2014
DOI: 10.1007/s10773-014-2269-4
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated Quantum Dialogue Based on Bell States

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
28
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(28 citation statements)
references
References 30 publications
0
28
0
Order By: Relevance
“…On the other hand, suppose that Alice has 3N /2 classical bits (i 1 , [42], one key K is further assumed to be pre-shared privately between Alice and Bob, which is used for choosing the measurement bases of sample logical qubits here. The length of K is N /4 so that K ∈ {0, 1} N /4 .…”
Section: Fault-tolerant Aqd Protocol Against the Collective-dephasingmentioning
confidence: 99%
See 4 more Smart Citations
“…On the other hand, suppose that Alice has 3N /2 classical bits (i 1 , [42], one key K is further assumed to be pre-shared privately between Alice and Bob, which is used for choosing the measurement bases of sample logical qubits here. The length of K is N /4 so that K ∈ {0, 1} N /4 .…”
Section: Fault-tolerant Aqd Protocol Against the Collective-dephasingmentioning
confidence: 99%
“…Step 6 After receiving S O A , Bob performs the logical unitary operation t d l d on [42]. If they are identical, m A is regarded as the genuine m A by Bob so that the communication is continued; otherwise, the communication is halted.…”
Section: Fault-tolerant Aqd Protocol Against the Collective-dephasingmentioning
confidence: 99%
See 3 more Smart Citations