Quantum cryptography using any two nonorthogonal states

From MaRDI portal
Publication:4492082

DOI10.1103/PhysRevLett.68.3121zbMath0969.94501OpenAlexW2006226307WikidataQ28060508 ScholiaQ28060508MaRDI QIDQ4492082

Charles H. Bennett

Publication date: 16 July 2000

Published in: Physical Review Letters (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1103/physrevlett.68.3121



Related Items

Four-state quantum key distribution exploiting maximum mutual information measurement strategy, A new quantum proxy multi-signature scheme using maximally entangled seven-qubit states, Quantum authencryption with two-photon entangled states for off-line communicants, A novel quantum blind signature scheme with four-particle GHZ states, Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach, Efficient multi-party quantum key agreement by cluster states, Quantum key distribution based on interferometry and interaction-free measurement, Robust anti-collective noise quantum secure direct dialogue using logical Bell states, Cryptographic encryption scheme based on metastable excited nuclei, Which verification qubits perform best for secure communication in noisy channel?, A novel quantum blind signature scheme with four-particle cluster states, Efficient quantum secure direct communication using the orbital angular momentum of single photons, Security of a semi-quantum protocol where reflections contribute to the secret key, Efficient multiparty quantum key agreement protocol based on commutative encryption, Controlled quantum secure direct communication by entanglement distillation or generalized measurement, Revisiting quantum authentication scheme based on entanglement swapping, Three-party quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom, General monogamy property of global quantum discord and the application, Study on the security of the authentication scheme with key recycling in QKD, Upconversion-based receivers for quantum hacking-resistant quantum key distribution, Quantum private query based on single-photon interference, Continuous-variable quantum identity authentication based on quantum teleportation, Trojan horse attack free fault-tolerant quantum key distribution protocols using GHZ states, Security analysis of an arbitrated quantum signature scheme with Bell states, Attack and improvements of fair quantum blind signature schemes, Quantum private comparison against decoherence noise, Quantum computation and entangled state generation via long-range off-resonant Raman coupling, A quantum protocol for millionaire problem with Bell states, Tripartite entanglement of electron spins of noninteracting electron gases, Efficient arbitrated quantum signature and its proof of security, Quantum state sharing of an arbitrary three-qubit state by using three sets of W-class states, Reexamination of arbitrated quantum signature: the impossible and the possible, Efficient bidirectional quantum secure communication with two-photon entanglement, Quantumness of quantum ensembles, Fault-tolerate quantum private comparison based on GHZ states and ECC, Quantum private comparison protocol with the random rotation, Security analyses and improvement of arbitrated quantum signature with an untrusted arbitrator, Quantum dialogue with authentication based on Bell states, Quantum computation and entangled-state generation through photon emission and absorption processes in separated cavities, An efficient multiparty quantum secret sharing protocol based on Bell states in the high dimension Hilbert space, The cryptanalysis of Yuan et al.'s multiparty quantum secret sharing protocol, Cryptanalysis of the quantum group signature protocols, Controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding, One-time pads cannot be used to improve the efficiency of quantum communication, A simplified quantum logic network for unambiguous discrimination of two nonlocal and unknown pure qubit states, On the impossibility of non-static quantum bit commitment between two parties, Comment on: ``Secure direct communication based on ping-pong protocol, Perfect state distinguishability and computational speedups with postselected closed timelike curves, Improved quantum `ping-pong protocol based on five-qubit GHZ state and classical CNOT operation, Eavesdropping and improvement to multiparty quantum secret sharing with collective eavesdropping-check, Quantum private comparison using genuine four-particle entangled states, Notes on entropic uncertainty relations beyond the scope of Riesz's theorem, Extensible router for a quantum key distribution network, Multiparty joint remote preparation of an arbitrary GHZ-class state via positive operator-valued measurement, A