2017
DOI: 10.1007/s11128-017-1597-8
|View full text |Cite
|
Sign up to set email alerts
|

Controlled quantum dialogue using cluster states

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 33 publications
(14 citation statements)
references
References 26 publications
0
14
0
Order By: Relevance
“…[12] and Ref. [13], the authors pointed out two important security requirements about the controller. Firstly, the communicants cannot exchange their secret message without the controller's permission.…”
Section: Security Of Controller's Permissionmentioning
confidence: 99%
See 3 more Smart Citations
“…[12] and Ref. [13], the authors pointed out two important security requirements about the controller. Firstly, the communicants cannot exchange their secret message without the controller's permission.…”
Section: Security Of Controller's Permissionmentioning
confidence: 99%
“…The information-theoretical efficiency formula η = c/q is usually applied to analyze the efficiency of quantum channel [13,29] , where c is the total number of secret message, q denotes the total number of qubits used in quantum channel. For the proposed protocol, in the ideal quantum channel, Alice and Bob totally exchange 2n classical bits, and total single photons used for this protocol are 4n (n used for carrying secret message and 3n for eavesdropping detection and authentication).…”
Section: Efficiency Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…Next, in Guan et al, 6 it was pointed out that Hwang's protocol is vulnerable to online guessing attacks and a session key consistency problem, and the authors therefore presented a practical N3AQKDP that can work in a noisy quantum channel. In addition, many different types of quantum protocols have recently been developed, including multiuser semi‐quantum secret sharing, 7 a “quantum‐ready” 5G core network, 8 quantum pattern recognition, 9 and entangled states scheme 10–12 …”
Section: Introductionmentioning
confidence: 99%