Access the full text.
Sign up today, get DeepDyve free for 14 days.
Fuguo Deng, G. Long, Xiao-Shu Liu (2003)
Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair blockPhysical Review A, 68
K. Boström, T. Felbinger (2002)
Deterministic secure direct communication using entanglement.Physical review letters, 89 18
F. Gao, Q. Wen, F. Zhu (2006)
Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174]Physics Letters A, 360
C. Mitchell, M. Ward, P. Wilson (1998)
Key control in key agreement protocolsElectronics Letters, 34
A. Karlsson, M. Koashi, N. Imoto (1999)
Quantum entanglement for secret sharing and secret splittingPhysical Review A, 59
A. Tajima, A. Tanaka, W. Maeda, Seigo Takahashi, A. Tomita (2007)
Practical Quantum Cryptosystem for Metro Area ApplicationsIEEE Journal of Selected Topics in Quantum Electronics, 13
Tingting Song, Zhang Jie, Gao Fei, Qiao-yan Wen, F. Zhu (2009)
Participant attack on quantum secret sharing based on entanglement swappingChinese Physics B, 18
Xiubo Chen, Gang Xu, Xinxin Niu, Q. Wen, Yixian Yang (2010)
An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurementOptics Communications, 283
Run-hua Shi, Hong Zhong (2011)
Multiparty quantum secret sharing with the pure entangled two-photon statesQuantum Information Processing, 11
F. Gao, S. Qin, Q. Wen, F. Zhu (2007)
A simple participant attack on the brádler-dušek protocolQuantum Inf. Comput., 7
G. Long, X. Liu (2000)
Theoretically efficient high-capacity quantum-key-distribution schemePhysical Review A, 65
Run-hua Shi, Hong Zhong (2013)
Multi-party quantum key agreement with bell states and bell measurementsQuantum Information Processing, 12
Nanrun Zhou, Guihua Zeng, Jin Xiong (2004)
Quantum key agreement protocolElectronics Letters, 40
Y.G. Yang, W.F. Cao, Q.Y. Wen (2009)
Secure quantum private comparisonPhsy. Scr., 80
Yuguang Yang, Wei-Feng Cao, Q. Wen (2009)
Secure quantum private comparisonPhysica Scripta, 80
F. Guo, S. Qin, F. Gao, S. Lin, Qiao-yan Wen, F. Zhu (2010)
Participant attack on a kind of MQSS schemes based on entanglement swappingThe European Physical Journal D, 56
Wen Liu, Yong-Bin Wang, Zhengtao Jiang (2011)
An efficient protocol for the quantum private comparison of equality with W stateOptics Communications, 284
Gilles Brassard, Claude Crépeau (2005)
Quantum Cryptography
J. Pieprzyk, T. Hardjono, J. Seberry (2003)
Key Establishment Protocols
Gan Gao (2010)
Cryptanalysis of multiparty quantum secret sharing with collective eavesdropping-checkOptics Communications, 283
Lov Grover (1996)
A fast quantum mechanical algorithm for database search
Song-Kong Chong, Chia-Wei Tsai, T. Hwang (2011)
Improvement on “Quantum Key Agreement Protocol with Maximally Entangled States”International Journal of Theoretical Physics, 50
D. Jackson, G. Hockney (2004)
Securing QKD Links in the Full Hilbert SpaceQuantum Information Processing, 4
A. Allati, M. Baz, Y. Hassouni (2011)
Quantum key distribution via tripartite coherent statesQuantum Information Processing, 10
F. Gao, F. Guo, Q. Wen, F. Zhu (2005)
On the information-splitting essence of two types of quantum key distribution protocolsPhysics Letters A, 355
F. Gao, Q.Y. Wen, F.C. Zhu (2007)
Comment on: “Quantum exam”Phys. Lett. A, 360
Yuguang Yang, Yuan Wang, Hai-Ping Chai, Yi-Wei Teng, Hua Zhang (2011)
Member expansion in quantum (t,n) threshold secret sharing schemesOptics Communications, 284
Song-Kong Chong, T. Hwang (2010)
Quantum key agreement protocol based on BB84Optics Communications, 283
P. Shor (1994)
Algorithms for quantum computation: discrete logarithms and factoringProceedings 35th Annual Symposium on Foundations of Computer Science
Hsinyi Tseng, Jason Lin, T. Hwang (2011)
New quantum private comparison protocol using EPR pairsQuantum Information Processing, 11
Wei Huang, F. Guo, Zheng Huang, Q. Wen, F. Zhu (2011)
Three-particle QKD protocol against a collective noiseOptics Communications, 284
A. Menezes, P. Oorschot, S. Vanstone (2018)
Handbook of Applied Cryptography
M. Hillery, V. Bužek, A. Berthiaume (1998)
Quantum secret sharingPhysical Review A, 59
B. Liu, F. Gao, Q. Wen (2011)
Single-Photon Multiparty Quantum Cryptographic Protocols With Collective DetectionIEEE Journal of Quantum Electronics, 47
M. Guasoni, M. Conforti, C. Angelis (2010)
Light propagation in nonuniform plasmonic subwavelength waveguide arraysOptics Communications, 283
H. Brandt (2005)
Unambiguous State Discrimination in Quantum Key DistributionQuantum Information Processing, 4
G. Ateniese, M. Steiner, G. Tsudik (2000)
New multiparty authentication services and key agreement protocolsIEEE Journal on Selected Areas in Communications, 18
Bin Liu, F. Gao, H. Jia, Wei Huang, Wei-Wei Zhang, Q. Wen (2013)
Efficient quantum private comparison employing single photons and collective detectionQuantum Information Processing, 12
F. Gao, F. Guo, Q. Wen, F. Zhu, S. Gaertner, M. Bourennane, C. Kurtsiefer, A. Cabello, H. Weinfurter (2008)
Comment on: Experimental Demonstration of a Quantum Protocol for Byzantine Agreement and Liar Detection. Authors' replyPhysical Review Letters, 101
S. Gaertner, M. Bourennane, C. Kurtsiefer, A. Cabello, H. Weinfurter (2007)
Experimental demonstration of a quantum protocol for byzantine agreement and liar detection.Physical review letters, 100 7
F. Gao, S. Qin, Q. Wen, F. Zhu (2010)
Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger stateOptics Communications, 283
S. Qin, F. Gao, Q. Wen, F. Zhu (2007)
Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocolPhysical Review A, 76
R. Cleve, D. Gottesman, H. Lo (1999)
HOW TO SHARE A QUANTUM SECRETPhysical Review Letters, 83
F. Gao, F.Z. Guo, Q.Y. Wen, F.C. Zhu (2008)
Comment on “Experimental Demonstration of a Quantum Protocol for Byzantine Agreement and Liar Detection”Phys. Rev. Lett., 101
Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. That is, a secure QKA protocol can not only prevent the outside attackers from stealing the key, but also resist the attack from inside participants, i.e. some dishonest participants determine the key alone by illegal means. How to resist participant attack is an aporia in the design of QKA protocols, especially the multi-party ones. In this paper we present the first secure multiparty QKA protocol against both outside and participant attacks. Further more, we have proved its security in detail.
Quantum Information Processing – Springer Journals
Published: Oct 5, 2012
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.