modified quantum key distribution without public announcement bases against photon-number-splitting attack, Improvement on ``quantum key agreement protocol with maximally entangled states, On the role of \textit{a priori} knowledge in the optimization of quantum information processing, Reply to: ``Comment on: `Efficient high-capacity quantum secret sharing with two-photon entanglement' [Phys. Lett. A 372 (2008) 1957 [\textit{F. G. Deng} et al. Phys. Lett. A 373, No. 3., 396-398 (2009)]], Quantum secure direct communication with two-photon four-qubit cluster states, An online banking system based on quantum cryptography communication, A continuous variable quantum key distribution protocol based on entanglement swapping of quasi-Bell entangled coherent states, Quantum private comparison based on phase encoding of single photons, Quantum key distribution via tripartite coherent states, Quantum deniable authentication protocol, Analysis of counterfactual quantum key distribution using error-correcting theory, Multi-party quantum private comparison protocol based on \(d\)-dimensional entangled states, An arbitrated quantum signature with Bell states, Forgery attack on one-time proxy signature and the improvement, Orthogonal-state-based deterministic secure quantum communication without actual transmission of the message qubits, Two-step orthogonal-state-based protocol of quantum secure direct communication with the help of order-rearrangement technique, A non-entanglement quantum single sign-on protocol, A two-state entanglement based quantum single sign-on protocol, Security of a sessional blind signature based on quantum cryptograph, Three-qubit entanglement generation of quantum states dissipating into a common environment, A practical protocol for three-party authenticated quantum key distribution, Protocols of quantum key agreement solely using Bell states and Bell measurement, Semi-automated verification of security proofs of quantum cryptographic protocols, An improved multidimensional reconciliation algorithm for continuous-variable quantum key distribution, Two quantum protocols for secure Hamming distance computation, Maximally entangled states in discrete and Gaussian regimes, Derivative of the disturbance with respect to information from quantum measurements, Two-party quantum key agreement over a collective noisy channel, New quantum key agreement protocols based on cluster states, A new \(n\)-party quantum secret sharing model based on multiparty entangled states, A novel protocol for multiparty quantum key management, Quantum private comparison over noisy channels, A comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocols, Classical-quantum arbitrarily varying wiretap channel: Ahlswede dichotomy, positivity, resources, super-activation, Deterministic joint remote preparation of arbitrary four-qubit cluster-type state using EPR pairs, A quantum multi-proxy weak blind signature scheme based on entanglement swapping, Information leakage in efficient bidirectional quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom, Optimal symmetric ternary quantum encryption schemes, Photonic four-qubit entangled decoherence-free states assisted by cavity-QED system, Cryptanalysis of controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad, Fault-tolerant remote quantum entanglement establishment for secure quantum communications, Robust quantum private queries, Multi-proxy strong blind quantum signature scheme, Deterministic secure quantum communication and authentication protocol based on extended GHZ-W state and quantum one-time pad, Deterministic joint remote preparation of a four-qubit cluster-type state via GHZ states, Side channel passive quantum key distribution with one uninformative state, Controlling the key by choosing the detection bits in quantum cryptographic protocols, DETERMINISTIC QUANTUM KEY DISTRIBUTION USING STABILIZER QUANTUM CODE, Quantum combinatorial designs and k-uniform states, GENERALIZED THREE-PARTY QUBIT OPERATION SHARING, Construction of special entangled basis based on generalized weighing matrices, Wave-particle duality employing quantum coherence in superposition with non-orthogonal pointers, Effect of losses on phase noise, Arbitrated quantum signature protocol with boson sampling-based random unitary encryption, Unknown quantum states: The quantum de Finetti representation, Constructions of irredundant orthogonal arrays, Significance of Bell states over four-qubit entangled states in quantum bidirectional direct communication protocols, Asymptotically optimal prepare-measure quantum key distribution protocol, On postselective modifications of quantum observables, Mediated Semi‐Quantum Key Distribution