X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
intercept-resend attack (23) 23
physics, multidisciplinary (14) 14
cryptography (12) 12
quantum physics (12) 12
physics (11) 11
quantum cryptography (11) 11
physics, mathematical (10) 10
physics, general (9) 9
theoretical, mathematical and computational physics (9) 9
elementary particles, quantum field theory (8) 8
security (8) 8
computer science (6) 6
quantum key distribution (6) 6
quantum secret sharing (6) 6
analysis (4) 4
attack (4) 4
cryptanalysis (4) 4
eavesdropping (4) 4
entangled states (4) 4
protocol (4) 4
computer science, theory & methods (3) 3
denial-of-service attack (3) 3
differential-phase-shift quantum key distribution (3) 3
ghz state (3) 3
intercept-resend attacks (3) 3
key distribution (3) 3
physics, applied (3) 3
physics, condensed matter (3) 3
physics, particles & fields (3) 3
quantum computing (3) 3
quantum private comparison (3) 3
scheme (3) 3
sequential attack (3) 3
arbitrated quantum signature (2) 2
bell states (2) 2
collective noise (2) 2
computer information security (2) 2
data structures, cryptology and information theory (2) 2
detectors (2) 2
entanglement (2) 2
investment analysis (2) 2
mathematical physics (2) 2
measuring instruments (2) 2
participant attack (2) 2
photons (2) 2
qsdc protocol (2) 2
quantum information technology, spintronics (2) 2
quantum protocol (2) 2
quantum science & technology (2) 2
quantum theory (2) 2
qubits (2) 2
safety and security measures (2) 2
secure direct communication (2) 2
security analysis (2) 2
unambiguous state discrimination (2) 2
unconditional security (2) 2
unitary operation (2) 2
重发攻击 (2) 2
algorithm (1) 1
arbitration (1) 1
atmospheric measurements (1) 1
atoms (1) 1
authentication (1) 1
beam-splitting attack (1) 1
bells (1) 1
bell态 (1) 1
bit error rate (1) 1
channels (1) 1
cloning attacks (1) 1
cluster states (1) 1
coherent states (1) 1
computation (1) 1
computer network protocols (1) 1
computer science, general (1) 1
controlled quantum teleportation (1) 1
cryptography theory (1) 1
data security (1) 1
decoys (1) 1
degrees of freedom (1) 1
denial of service attacks (1) 1
deterministic protocol (1) 1
deterministic secure quantum communication (1) 1
differential-phase- shift quantum key distribution (1) 1
direct communication (1) 1
double-cnot attack (1) 1
eavesdropper (1) 1
eavesdroppers (1) 1
entangle auxiliary particle attack (1) 1
entanglement attack (1) 1
entanglement breaking channels (1) 1
entanglement purification (1) 1
equality protocol (1) 1
error analysis (1) 1
fourier transforms (1) 1
fraud (1) 1
genuine four-particle entangled states (1) 1
ghz-like state (1) 1
ghz-state (1) 1
imaging (1) 1
impersonation attack (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Optics Communications, ISSN 0030-4018, 2011, Volume 284, Issue 9, pp. 2412 - 2414
Recently, Chen et al. presented a novel quantum private comparison (QPC) protocol using triplet GHZ state to enable two parties to compare the equality of... 
GHZ state | Intercept–resend attack | Quantum private comparison | Interceptresend attack | OPTICS | Intercept-resend attack | Computer information security | Eavesdropping
Journal Article
International Journal of Electrical and Computer Engineering, ISSN 2088-8708, 10/2018, Volume 8, Issue 5, pp. 2988 - 2993
Journal Article
International Journal of Theoretical Physics, ISSN 0020-7748, 2/2014, Volume 53, Issue 2, pp. 597 - 602
Journal Article
Quantum Information Processing, ISSN 1570-0755, 10/2018, Volume 17, Issue 10, pp. 1 - 12
Journal Article
International Journal of Theoretical Physics, ISSN 0020-7748, 12/2019, Volume 58, Issue 12, pp. 4064 - 4068
In this paper, we investigate how to enlarge the detection probability of the security check process, because it is of utmost importance for quantum secure... 
