메뉴 건너뛰기




Volumn 15, Issue 6, 2009, Pages 1602-1606

New efficient three-party quantum key distribution protocols

Author keywords

Quantum cryptography; Quantum key distribution; Quantum network communication

Indexed keywords

A-CENTER; MEASURING MACHINES; ONE WAY HASH FUNCTIONS; QUANTUM DEVICE; QUANTUM KEY DISTRIBUTION; QUANTUM KEY DISTRIBUTION PROTOCOLS; QUANTUM MEMORIES; QUANTUM NETWORK; QUANTUM NETWORK COMMUNICATION; SESSION KEY; THREE-PARTY; TRUSTED CENTERS; UNITARY OPERATION;

EID: 72149109264     PISSN: 1077260X     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSTQE.2009.2019617     Document Type: Article
Times cited : (61)

References (20)
  • 2
    • 9644289571 scopus 로고    scopus 로고
    • Experimental demonstration of quantum memory for light
    • B. Julsgaard, J. Sherson, J. I. Cirac, J. Fiuraek, and E. S. Polzik, "Experimental demonstration of quantum memory for light," Nature, vol.432, pp. 482-486, 2004.
    • (2004) Nature , vol.432 , pp. 482-486
    • Julsgaard, B.1    Sherson, J.2    Cirac, J.I.3    Fiuraek, J.4    Polzik, E.S.5
  • 8
    • 11944254075 scopus 로고
    • Quantum cryptography using any two nonorthogonal states
    • C. H. Bennett, "Quantum cryptography using any two nonorthogonal states," Phys. Rev. Lett., vol.68, pp. 3121-3124, 1992.
    • (1992) Phys. Rev. Lett. , vol.68 , pp. 3121-3124
    • Bennett, C.H.1
  • 9
    • 8744225244 scopus 로고    scopus 로고
    • Increasing the efficiencies of random-choice-based quantum communication protocols with delayed measurement
    • F.-G. Deng, G.-L. Long,Y.Wang, and L.Xiao, "Increasing the efficiencies of random-choice-based quantum communication protocols with delayed measurement," Chinese Phys. Lett., vol.21, pp. 2097-2100, 2004.
    • (2004) Chinese Phys. Lett. , vol.21 , pp. 2097-2100
    • Deng, F.-G.1    Long, G.-L.2    Wang, Y.3    Xiao, L.4
  • 10
    • 34047236344 scopus 로고    scopus 로고
    • EPR quantum key distribution protocols with potential 100% qubit efficiency
    • T. Hwang and K.-C. Lee, "EPR quantum key distribution protocols with potential 100% qubit efficiency," IET Proc. Inf. Security, vol.1, pp. 43-45, 2007.
    • (2007) IET Proc. Inf. Security , vol.1 , pp. 43-45
    • Hwang, T.1    Lee, K.-C.2
  • 11
    • 33745142417 scopus 로고    scopus 로고
    • Sequences of games: A tool for taming complexity in security proof
    • [Online]. Available
    • V. Shoup. (2006). Sequences of games: A tool for taming complexity in security proof, Cryptology ePrint Archive, Rep. 2004/332 [Online]. Available: http://www.shoup.net/
    • (2006) Cryptology EPrint Archive, Rep. 2004/332
    • Shoup., V.1
  • 12
    • 38148999450 scopus 로고    scopus 로고
    • A framework for game-based security proofs
    • D. Nowak, "A framework for game-based security proofs," Inf. Commun. Security, vol.4861, pp. 319-333, 2007.
    • (2007) Inf. Commun. Security , vol.4861 , pp. 319-333
    • Nowak, D.1
  • 13
    • 33947512019 scopus 로고    scopus 로고
    • Formal proofs for the security of signcryption
    • J. Baek, R. Steinfeld, and Y. Zheng, "Formal proofs for the security of signcryption," J. Cryptol., vol.20, pp. 203-235, 2007.
    • (2007) J. Cryptol. , vol.20 , pp. 203-235
    • Baek, J.1    Steinfeld, R.2    Zheng, Y.3
  • 14
    • 33646373811 scopus 로고    scopus 로고
    • Trojan-horse attacks on quantumkey-Distribution systems
    • N. Gisin, S. Fasel, B. Kraus, H. Zbinden, and G. Ribordy, "Trojan-horse attacks on quantumkey-Distribution systems," Phys. Rev. A, vol.73, pp. 0223201-0223206, 2006.
    • (2006) Phys. Rev. A , vol.73 , pp. 0223201-0223206
    • Gisin, N.1    Fasel, S.2    Kraus, B.3    Zbinden, H.4    Ribordy, G.5
  • 15
    • 33751277651 scopus 로고    scopus 로고
    • Improving the security of secure direct communication based on the secret transmitting order of particles
    • X.-H. Li, F.-G. Deng, and H.-Y. Zhou, "Improving the security of secure direct communication based on the secret transmitting order of particles," Phys. Rev. A, vol.74, pp. 0543021-0543024, 2006.
    • (2006) Phys. Rev. A , vol.74 , pp. 0543021-0543024
    • Li, X.-H.1    Deng, F.-G.2    Zhou, H.-Y.3
  • 16
    • 0006375145 scopus 로고    scopus 로고
    • Identity verification in quantum key distribution
    • G. Zeng andW. Zhang, "Identity verification in quantum key distribution," Phys. Rev. A, vol.61, pp. 0223031-0223035, 2000.
    • (2000) Phys. Rev. A , vol.61 , pp. 0223031-0223035
    • Zeng, G.1    Zhang, W.2
  • 17
    • 33847744655 scopus 로고    scopus 로고
    • Provably secure three-party authenticated quantum key distribution protocols
    • DOI 10.1109/TDSC.2007.13
    • T. Hwang, K.-C. Lee, and C.-M. Li, "Provably secure three-party authenticated quantum key distribution protocols," IEEE Trans. Dependable Secure Comput., vol.4, no.1, pp. 71-80, Jan.-Mar. 2007. (Pubitemid 46384622)
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.1 , pp. 71-80
    • Hwang, T.1    Lee, K.-C.2    Li, C.-M.3
  • 18
    • 24144499140 scopus 로고    scopus 로고
    • Secure quantum key distribution network with Bell states and local unitary operations
    • C.-Y. Li, H.-Y. Zhou, Y.Wang, and F.-G. Deng, "Secure quantum key distribution network with Bell states and local unitary operations," Chinese Phys. Lett., vol.22, pp. 1049-1052, 2005.
    • (2005) Chinese Phys. Lett. , vol.22 , pp. 1049-1052
    • Li, C.-Y.1    Zhou, H.-Y.2    Wang, Y.3    Deng, F.-G.4
  • 19
    • 0029322598 scopus 로고
    • Multiuser quantum cryptography on optical networks
    • S. Phoenix, S. Barnett, P. Townsend, and K. Blow, "Multi-user quantum cryptography on optical networks," J. Modern Opt., vol.42, pp. 1155-1163, 1995.
    • (1995) J. Modern Opt. , vol.42 , pp. 1155-1163
    • Phoenix, S.1    Barnett, S.2    Townsend, P.3    Blow, K.4
  • 20
    • 84928045174 scopus 로고    scopus 로고
    • Quantum cryptographic network based on quantum memories
    • E. Biham, B. Huttner, and T. Mor, "Quantum cryptographic network based on quantum memories," Phys. Rev. A, vol.54, pp. 2651-2658, 1996.
    • (1996) Phys. Rev. A , vol.54 , pp. 2651-2658
    • Biham, E.1    Huttner, B.2    Mor, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.