The evolution of quantum secure direct communication: on the road to the qinternet

D Pan, GL Long, L Yin, YB Sheng… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Communication security has to evolve to a higher plane in the face of the threat from the
massive computing power of the emerging quantum computers. Quantum secure direct …

Cryptanalysis of the arbitrated quantum signature protocols

F Gao, SJ Qin, FZ Guo, QY Wen - Physical Review A—Atomic, Molecular, and …, 2011 - APS
As a new model for signing quantum messages, arbitrated quantum signature (AQS) has
recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS …

Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party

WW Zhang, KJ Zhang - Quantum information processing, 2013 - Springer
Recently, a quantum private comparison (QPC) protocol with a dishonest third party
(TP)(Yang et al. in Quantum Inf Process, 2012. doi: 10.1007/s11128-012-0433-4) was …

Multiparty quantum key agreement with single particles

B Liu, F Gao, W Huang, Q Wen - Quantum information processing, 2013 - Springer
Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol:(1)
outside eavesdroppers cannot gain the generated key without introducing any error;(2) the …

Novel multiparty quantum key agreement protocol with GHZ states

GB Xu, QY Wen, F Gao, SJ Qin - Quantum information processing, 2014 - Springer
In many circumstances, a shared key is needed to realize secure communication. Based on
quantum mechanics principles, quantum key agreement (QKA) is a good method to …

Participant attack on the deterministic measurement-device-independent quantum secret sharing protocol

YG Yang, YC Wang, YL Yang, XB Chen, D Li… - Science China Physics …, 2021 - Springer
In a recent article [Gao et al., Sci. China-Phys. Mech. Astron. 63, 120311 (2020)], a two-
receiver measurement-device-independent quantum secret sharing (MDI-QSS) protocol was …

Dense-coding attack on three-party quantum key distribution protocols

F Gao, SJ Qin, FZ Guo, QY Wen - IEEE Journal of Quantum …, 2011 - ieeexplore.ieee.org
Cryptanalysis is an important branch in the study of cryptography, including both the
classical cryptography and the quantum one. In this paper we analyze the security of two …

Two-party quantum key agreement with four-qubit cluster states

DS Shen, WP Ma, L Wang - Quantum information processing, 2014 - Springer
Based on four-qubit cluster states, we present a two-party quantum key agreement (QKA)
scheme using unitary operations. In this scheme, two participants perform the unitary …

Improving the security of arbitrated quantum signature against the forgery attack

KJ Zhang, WW Zhang, D Li - Quantum information processing, 2013 - Springer
As a feasible model for signing quantum messages, some cryptanalysis and improvement of
arbitrated quantum signature (AQS) have received a great deal of attentions in recent years …

Quantum dialogue protocols immune to collective noise

CW Yang, T Hwang - Quantum information processing, 2013 - Springer
This work proposes two quantum dialogue protocols, each of which is robust against one of
the following two kinds of collective noise: collective-dephasing noise and collective-rotation …