Theoretical, Mathematical and Computational Physics | Intercept-resend attack | Measurement base | Security check | Quantum Physics | Physics, general | GHZ state | Quantum cryptography | Physics | Elementary Particles, Quantum Field Theory | PHYSICS, MULTIDISCIPLINARY | QUANTUM | PROTOCOL | DIRECT COMMUNICATION
Journal Article
International Journal of Theoretical Physics, ISSN 0020-7748, 1/2013, Volume 52, Issue 1, pp. 156 - 162
Recently, Li et al. [Phys. Rev. A 82(2):022303, 2010] presented two semi-quantum secret sharing (SQSS) protocols using Greenberger-Horne-Zeilinger-like states.... 
Trojan horse attack | Theoretical, Mathematical and Computational Physics | GHZ-like state | Intercept-resend attack | Quantum secret sharing | Quantum Physics | Physics, general | Quantum cryptography | Physics | Elementary Particles, Quantum Field Theory | PHYSICS, MULTIDISCIPLINARY | Computer science | Cryptography | Spyware
Journal Article
International Journal of Theoretical Physics, ISSN 0020-7748, 7/2018, Volume 57, Issue 7, pp. 2034 - 2040
Recently, Jia et al. proposed the quantum private comparison protocol with the genuine four-particle entangled states (Jia et al., Int. J. Theor. Phys. 51(4),... 
Theoretical, Mathematical and Computational Physics | Intercept-resend-measure attack | Genuine four-particle entangled states | Third party | Quantum Physics | Quantum private comparison | Physics, general | Physics | Elementary Particles, Quantum Field Theory
Journal Article
Quantum Information Processing, ISSN 1570-0755, 02/2012, Volume 11, Issue 1, pp. 113 - 122
This work deliberately introduces collective-rotation noise into quantum states to prevent an intercept-resend attack on Zhang's quantum secret sharing scheme... 
Collective noise | Quantum cryptography | Intercept-resend attack | Quantum secret sharing | PHYSICS, MULTIDISCIPLINARY | PHYSICS, MATHEMATICAL | Computer science | Noise control
Journal Article
Modern Physics Letters B, ISSN 0217-9849, 09/2018, Volume 32, Issue 25, p. 1850294
A recent paper proposed a semi-quantum secret sharing (SQSS) scheme based on Bell states [A. Yin et al., Mod. Phys. Lett. B.... 
Cryptanalysis | quantum secret sharing | intercept-resend attacks | PHYSICS, CONDENSED MATTER | PHYSICS, APPLIED | KEY DISTRIBUTION PROTOCOLS | QSDC PROTOCOL | ENTANGLEMENT | ATTACK | PHYSICS, MATHEMATICAL
Journal Article
Modern Physics Letters B, ISSN 0217-9849, 02/2019, Volume 33, Issue 4, p. 1950045
A semi-quantum secret sharing scheme using entangled states was proposed in a recent paper [Mod. Phys. Lett. B 32 (2018) 1850256.... 
Semi-quantum secret sharing | cryptanalysis | intercept-resend attacks | PHYSICS, CONDENSED MATTER | PHYSICS, APPLIED | KEY DISTRIBUTION | PROTOCOL | PROOF | PHYSICS, MATHEMATICAL | UNCONDITIONAL SECURITY | GHZ-STATE
Journal Article
Quantum Information Processing, ISSN 1570-0755, 2/2012, Volume 11, Issue 1, pp. 113 - 122
This work deliberately introduces collective-rotation noise into quantum states to prevent an intercept-resend attack on Zhang’s quantum secret sharing scheme... 
Theoretical, Mathematical and Computational Physics | Intercept-resend attack | Quantum secret sharing | Mathematics, general | Quantum Physics | Physics, general | Computer Science, general | Collective noise | Quantum cryptography | Physics
Journal Article
Quantum Information Processing, ISSN 1570-0755, 07/2013, Volume 12, Issue 7, pp. 2343 - 2353
The security of the recent quantum multi-signature protocol based on teleportation is analyzed. We show that there are some security vulnerabilities in the... 
