Access the full text.
Sign up today, get DeepDyve free for 14 days.
Fuguo Deng, G. Long, Xiao-Shu Liu (2003)
Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair blockPhysical Review A, 68
Wei Huang, Qi Su, Xia Wu, Yan-Bing Li, Ying Sun (2014)
Quantum Key Agreement Against Collective DecoherenceInternational Journal of Theoretical Physics, 53
J. Renes, R. Renner, David Sutter (2013)
Efficient One-Way Secret-Key Agreement and Private Channel Coding via Polarization
K. Boström, T. Felbinger (2002)
Deterministic secure direct communication using entanglement.Physical review letters, 89 18
Wei Huang, Q. Wen, Bin Liu, Qi Su, F. Gao (2013)
Cryptanalysis of a multi-party quantum key agreement protocol with single particlesQuantum Information Processing, 13
D. Shen, Wenping Ma, Xunru Yin, Xiaoping Li (2013)
Quantum Dialogue with Authentication Based on Bell StatesInternational Journal of Theoretical Physics, 52
Chitra Shukla, Vivek Kothari, A. Banerjee, A. Pathak (2012)
On the group-theoretic structure of a class of quantum dialogue protocolsPhysics Letters A, 377
Tingting Song, Zhang Jie, Gao Fei, Qiao-yan Wen, F. Zhu (2009)
Participant attack on quantum secret sharing based on entanglement swappingChinese Physics B, 18
Han-Cheng Shih, Kuo-Chang Lee, T. Hwang (2009)
New Efficient Three-Party Quantum Key Distribution ProtocolsIEEE Journal of Selected Topics in Quantum Electronics, 15
Bin Liu, F. Gao, Wei Huang, Q. Wen (2012)
Multiparty quantum key agreement with single particlesQuantum Information Processing, 12
Zhiwei Sun, Cai Zhang, Banghai Wang, Qin Li, Dongyang Long (2013)
Improvements on “multiparty quantum key agreement with single particles”Quantum Information Processing, 12
Run-hua Shi, Hong Zhong (2012)
Multiparty quantum secret sharing with the pure entangled two-photon statesQuantum Information Processing, 11
F. Gao, S. Qin, Q. Wen, F. Zhu (2007)
A simple participant attack on the brádler-dušek protocolQuantum Inf. Comput., 7
Wei Huang, Q. Wen, Bin Liu, F. Gao, Ying Sun (2013)
Quantum key agreement with EPR pairs and single-particle measurementsQuantum Information Processing, 13
Run-hua Shi, Hong Zhong (2013)
Multi-party quantum key agreement with bell states and bell measurementsQuantum Information Processing, 12
Nanrun Zhou, Guihua Zeng, Jin Xiong (2004)
Quantum key agreement protocolElectronics Letters, 40
(2007)
Comment on: “Quantum exam” Phys
F. Guo, S. Qin, F. Gao, S. Lin, Qiao-yan Wen, F. Zhu (2010)
Participant attack on a kind of MQSS schemes based on entanglement swappingThe European Physical Journal D, 56
T. Hwang, Kuo-Chang Lee (2007)
EPR quantum key distribution protocols with potential 100% qubit efficiencyIET Inf. Secur., 1
Hoi-Kwong Lo, Yi Zhao (1995)
Quantum Cryptography
Xunru Yin, Wenping Ma, Wei-yan Liu, D. Shen (2013)
Efficient bidirectional quantum secure communication with two-photon entanglementQuantum Information Processing, 12
Xunru Yin, Wenping Ma, Wei-yan Liu (2013)
Three-Party Quantum Key Agreement with Two-Photon EntanglementInternational Journal of Theoretical Physics, 52
Song-Kong Chong, Chia-Wei Tsai, T. Hwang (2011)
Improvement on “Quantum Key Agreement Protocol with Maximally Entangled States”International Journal of Theoretical Physics, 50
D. Jackson, G. Hockney (2004)
Securing QKD Links in the Full Hilbert SpaceQuantum Information Processing, 4
A. Allati, M. Baz, Y. Hassouni (2011)
Quantum key distribution via tripartite coherent statesQuantum Information Processing, 10
F. Gao, F. Guo, Q. Wen, F. Zhu (2005)
On the information-splitting essence of two types of quantum key distribution protocolsPhysics Letters A, 355
Yuguang Yang, Yuan Wang, Hai-Ping Chai, Yi-Wei Teng, Hua Zhang (2011)
Member expansion in quantum (t,n) threshold secret sharing schemesOptics Communications, 284
Song-Kong Chong, T. Hwang (2010)
Quantum key agreement protocol based on BB84Optics Communications, 283
H. Briegel, R. Raussendorf (2000)
Persistent entanglement in arrays of interacting particles.Physical review letters, 86 5
S. Jahanshahi, A. Bahrampour, M. Zandi (2013)
Three-particle deterministic secure and high bit-rate direct quantum communication protocolQuantum Information Processing, 12
M. Hillery, V. Bužek, A. Berthiaume (1998)
Quantum secret sharingPhysical Review A, 59
B. Liu, F. Gao, Q. Wen (2011)
Single-Photon Multiparty Quantum Cryptographic Protocols With Collective DetectionIEEE Journal of Quantum Electronics, 47
H. Brandt (2005)
Unambiguous State Discrimination in Quantum Key DistributionQuantum Information Processing, 4
F. Gao, F. Guo, Q. Wen, F. Zhu, S. Gaertner, M. Bourennane, C. Kurtsiefer, A. Cabello, H. Weinfurter (2008)
Comment on: Experimental Demonstration of a Quantum Protocol for Byzantine Agreement and Liar Detection. Authors' replyPhysical Review Letters, 101
F. Gao, S. Qin, Q. Wen, F. Zhu (2010)
Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger stateOptics Communications, 283
S. Qin, F. Gao, Q. Wen, F. Zhu (2007)
Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocolPhysical Review A, 76
R. Cleve, D. Gottesman, H. Lo (1999)
HOW TO SHARE A QUANTUM SECRETPhysical Review Letters, 83
F Gao, FZ Guo, QY Wen, FC Zhu (2008)
Comment on “Experimental demonstration of a quantum protocol for byzantine agreement and liar detection”Phys. Rev. Lett., 101
Based on four-qubit cluster states, we present a two-party quantum key agreement (QKA) scheme using unitary operations. In this scheme, two participants perform the unitary operation on the different photon of the same cluster state, which guarantees that each party contributes equally to the agreement key. By measuring each cluster state and decoding, these two participants can generate a four-bit classical key without the exchange of classical bits between them. Compared with other existed two-party QKA protocols, our scheme is efficient. Security analysis shows that our protocol is secure against both participant and outsider attack.
Quantum Information Processing – Springer Journals
Published: Jul 5, 2014
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.