum cryptographysingle photonsemi-quantum key distributionidentity authenticationsemi-quantum identification
Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (15)
A general access architecture for blockchain-based semi-quantum 6G wireless communication and its application ⋮ Controlled dense coding using generalized GHZ-type state in a noisy network ⋮ Semi-quantum cryptography ⋮ Quantum private comparison protocol based on four-particle GHZ states ⋮ Two semi-quantum key distribution protocols with G-like states ⋮ How to verify identity in the continuous variable quantum system? ⋮ Secured shared authentication key with two-way clock synchronization over multiparty quantum communication ⋮ A verifiable multi-party quantum key distribution protocol based on repetitive codes ⋮ Semi-quantum designated verifier signature scheme ⋮ Offline arbitrated semi-quantum signature scheme with four-particle cluster state ⋮ A novel quantum identity authentication based on Bell states ⋮ Three-party semi-quantum key agreement protocol ⋮ Improved semi-quantum key distribution with two almost-classical users ⋮ Quantum confidentiality query protocol based on Bell state identity ⋮ Semi-quantum voting protocol
Cites Work
- Security of a semi-quantum protocol where reflections contribute to the secret key
- Authenticated semi-quantum key distributions without classical channel
- Quantum cryptography: public key distribution and coin tossing
- Quantum deniable authentication protocol
- Restricted attacks on semi-quantum key distribution protocols
- Quantum identity authentication based on ping-pong technique without entanglements
- Semiquantum key distribution without invoking the classical party's measurement capability
- A proof of the security of quantum key distribution
- Quantum identity authentication based on ping-pong technique for photons
- Authenticated semi-quantum key distribution protocol using Bell states
- Fault-tolerant semiquantum key distribution over a collective-dephasing noise channel
- Quantum identity authentication with single photon
- Cryptanalysis on authenticated semi-quantum key distribution protocol using Bell states
- Semiquantum key distribution
- QUANTUM IDENTITY AUTHENTICATION USING GAUSSIAN-MODULATED SQUEEZED STATES
- Quantum Key Distribution with Classical Bob
- Unconditional security in quantum cryptography
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography using any two nonorthogonal states
- Measurement-device-independent semiquantum key distribution
- QUANTUM KEY DISTRIBUTION WITH CLASSICAL ALICE
- Mediated Semi‐Quantum Key Distribution Without Invoking Quantum Measurement
This page was built for publication: Semi-quantum identification