Search
Search Results
-
Semi-quantum Key Agreement Protocol Using W States
In response to the emerging security challenges brought about by advances in quantum technology, traditional key agreement methods are encountering...
-
Improvement and Flexible Multiparty Extension of Semi-Quantum Key Agreement Protocol
Zhou et al. (Int. J. Theor. Phys. 59, 663-676
2020 ) introduced a three-party semi-quantum key agreement protocol utilizing four-qubit cluster states.... -
Mutual Weak Quantum Users Key Agreement Protocol Based on Semi-Honest Quantum Server
Key agreement is an important research direction of key management. Different from the key distribution protocol, the key agreement protocol not only...
-
Multi-Party Semi-Quantum Key Agreement Protocol Based on the Four-Qubit Cluster States
A multi-party semi-quantum key agreement protocol was proposed based on delegating quantum computation with the four-qubit cluster states. By...
-
New Semi-Quantum Key Agreement Protocol Based on the χ-Type Entanglement States
A new two-party semi-quantum key agreement protocol is proposed with the four-particle χ-type entanglement states. In this protocol, the shared...
-
Security and application of semi-quantum key distribution protocol for users with different quantum capabilities
Semi-quantum protocols serve as a bridge between quantum users and “classical” users with limited quantum capabilities, providing support for...
-
Decoy state semi-quantum key distribution
Semi-quantum key distribution describes a system in which a fully quantum user and classical user perform key distribution. The main advantage of key...
-
Semi-device-independent quantum key agreement protocol
In quantum key agreement (QKA), a shared key is established among two or more parties where each participant equally contributes its part to the...
-
Multi-Party Quantum Key Agreement with Four-Qubit Cluster States Immune to Collusive Attack
Collusion attack is a complex cryptanalysis method that can effectively attack quantum key agreement protocol, where some dishonest participants can...
-
One-round semi-quantum-honest key agreement scheme in MSTSA structure without entanglement
Security, efficiency and universality are the major concerns in distributed computation for how to get the services securely as there are a large...
-
Measurement-device-independent continuous variable semi-quantum key distribution protocol
Aiming at the high cost of quantum equipment and the difficulty of preparing discrete variable quantum states, a measurement-device-independent...
-
Anonymous quantum conference key agreement using the W state
Anonymous conference key agreement (ACKA), also known as multiparty key distribution, is a cryptographic task in which multiple parties hope to...
-
Semi-Honest Three-Party Mutual Authentication Quantum Key Agreement Protocol Based on GHZ-Like State
Quantum key agreement (QKA) is an important branch of quantum cryptography. In this paper, we propose a mutual authenticated semi-honest key...
-
Efficient single-state multi-party quantum key agreement
In this paper, we proposed an efficient single-state three-party quantum key agreement (QKA) protocol. We proved that the protocol can resist...
-
A One-Round Quantum Mutual Authenticated Key Agreement Protocol with Semi-Honest Server Using Three-Particle Entangled States
In this paper, we propose a mutual authenticated quantum key agreement scheme based on three-particle entangled states, which can achieve both...
-
A measurement device independent multi-party quantum key agreement protocol with identity authentication
Multi-party quantum key agreement (MQKA) is a significant technique for generating shared keys among multiple participants in a secure and fair...
-
A Secure Authenticated Key Agreement Protocol Using Polynomials
Data communication is now an inseparable part of our day-to-day life. There are various aspects of data security, and authentication and key... -
Multi-party Quantum Key Agreement Protocol with Authentication
Utilizing the advantage of quantum entanglement swap**, a multi-party quantum key agreement protocol with authentication is proposed. In this...
-
A Semi-Quantum Private Comparison with High-Level Security Third Party
Based on three-particle pure states, a new anonymous semi-quantum privacy comparison is proposed to deal with the threat of quantum computing power...
-
Semi-quantum ring signature protocol based on multi-particle GHZ state
The emergence of semi-quantum protocols reduces the conditions for the implementation of quantum signatures, so that users without quantum...