Eavesdropping in semiquantum key distribution protocol
From MaRDI portal
Publication:396615
DOI10.1016/j.ipl.2013.03.008zbMath1358.81087arXiv1205.2807OpenAlexW2087053732MaRDI QIDQ396615
Publication date: 13 August 2014
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1205.2807
cryptographyquantum cryptographyBB84 protocolbinary symmetric channeloptimal eavesdroppingsemiquantum key distribution
Quantum computation (81P68) Cryptography (94A60) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (9)
Semi-quantum cryptography ⋮ Advanced semi-quantum secure direct communication protocol based on Bell states against flip attack ⋮ Efficient and secure semi-quantum secure direct communication protocol against double CNOT attack ⋮ Multi‐Party Semi‐Quantum Key Distribution Protocol With Four‐Particle Cluster States ⋮ Three Attacks on the Mediated Semi‐Quantum Key Distribution without Invoking Quantum Measurement ⋮ Semi-quantum key agreement protocol using W states ⋮ Restricted attacks on semi-quantum key distribution protocols ⋮ Semi-quantum key distribution protocols with GHZ states ⋮ Quantum and semi-quantum blind signature schemes based on entanglement swapping
Cites Work
This page was built for publication: Eavesdropping in semiquantum key distribution protocol