The modeling library of eavesdropping methods in quantum cryptography protocols by model checking
From MaRDI portal
Publication:518056
DOI10.1007/s10773-016-2969-zzbMath1358.81097OpenAlexW2293156805MaRDI QIDQ518056
Yujie Hao, Fan Yang, Guo-wu Yang
Publication date: 28 March 2017
Published in: International Journal of Theoretical Physics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10773-016-2969-z
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A quantum protocol for millionaire problem with Bell states
- New quantum private comparison protocol using EPR pairs
- A protocol for the quantum private comparison of equality with \(\chi \)-type state
- Multi-party quantum private comparison protocol using \(d\)-dimensional basis states without entanglement swapping
- Quantum cryptography: public key distribution and coin tossing
- Multi-party quantum private comparison protocol based on \(d\)-dimensional entangled states
- The temporal logic of branching time
- Eavesdropping on the two-way quantum communication protocols with invisible photons
- Quantum private comparison protocol with \(d\)-dimensional Bell states
- Efficient quantum private comparison employing single photons and collective detection
- Multi-user private comparison protocol using GHZ class states
- Trojan-horse attacks on quantum key distribution with classical bob
- Multiparty secret sharing of quantum information based on entanglement swapping
- Bidirectional quantum secret sharing and secret splitting with polarized single photons
- Experimental quantum cryptography.
- Quantum Private Comparison Protocol Based on Bell Entangled States
- Automatic verification of finite-state concurrent systems using temporal logic specifications
- Quantum secret sharing