Without Invoking Quantum Measurement, Quantum Key‐Distribution Protocols Based on a Quantum Version of the Monty Hall Game, Two-party quantum key agreement with six-particle entangled states against collective noise, Synthesis and Upper Bound of Schmidt Rank of Bipartite Controlled‐Unitary Gates, Finite‐Size Analysis of Thermal States Quantum Cryptography with the Optimal Noise, Optimal Discrimination of Two Nonorthogonal States by Continuous Probing and Feedback Operation, Coherent state quantum key distribution with multi letter phase-shift keying, Multi-party quantum private information comparison based on nonlocal orthogonal product states, Memory-free quantum secret sharing protocol with collective detection, Quantum \(k\)-uniform states from quantum orthogonal arrays, Role of Steering Inequality in Quantum Key Distribution Protocol, A quantum blockchain-enabled framework for secure private electronic medical records in Internet of medical things, Unambiguous State Discrimination Attack on the B92 Protocol of Quantum Key Distribution with Single Photons, Demonstration of \(\mathcal{PT}\)-symmetric quantum state discrimination, Discrimination of coherent states via atom–field interaction without rotation wave approximation, A proposal for device independent probabilistic quantum oblivious transfer, Security loophole and improvement of quantum private query protocol based on W state, Multi-user semi-device independent quantum private query, Security analysis for single-state circular mediated semi-quantum key distribution, Practical demonstration of quantum key distribution protocol with error correction mechanism, A quantum key distribution on qudits using quantum operators, Influence of the Stark shift and field nonclassicality on the dynamics of non-classical correlations of N two-level atomic system, Improved and formal proposal for device-independent quantum private query *, Quantum key distribution without the wavefunction, Operational framework for quantum measurement simulability, Quantum cryptography: Protecting our future networks with quantum mechanics, Measurement-device-independent quantum private query with qutrits, Optimal LSBs-based quantum watermarking with lower distortion, Quantum Cryptography: Key Distribution and Beyond, QUANTUM SECURE CONDITIONAL DIRECT COMMUNICATION VIA EPR PAIRS, EFFICIENT QUANTUM KEY DISTRIBUTION SCHEME USING THE BELL STATE MEASUREMENT, Two-way quantum key distribution in a uniformly distributed quantum space via a special mapping and its analytical security proofs, AN EFFICIENT MULTIPARTY QUANTUM KEY DISTRIBUTION SCHEME, Analysis of achievable distances of BB84 and KMB09 QKD protocols, Uniqueness of the joint measurement and the structure of the set of compatible quantum measurements, Comment on “Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair”, SECURITY OF QUANTUM KEY DISTRIBUTION WITH STRONG PHASE-REFERENCE PULSE, QUANTUM KEY EVOLUTION AND ITS APPLICATIONS, CRYPTANALYSIS OF THE QSDC PROTOCOL WITHOUT USING PERFECT QUANTUM CHANNEL, AN EFFICIENT PROTOCOL FOR QUANTUM SECURE DIALOGUE WITH AUTHENTICATION BY USING SINGLE PHOTONS, ENTANGLEMENT CONCENTRATION WITH CROSS-KERR NONLINEARITY, Thermal entanglement in a mixed spin Heisenberg XXX chain with DM interaction, PARTIALLY BLIND SIGNATURES BASED ON QUANTUM CRYPTOGRAPHY, THE PHYSICS OF QUANTUM INFORMATION: COMPLEMENTARITY, UNCERTAINTY, AND ENTANGLEMENT, Improvement on "an efficient protocol for the quantum private comparison of equality with W state", Quantum key distribution and quantum authentication based on entangled state, Positive-operator and projection valued measurements in quantum key distribution, A Less Known Side of Quantum Cryptography, Nonclassical properties and polarization degree of photon-subtracted entangled nonlinear coherent states, Knapsack encoding for secured quantum key distribution protocol, Two quantum private query protocols based on Bell states and single photons, Tripartite quantum operation sharing with six-qubit highly entangled state, A two-dimensional quantum key distribution protocol based on polarization-phase encoding, BASIC OPERATIONS AMONG ENTANGLED STATES AND THEIR APPLICATIONS TO QUANTUM PROTOCOLS, Security analysis of KXB10 QKD protocol with higher-dimensional quantum states, QUANTUM BIT STRING SEALING, Model Checking Omega-regular Properties for Quantum Markov Chains, Orthogonal-state-based cryptography in quantum mechanics and local post-quantum theories, Quantum Cryptography Based on Orthogonal States, Quantum Cryptography Based on Split Transmission of One-Bit Information in Two Steps, Transitions in Quantum Networks, Quantum Gambling, Multi-partite squash operation and its application to