Access the full text.
Sign up today, get DeepDyve free for 14 days.
CH Bennett, G Brassard, JM Robert (1988)
Privacy amplification by public discussionSIAM J. Comput., 17
T Hwang, CW Tsai, SK Chong (2011)
Probabilistic quantum key distributionQuantum Inf. Comput., 11
G Long, X Liu (2002)
Theoretically efficient high-capacity quantum-key-distribution schemePhys. Rev. A, 65
J Lin, C-W Yang, C-W Tsai, T Hwang (2013)
Intercept-resend attacks on semiquantum secret sharing and the improvementsInt. J. Theor. Phys., 52
AK Ekert (1991)
661Phys. Rev. Lett., 67
HK Lo, HF Chau (1999)
Unconditional security of quantum key distribution over arbitrarily long distancesScience, 283
G Long (2002)
032302Phys. Rev. A, 65
XH Li, FG Deng, HY Zhou (2006)
Improving the security of secure direct communication based on the secret transmitting order of particlesPhys. Rev. A, 74
HK Lo (1999)
2050Science, 283
AK Ekert (1991)
Quantum cryptography based on Bell’s theoremPhys. Rev. Lett., 67
X Zou, D Qiu, L Li, L Wu, L Li (2009)
Semiquantum-key distribution using less than four quantum statesPhys. Rev. A, 79
FG Deng, XH Li, HY Zhou, ZJ Zhang (2005)
Improving the security of multiparty quantum secret sharing against Trojan horse attackPhys. Rev. A, 72
CH Bennett (1992)
3121Phys. Rev. Lett., 68
X.-H. Li, F.-G. Deng, H.-Y. Zhou (2008)
Efficient quantum key distribution over a collective noise channelPhys. Rev. A, 78
X-H Li, X-J Duan, F-G Deng, H-Y Zhou (2010)
Error-rejecting Bennett–Brassard–Mermin quantum key distribution protocol based on linear optics over a collective-noise channelInt. J. Quantum Inf., 8
C-W Yang, T Hwang (2012)
Improved QSDC protocol over a collective-dephasing noise channelInt. J. Theor. Phys., 51
CH Bennett (1992)
Quantum cryptography using any two nonorthogonal statesPhys. Rev. Lett., 68
ZJ Zhang, ZX Man, SH Shi (2005)
An efficient multiparty quantum key distribution schemeInt. J. Quantum Inf., 3
FG Deng (2004)
2097Chinese Phys. Lett., 21
FG Deng, GL Long, Y Wang, L Xiao (2004)
Increasing the efficiencies of random-choice-based quantum communication protocols with delayed measurementChinese Phys. Lett., 21
X-H Li, B-K Zhao, Y-B Sheng, F-G Deng, H-Y Zhou (2009)
FAULT tolerant quantum key distribution based on quantum dense coding with collective noiseInt. J. Quantum. Inf., 7
T Hwang, KC Lee, CM Li (2007)
Provably secure three-party authenticated quantum key distribution protocolsIEEE Trans Depend Secur, 4
M Boyer, D Kenigsberg, T Mor (2007)
Quantum key distribution with classical BobPhys. Rev. Lett., 99
P Chen, Y-S Li, F-G Deng, G-L Long (2007)
Measuring-basis encrypted quantum key distribution with four-state systemsCommun. Theor. Phys., 47
J. Wang, S. Zhang, Q. Zhang, C. J. Tang (2011)
Semiquantum key distribution using entangled statesChinese Phys. Lett., 28
B-K Zhao, Y-B Sheng, F-G Deng, F-S Zhang, H-Y Zhou (2009)
Stable and deterministic quantum key distribution based on differential phase shiftInt. J. Quantum Inf., 7
C-W Yang, T Hwang, Y-P Luo (2013)
Enhancement on “quantum blind signature based on two-state vector formalism”Quantum Inf. Process., 12
PW Shor, J Preskill (2000)
Simple proof of security of the BB84 quantum key distribution protocolPhys. Rev. Lett., 85
PW Shor (2000)
441Phys. Rev. Lett., 85
C-W Yang, T Hwang, T-H Lin (2013)
Modification Attack on QSDC with Authentication and the ImprovementInt. J. Theor. Phys., 52
QY Cai (2006)
Eavesdropping on the two-way quantum communication protocols with invisible photonsPhys. Lett. A, 351
CH Bennett, G Brassard, C Crepeau, UM Maurer (1995)
Generalized privacy amplificationIEEE Trans. Inf. Theory, 41
FG Deng, XH Li, HY Zhou, ZJ Zhang (2006)
Improving the security of multiparty quantum secret sharing against Trojan horse attack (vol 72, art no 044302, 2005)Phys. Rev. A, 73
T Hwang, CC Hwang, CW Tsai (2011)
Quantum key distribution protocol using dense coding of three-qubit W stateEur. Phys. J. D, 61
M Boyer, R Gelles, D Kenigsberg, T Mor (2009)
Semiquantum key distributionPhys. Rev. A, 79
This study presents the first authenticated semi-quantum key distribution (ASQKD) protocols without using authenticated classical channels. By pre-sharing a master secret key between two communicants, a sender with advanced quantum devices can transmit a working key to a receiver, who can merely perform classical operations. The idea of ASQKD enables establishment of a key hierarchy in security systems that also eases the key management problem. The proposed protocols are free from several well-known attacks
Quantum Information Processing – Springer Journals
Published: Mar 18, 2014
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.