Access the full text.
Sign up today, get DeepDyve free for 14 days.
Fuguo Deng, G. Long, Xiao-Shu Liu (2003)
Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair blockPhysical Review A, 68
N. An (2004)
Quantum dialogue
K. Boström, T. Felbinger (2002)
Deterministic secure direct communication using entanglement.Physical review letters, 89 18
A. Cabello (2000)
Quantum key distribution in the Holevo limit.Physical review letters, 85 26 Pt 1
Wei Huang, Q. Wen, Bin Liu, Qi Su, F. Gao (2013)
Cryptanalysis of a multi-party quantum key agreement protocol with single particlesQuantum Information Processing, 13
V. Shoup (1997)
Lower Bounds for Discrete Logarithms and Related Problems
M. Ren, G. Wu, E. Wu, H. Zeng (2010)
Experimental demonstration of counterfactual quantum key distributionLaser Physics, 21
Chitra Shukla, Vivek Kothari, A. Banerjee, A. Pathak (2012)
On the group-theoretic structure of a class of quantum dialogue protocolsPhysics Letters A, 377
Chitra Shukla, Anirban Pathak, Anirban Pathak, R. Srikanth (2012)
BEYOND THE GOLDENBERG–VAIDMAN PROTOCOL: SECURE AND EFFICIENT QUANTUM COMMUNICATION USING ARBITRARY, ORTHOGONAL, MULTI-PARTICLE QUANTUM STATESInternational Journal of Quantum Information, 10
Q. Cai, Baishun Li (2003)
Improving the capacity of the Boström-Felbinger protocolPhysical Review A, 69
Bin Liu, F. Gao, Wei Huang, Q. Wen (2012)
Multiparty quantum key agreement with single particlesQuantum Information Processing, 12
Zhiwei Sun, Cai Zhang, Banghai Wang, Qin Li, Dongyang Long (2013)
Improvements on “multiparty quantum key agreement with single particles”Quantum Information Processing, 12
(1999)
Authenticated Diffe-Hellman key agreement protocols in selected areas in cryptography
Run-hua Shi, Hong Zhong (2013)
Multi-party quantum key agreement with bell states and bell measurementsQuantum Information Processing, 12
P. Shor (1995)
Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum ComputerSIAM Rev., 41
Lior Goldenberg, L. Vaidman (1995)
Quantum cryptography based on orthogonal states.Physical review letters, 75 7
Nanrun Zhou, Guihua Zeng, Jin Xiong (2004)
Quantum key agreement protocolElectronics Letters, 40
A. Pathak (2013)
Elements of Quantum Computation and Quantum Communication
M. Dijk, A. Koppelaar (1998)
Quantum key agreementProceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252)
A. Avella, G. Brida, I. Degiovanni, M. Genovese, M. Gramegna, P. Traina (2010)
Experimental quantum cryptography scheme based on orthogonal states: preliminary results, 7702
N. Gisin, R. Renner, S. Wolf (2002)
Linking Classical and Quantum Key Agreement: Is There a Classical Analog to Bound Entanglement?Algorithmica, 34
Xunru Yin, Wenping Ma, Wei-yan Liu (2013)
Three-Party Quantum Key Agreement with Two-Photon EntanglementInternational Journal of Theoretical Physics, 52
Song-Kong Chong, Chia-Wei Tsai, T. Hwang (2011)
Improvement on “Quantum Key Agreement Protocol with Maximally Entangled States”International Journal of Theoretical Physics, 50
PW Shor (1997)
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computerSIAM J. Comput., 26
Chitra Shukla, A. Pathak (2013)
Hierarchical quantum communicationPhysics Letters A, 377
W. Diffie, M. Hellman (1976)
New Directions in CryptographyDemocratizing Cryptography
Song-Kong Chong, T. Hwang (2010)
Quantum key agreement protocol based on BB84Optics Communications, 283
Charles Bennett (1992)
Quantum cryptography using any two nonorthogonal states.Physical review letters, 68 21
G. Brida, Andrea Cavanna, I. Degiovanni, M. Genovese, P. Traina (2011)
Experimental realization of counterfactual quantum cryptographyLaser Physics Letters, 9
A. Ekert (1991)
Quantum cryptography based on Bell's theorem.Physical review letters, 67 6
Yang Liu, Lei Ju, Xiao-lei Liang, Shi-Biao Tang, Guo-Liang Tu, Lei Zhou, Cheng-Zhi Peng, Kai Chen, Teng-Yun Chen, Zeng-Bing Chen, Jian-Wei Pan (2011)
Experimental demonstration of counterfactual quantum communication.Physical review letters, 109 3
Marco Lucamarini, S. Mancini (2004)
Secure deterministic communication without entanglement.Physical review letters, 94 14
A Avella, G Brida, IP Degiovanni, M Genovese, M Gramegna, P Traina (2010)
Experimental quantum-cryptography scheme based on orthogonal statesPhys. Rev. A, 82
Yazhen Wang (2012)
Quantum Computation and Quantum InformationStatistical Science, 27
W Diffie, M Hellman (1976)
New directions in cryptographyIEEE Trans. Inf. Theory, 22
T. Noh (2008)
Counterfactual quantum cryptography.Physical review letters, 103 23
Two protocols of quantum key agreement (QKA) that solely use Bell state and Bell measurement are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. The proposed protocols are also generalized to implement QKA using a set of multi-partite entangled states (e.g., 4-qubit cluster state and $$\Omega $$ Ω state). Security of these protocols arises from the monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.
Quantum Information Processing – Springer Journals
Published: Jul 3, 2014
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.