device-independent quantum key distribution, High performance reconciliation for continuous-variable quantum key distribution with LDPC code, Quantum blind signature with an offline repository, The transmission efficiency analysis for quantum secure direct communications over noisy channels, On ergotropic gap of tripartite separable systems, Oblivious transfer based on single-qubit rotations, Tighter monogamy and polygamy relations for a superposition of the generalized W-class state and vacuum, High-capacity quantum key distribution based on hyperentangled Bell states and hyper-encoding, Security analysis with improved design of post-confirmation mechanism for quantum sealed-bid auction with single photons, A one-way function from thermodynamics and applications to cryptography, Splitting information securely with entanglement, Arbitrated quantum signature of quantum messages with a semi-honest arbitrator, An improved arbitrated quantum scheme with Bell states, Advanced unambiguous state discrimination attack and countermeasure strategy in a practical B92 QKD system, Dynamical evolution of entanglement of a three-qubit system driven by a classical environmental colored noise, New field of cryptography: DNA cryptography, Quantum sealed-bid auction using a modified scheme for multiparty circular quantum key agreement, Multi-party quantum private comparison based on the entanglement swapping of \(d\)-level cat states and \(d\)-level Bell states, Authenticated semi-quantum key distribution protocol using Bell states, Quantum cryptography over non-Markovian channels, Semiquantum secure direct communication using EPR pairs, Comment on A practical protocol for three-party authenticated quantum key distribution, Quantum secret sharing of secure direct communication using one-time pad, Deterministic secure quantum communication with collective detection using single photons, Comment on ``Quantum secure direct communication with authentication expansion using single photons, Quantum secure direct communication with optimal quantum superdense coding by using general four-qubit states, Tripartite entanglement of a spin star model with Dzialoshinski-Moriya interaction, Multipartite distribution property of one way discord beyond measurement, Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue, Quantum authenticated direct communication using Bell states, A quantum protocol for \((t,n)\)-threshold identity authentication based on Greenberger-Horne-Zeilinger states, Quantum private communication with an anonymous sender, Authenticated communication from quantum readout of pufs, Improved secure multiparty computation with a dishonest majority via quantum means, Quantum tasks with non-maximally quantum channels via positive operator-valued measurement, Probabilistic and controlled teleportation of unknown quantum states, The security problems in some novel arbitrated quantum signature protocols, Fault-tolerant semiquantum key distribution over a collective-dephasing noise channel, A robust and efficient quantum private comparison of equality based on the entangled swapping of GHZ-like state and \(\chi^+\) state, The probe attack on the Bennett-Brassard 1984 protocol in the presences of noisy amplitude damping channel, Asymmetric quantum dialogue in noisy environment, Allowed region and optimal measurement for information versus disturbance in quantum measurements, A protocol for the secure two-party quantum scalar product, Security analysis of measurement-device-independent quantum key distribution in collective-rotation noisy environment, Efficient quantum private communication based on dynamic control code sequence, Efficient quantum key distribution using Fibonacci-number coding with a biased basis choice, Comment on ``High-dimensional deterministic multiparty quantum secret sharing without unitary operations, Comment on quantum private comparison protocols with a semi-honest third party, Efficient quantum private comparison employing single photons and collective detection, Bipartite coherent-state quantum key distribution with strong reference pulse, Quantum proxy multi-signature scheme using genuinely entangled six qubits state, Quantum key distribution without alternative measurements and rotations, Quantum protocols for untrusted computations, Time asymmetry in quantum mechanics: a retrodiction paradox, Threshold quantum secure direct communication without entanglement, Many-agent controlled teleportation of multi-qubit quantum information, Improved Wójcik's eavesdropping attack on ping-pong protocol without eavesdropping-induced channel loss, A probabilistic cloning machine for replicating two non-orthogonal states, Quantum cryptography with