Skip to main content

and
  1. No Access

    Article

    Estimating security of the quantum key distribution from the guesswork

    Quantum key distribution can provide information-theoretic security keys. In practice, the eavesdropper may attack the transmitted quantum state, which makes some information leakage to the generated key. The ...

    Hong-Wei Li, Jian-Hong Shi, Qing-Yu Cai, Chang-Pu Sun in Quantum Information Processing (2022)

  2. No Access

    Article

    An arbitrated quantum signature protocol based on the chained CNOT operations encryption

    At present, the encryption scheme used by most arbitrated quantum signature (AQS) protocols is quantum one-time pad (QOTP) which encrypts data qubit by qubit. Though QOTP can achieve high security for data enc...

    Feng-Guang Li, Jian-Hong Shi in Quantum Information Processing (2015)

  3. No Access

    Article

    A multiparty error-correcting method for quantum secret sharing

    Quantum secret sharing (QSS) refers to the process in which the secret is divided into several sub-secrets and sent to different users utilizing quantum technology. Only the user belonging to a specific subset...

    Rui-Ke Chen, Ying-Ying Zhang, Jian-Hong Shi in Quantum Information Processing (2014)

  4. No Access

    Article

    One-insider attack of quantum secret sharing protocol with collective eavesdrop**-check

    Recently, a kind of quantum secret sharing protocol with collective eavesdrop** check was proposed by Lin et al. In this paper, we present a one-insider attack against Lin’s three-party protocol. With the me...

    Jian-Hong Shi, Sheng-Li Zhang, Hai-Long Zhang in Quantum Information Processing (2014)