Skip to main content

and
  1. No Access

    Article

    Secure quantum network coding based on quantum homomorphic message authentication

    As the principal security threat, pollution attacks also seriously affect the security of quantum network coding, just like they do for the classical network coding. Based on this, we first propose two secure ...

    Zhen-zhen Li, Gang Xu, **u-Bo Chen, Yi-**an Yang in Quantum Information Processing (2018)

  2. No Access

    Article

    Quantum multi-proxy blind signature based on cluster state

    Different from traditional digital signatures, quantum blind signatures can implement a signature without knowing the specific content, and their security is guaranteed by the basic principles of quantum mecha...

    **g-**g Chen, Fu-Cheng You, Zhen-Zhen Li in Quantum Information Processing (2022)

  3. No Access

    Article

    Quantum sealed-bid auction protocol based on quantum secret sharing

    A quantum sealed-bid auction (QSA) with post-confirmation can realize the public verification of the honesty of bidders. In this paper, we apply the quantum secret sharing (QSS) into the post-confirmation. Sur...

    **g-Tao Wang, Yun Pan, Wen Liu, Zhen-Zhen Li in Quantum Information Processing (2022)

  4. No Access

    Article

    Semi-quantum ring signature protocol based on multi-particle GHZ state

    The emergence of semi-quantum protocols reduces the conditions for the implementation of quantum signatures, so that users without quantum capabilities can communicate securely. As a kind of quantum signature,...

    Run-Ze He, Zhen-Zhen Li, Qian-Hui Wang, Ya-**g Li in Quantum Information Processing (2023)