polarizing interferometers, The role of frame force in quantum detection, Quantum dialogue protocol with continuous-variable single-mode squeezed states, Quantum secure direct communication network with Einstein-Podolsky-Rosen pairs, Multiparty sealed-bid auction protocol based on the correlation of four-particle entangled state, Semi-quantum key distribution protocols with GHZ states, New probabilistic quantum key distribution protocol, New quantum key distribution scheme based on random hybrid quantum channel with EPR pairs and GHZ states, Offline arbitrated quantum blind dual-signature protocol with better performance in resisting existential forgery attack, Quantum multi-proxy blind signature scheme based on four-qubit cluster states, Multiparty quantum key agreement based on three-photon entanglement with unidirectional qubit transmission, Tighter weighted polygamy inequalities of multipartite entanglement in arbitrary-dimensional quantum systems, Threshold proxy quantum signature scheme with threshold shared verification, The statistical fluctuation study of quantum key distribution in means of uncertainty principle, Cryptanalysis of secret sharing with a single \(d\)-level quantum system, Unconditional security of a \(K\)-state quantum key distribution protocol, Kak's three-stage protocol of secure quantum communication revisited: hitherto unknown strengths and weaknesses of the protocol, Secure multi-party quantum summation based on quantum Fourier transform, Security of a single-state semi-quantum key distribution protocol, Two-party quantum key agreement protocols under collective noise channel, Controlled mutual quantum entity authentication with an untrusted third party, Quantum conference, Geometric structure of quantum resources for Bell-diagonal states, Decoherence can help quantum cryptographic security, Security proof for round-robin differential phase shift QKD, Multi-party quantum private comparison of size relation with \(d\)-level single-particle states, Sequential state discrimination with quantum correlation, X states of the same spectrum and entanglement as all two-qubit states, Practical aspects of terahertz wireless quantum key distribution in indoor environments, Multiparty semi-quantum secret sharing with \(d\)-level single-particle states, Semi-quantum key agreement and private comparison protocols using Bell states, An efficient quantum sealed bidding auction scheme based on the correlation of genuine five-qubit entangled state, Quantum cryptography, Quantum key distribution using a \(\chi\)-type state, Protecting single-photon entanglement with imperfect single-photon source, Multiparty quantum English auction scheme using single photons as message carrier, Novel multi-party quantum key agreement protocol with G-like states and Bell states, Efficient bidirectional quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom, A quantum single sign-on protocol based on GHZ states, Quantum key agreement protocols with four-qubit cluster states, Fault-tolerant authenticated quantum dialogue using logical Bell states, An integrated hierarchical dynamic quantum secret sharing protocol, A general approach to physical realization of unambiguous quantum-state discrimination, Comment on ``Quantum key distribution and quantum authentication based on entangled state, Optimizing scheme for remote preparation of four-particle cluster-like entangled states, No-clone smartcard via quantum memory, Controlled quantum secure direct communication by Using four particle cluster states, Secure direct communication based on ping-pong protocol, Quantum model of computations: Underlying principles and achievements, Optimum unambiguous discrimination between subsets of quantum states, Approximate bang-bang control assisted rapid switching feedback stabilization for stochastic qubit systems, A novel quantum proxy blind signature scheme, Authenticated QKD based on orthogonal states, Quantumness of pure-state ensembles via coherence of Gram matrix based on generalized \(\alpha\)-\(z\)-relative Rényi entropy, Survey of information security, Scheme for realizing deterministic entanglement concentration with atoms via cavity QED, Measurement-device-independent quantum key agreement against collective noisy channel, Multi-party quantum key agreement protocol for detection of collusive attacks in each sub-circle segment by headers, Transferable quantum cheque scheme based on quantum public-key cryptography, Device independent quantum key distribution using three-party pseudo-telepathy, Cryptanalysis on authenticated semi-quantum key distribution protocol using Bell states, Classical-quantum arbitrarily varying wiretap channel: common randomness