Controlled quantum teleportation | Intercept-resend attack | Quantum multi-signature | Security analysis | Entangle auxiliary particle attack | PHYSICS, MULTIDISCIPLINARY | ALGORITHM | PHYSICS, MATHEMATICAL | CRYPTOGRAPHY | SCHEME | QSDC PROTOCOL | IMPROVEMENT | ATTACK | CRYPTANALYSIS | Investment analysis | Analysis | Safety and security measures
Journal Article
International Journal of Theoretical Physics, ISSN 0020-7748, 7/2019, Volume 58, Issue 7, pp. 2341 - 2345
Recently, Liu (Int J Theor Phys: pp.1–6, 2018) pointed out that Song et al.’s multiparty quantum direct secret sharing protocol (Int J Theor Phys: 57, 1559,... 
Quantum direct secret sharing | Theoretical, Mathematical and Computational Physics | Intercept-resend attack | Quantum Physics | Physics, general | Bell states | Physics | Elementary Particles, Quantum Field Theory | PHYSICS, MULTIDISCIPLINARY | Computer science
Journal Article
International Journal of Theoretical Physics, ISSN 0020-7748, 7/2019, Volume 58, Issue 7, pp. 2213 - 2217
In 2014, Zhang et al. (Int J Theor Phys:53:933–941, 2014) proposed a secure multi-party quantum summation protocol based on single photons in both polarization... 
Theoretical, Mathematical and Computational Physics | Intercept-resend attack | Quantum Physics | Physics, general | Quantum summation | Physics | Elementary Particles, Quantum Field Theory | Secure quantum computation | PHYSICS, MULTIDISCIPLINARY | Computer science | Safety and security measures
Journal Article
中国物理B:英文版, ISSN 1674-1056, 2017, Volume 26, Issue 2, pp. 63 - 67
Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring... 
信号干扰 | 量子密钥分配协议 | 编码协议 | 循环 | 微分求积 | 重发攻击 | 量子系统 | Mach | round-robin differential phase-shift protocol | quantum key distribution | beam-splitting attack | intercept-resend attack | SECURITY | PHYSICS, MULTIDISCIPLINARY
Journal Article
中国物理B:英文版, ISSN 1674-1056, 2014, Volume 23, Issue 6, pp. 66 - 73
We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept- resend attack and denial-of-service... 
密码分析 | 拒绝服务攻击 | 量子 | 签名方案 | 仲裁 | 接收器 | 重发攻击 | Bell态 | intercept-resend attack | arbitrated quantum signature | denial-of-service attack | PHYSICS, MULTIDISCIPLINARY | INPUT-OUTPUT PROCESS | ENTANGLEMENT PURIFICATION | ATTACK | Bells | Messages | Arbitration | Receivers | Security | Signatures | Cryptography
Journal Article
Physics Letters A, ISSN 0375-9601, 2010, Volume 374, Issue 8, pp. 1097 - 1100
In [J.S. Shaari, M. Lucamarini, M.R.B. Wahiddin, Phys. Lett. A 358 (2006) 85] the deterministic six states protocol (6DP) for quantum communication has been... 
Quantum protocol | Double-CNOT attack | Eavesdropper | Six states protocol | Intercept-resend attack | Deterministic protocol | PHYSICS, MULTIDISCIPLINARY | Physics - Quantum Physics
Journal Article
International Journal of Theoretical Physics, ISSN 0020-7748, 10/2013, Volume 52, Issue 10, pp. 3577 - 3585
Hwang et al. (Phys. Scr. 83:045004, 2011) proposed a high efficient multiparty quantum secret sharing by using Greenberger-Horne-Zeilinger (GHZ) states. But... 
Theoretical, Mathematical and Computational Physics | Intercept-resend attack | Quantum secret sharing | Quantum Physics | Physics, general | Bell states | Physics | Elementary Particles, Quantum Field Theory | Unitary operation | PARTICIPANT ATTACK | NETWORK | MEMORY | PHYSICS, MULTIDISCIPLINARY | KEY DISTRIBUTION | ENTANGLED STATES
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.