assisted code and continuity, Teleportation-based continuous variable quantum cryptography, An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption, Optimal probabilistic dense coding schemes, Multiparty simultaneous quantum identity authentication with secret sharing, Multi-party semi-quantum secure direct communication protocol with cluster states, Cryptanalysis and improvement of multiparty quantum sealed-bid auction, Quantum secure direct communication by swapping entanglements of \(3\times 3\)-dimensional Bell states, Improving the security of arbitrated quantum signature against the forgery attack, Quantum private comparison protocol based on entanglement swapping of \(d\)-level Bell states, Improvements on ``multiparty quantum key agreement with single particles, Minimum-error state discrimination and quantitative wave particle duality, Asymmetric ``4+2 protocol for quantum key distribution with finite resources, Single sign-on under quantum cryptography, A chaos-based arbitrated quantum signature scheme in quantum crypotosystem, High-capacity quantum summation with single photons in both polarization and spatial-mode degrees of freedom, Generalized discrimination between symmetric coherent states for eavesdropping in quantum cryptography, An arbitrated quantum signature scheme with fast signing and verifying, Quantumness of ensembles via coherence, Hybrid quantum cloning machine, Role of Bell-CHSH violation and local filtering in quantum key distribution, A secure quantum voting scheme based on orthogonal product states, Quantifying the quantumness of ensembles via generalized \(\alpha\)-\(z\)-relative Rényi entropy, Key expanding in measurement-device-independent quantum key distribution, Cryptanalysis and improvement in multi-party quantum key distribution protocol with new Bell states encoding mode, Verifiable quantum key exchange with authentication, On eavesdropping strategy for symmetric coherent states quantum cryptography using heterodyne measurement, On the information-splitting essence of two types of quantum key distribution protocols, Fine-grained uncertainty relations for several quantum measurements, Controlled probabilistic quantum key distribution using a ground state, Private database queries using one quantum state, Quantum sealed-bid auction protocol based on semi-honest model, Entanglement dynamics and symmetry breaking in symmetric four qubits GHZ- and W-type states coupled to classical random telegraph noise in mixed environments, Classification of classical non-Gaussian noises with respect to their detrimental effects on the evolution of entanglement using a system of three-qubit as probe, On the group-theoretic structure of a class of quantum dialogue protocols, Coherence of quantum ensemble as a dual to uncertainty for a single observable, The cryptanalysis and improvement of a particular quantum voting model, Quantum secure direct communication with mutual authentication using a single basis, A novel quantum group proxy blind signature scheme based on five-qubit entangled state, Multi-party quantum key distribution protocol without information leakage, New secure quantum dialogue protocols over collective noisy channels, A multi-party quantum key agreement protocol based on Shamir's secret sharing, Verifiable quantum secret sharing protocols based on four-qubit entangled states, Circular multi-party quantum private comparison with \(n\)-level single-particle states, The security analysis of quantum B92 protocol in collective-rotation noise channel, Multi-party quantum key agreement protocol with Bell states and single particles, Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party, Further results on 2-uniform states arising from irredundant orthogonal arrays, Dynamic multi-party quantum key agreement protocol based on commutative encryption, Cluster-state-based quantum secret sharing for users with different abilities, Improved deterministic \(N\)-to-one joint remote preparation of an arbitrary qubit via EPR pairs, Cryptanalysis of a quantum proxy weak blind signature scheme, Fault-tolerant quantum secure direct communication protocol based on decoherence-free states, Quantum signature scheme using a single qubit rotation operator, Quantum identity authentication in the orthogonal-state-encoding QKD system, Controlled SWAP attack and improved quantum encryption of arbitrated quantum signature schemes, Superposition of two-mode ``near coherent states: non-classicality and entanglement, Arbitrated quantum signature scheme with quantum walk-based teleportation, Error correction in quantum cryptography based on artificial neural networks, Quantum e-commerce: a comparative study of possible protocols for online shopping and other tasks related to e-commerce, Semi-quantum identification, Tighter monogamy relations in multi-qubit systems, Optimized decision strategy for quadrature phase-shift-keying unambiguous states discrimination, Efficient chain-encryption-based quantum signature scheme with semi-trusted arbitrator, Measurement device-independent quantum secure direct communication with user authentication, Public-key quantum signature for classical messages without third-party verification, Revisiting unambiguous discrimination, A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?, Novel constructions of mutually unbiased tripartite absolutely maximally entangled bases, New quantum key agreement protocols based on Bell states, Process estimation in qubit systems: a quantum decision theory approach, Three-party quantum secret sharing against collective noise, Linear optics-based entanglement concentration protocols for cluster-type entangled coherent state, Quantum multi-proxy blind signature based on cluster state, Multipartite mixed maximally entangled states: mixed states with entanglement 1, Quantum and semi-quantum sealed-bid auction: vulnerabilities and advantages, Higher-rate quantum key expansion scheme, A quantum private comparison protocol with splitting information carriers, Local quantum uncertainty for the thermal state of a four-qubit spin chain under decoherence channels, High-dimensional quantum key distribution based on qudits transmission with quantum Fourier transform, Individual attacks with generalized discrimination and inadequacy of some information measures, Controlled secure direct quantum communication inspired scheme for quantum identity authentication, A four-state entanglement based quantum single sign-on protocol, Multi-party quantum key agreement protocol based on G-like states and \(\chi^+\) states, Quantifying the quantumness of an ensemble of quantum states, Thermal entanglement of a coupled electronic spins system: interplay between an external magnetic field, nuclear field and spin-orbit interaction, Two-layer quantum key distribution, An arbitrated quantum signature protocol based on the chained CNOT operations encryption, Efficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: different alternative approaches, Bound on distributed entanglement, Quantum Cryptography over Underground Optical Fibers, Quantum Key Distribution and String Oblivious Transfer in Noisy Channels, Novel quantum proxy signature without entanglement, Encoding secret information in measurement settings, Two-qutrit entangled \(f\)-coherent states, Counterfactual quantum cryptography network with untrusted relay, Two-party quantum key agreement against collective noisy channel, Better quantum control does not imply better discrimination effect, Measurement-device-independent quantum key distribution with uncharacterized coherent sources, Tighter constraints of multiqubit entanglement for negativity, Discriminating two non-orthogonal states against decoherence by feedback control, Measure-resend authenticated semi-quantum key distribution with single photons, Correlance and discordance: computable measures of nonlocal correlation, Asymptotic security analysis of teleportation-based quantum cryptography, Quantum direct communication protocols using discrete-time quantum walk, Sample-size-reduction of quantum states for the noisy linear problem, New results for 2-uniform states based on irredundant orthogonal arrays, Quantum public-key encryption schemes based on conjugate coding, A novel three-party quantum secret sharing scheme based on Bell state sequential measurements with application in quantum image sharing, A game-theoretic security framework for quantum cryptography: performance analysis and application, Novel reconciliation protocol based on spinal code for continuous-variable quantum key distribution, High-capacity measurement-device-independent quantum secure direct communication, Continuous variable B92 quantum key distribution protocol using single photon added and subtracted coherent states, A novel quantum \((t, n)\) threshold group signature based on \(d\)-dimensional quantum system, Novel encoding-decoding procedure for quantum key distribution, Quantum algorithm for quantum state discrimination via partial negation and weak measurement, Analysis of a high-dimensional extended B92 protocol, CONTINUOUS VARIABLE QUANTUM SIGNATURE ALGORITHM, Differential phase encoded measurement-device-independent quantum key distribution, Quantum dialogue mediated by EPR-type entangled coherent states, A quantum voting protocol using single-particle states, Device-independent quantum key distribution using random quantum states, Detector blinding attacks on counterfactual quantum key distribution, Quantum sealed-bid auction protocol for simultaneous ascending auction with GHZ states, An efficient controlled quantum secure direct communication and authentication by using four particle cluster states, SECURITY OF QUANTUM KEY DISTRIBUTION, SECURE DIRECT COMMUNICATION USING DETERMINISTIC BB84 PROTOCOL, PERFECT CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION, DETERMINISTIC SECURE QUANTUM COMMUNICATION ACHIEVED BY USING QUANTUM SWAPPING, Probabilistic bisimulations for quantum processes, Improving Wójcik's eavesdropping attack on the ping-pong protocol, Quantum Key Distribution, Attack Strategies on QKD Protocols, ENTANGLEMENT DYNAMICS OF THREE-QUBIT STATES UNDER A SPIN ENVIRONMENT, QUANTUM KEY DISTRIBUTION AND REMOTE STATE PREPARATION VIA CLUSTER STATE, Discrimination of quantum states, A comparative study of the optical and circuit representation of the unambiguous quantum state discriminator, Generalized measurements for optimally discriminating two mixed states and their linear-optical implementation, QUANTUM AUTHENTICATION USING ENTANGLED STATES, QUANTUM DIRECT COMMUNICATION BASED ON QUANTUM SEARCH ALGORITHM, TWO-WAY QUANTUM-BIT-STRING COMMITMENT, ONE-PARTY QUANTUM-ERROR-CORRECTING CODES FOR UNBALANCED ERRORS: PRINCIPLES AND APPLICATION TO QUANTUM DENSE CODING AND QUANTUM SECURE DIRECT COMMUNICATION, Unambiguous state discrimination in quantum key distribution, Performance analysis for Brandt's conclusive entangling probe, Efficiency of the Eavesdropping in B92 QKD Protocol with a QCM, INFEASIBILITY OF QUANTUM CRYPTOGRAPHY WITHOUT EAVESDROPPING CHECK, A TWO-STEP CHANNEL-ENCRYPTING QUANTUM KEY DISTRIBUTION PROTOCOL, QUANTUM KEY DISTRIBUTION BY CONSTRUCTING NONORTHOGONAL STATES WITH BELL STATES, A novel quantum group signature scheme without using entangled states, OPTIMAL EAVESDROPPING ON NOISY STATES IN QUANTUM KEY DISTRIBUTION, Quantum entanglement, Reference frames, superselection rules, and quantum information, Quantum information with continuous variables, Information and computation: Classical and quantum aspects, FAULT-TOLERATE QUANTUM KEY DISTRIBUTION OVER A COLLECTIVE-NOISE CHANNEL, ERROR-REJECTING BENNETT–BRASSARD–MERMIN QUANTUM KEY DISTRIBUTION PROTOCOL BASED ON LINEAR OPTICS OVER A COLLECTIVE-NOISE CHANNEL, CONDITIONS FOR BIPARTITE GENERAL BELL STATES, DOUBLING THE CAPACITY OF QUANTUM KEY DISTRIBUTION BY USING BOTH POLARIZATION AND DIFFERENTIAL PHASE SHIFT, Circular Semi-Quantum Secret Sharing Using Single Particles, A robust quantum receiver for phase shift keyed signals, Tighter Constraints of Multiqubit Entanglement*, STABLE AND DETERMINISTIC QUANTUM KEY DISTRIBUTION BASED ON DIFFERENTIAL PHASE SHIFT, OPTIMAL CLONING WITH RESPECT TO THE RELATIVE ERROR, Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications, ENTANGLEMENT ENHANCES THE SECURITY OF ARBITRATED QUANTUM SIGNATURE, THERMAL ENTANGLEMENT OF A TWO-QUTRIT XXZ SPIN CHAIN WITH DZIALOSHISKI-MORIYA INTERACTION, Multiple-copy two-state discrimination with individual measurements, Unambiguous discrimination of special sets of multipartite states using local measurements and classical communication, Distinguishing the elements of a full product basis set needs only projective measurements and classical communication, Time coding protocols for quantum key distribution, Robustness of non-Abelian holonomic quantum gates against parametric noise, FAULT TOLERANT QUANTUM KEY DISTRIBUTION BASED ON QUANTUM DENSE CODING WITH COLLECTIVE NOISE, NEW ARBITRATED QUANTUM SIGNATURE WITH MESSAGE RECOVERY, BEYOND THE GOLDENBERG–VAIDMAN PROTOCOL: SECURE AND EFFICIENT QUANTUM COMMUNICATION USING ARBITRARY, ORTHOGONAL, MULTI-PARTICLE QUANTUM STATES, Primality Test Via Quantum Factorization, Strategies for discriminating between non-orthogonal quantum states, Communication Using Quantum States, Quantum Cryptography Using Polarization Feedback, Bell's Inequality and Rejected-data Protocols for Quantum Cryptography, Quantum Cryptography with Photon Pairs, Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels, Securing QKD links in the full Hilbert space, CERTAIN QUANTUM KEY DISTRIBUTION ACHIEVED BY USING BELL STATES, AN EFFICIENT PROTOCOL FOR SECURE AND DETERMINISTIC QUANTUM KEY EXPANSION, AN ALGORITHM TO PERFORM POVMS THROUGH NEUMARK THEOREM: APPLICATION TO THE DISCRIMINATION OF NON-ORTHOGONAL PURE QUANTUM STATES, Feynman graphs and the large dimensional limit of multipartite entanglement, AN ARBITRATED QUANTUM SIGNATURE SCHEME BASED ON HYPERCHAOTIC QUANTUM CRYPTOSYSTEM, Quantum information in communication and imaging, Quantum correlations and distinguishability of quantum states



Cites Work