2015
DOI: 10.1007/s10773-015-2831-8
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Party Quantum Key Agreement by an Entangled Six-Qubit State

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
53
0
1

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 64 publications
(54 citation statements)
references
References 57 publications
0
53
0
1
Order By: Relevance
“…In the security analysis section of this paper, the proposed protocol was able to defend external eavesdropper attacks and internal malicious participant attacks. In the consumption comparison section, the performance of the proposed protocol was shown to be superior to the compared MQKA protocols 5355,57,58,60,61 .…”
Section: Resultsmentioning
confidence: 99%
“…In the security analysis section of this paper, the proposed protocol was able to defend external eavesdropper attacks and internal malicious participant attacks. In the consumption comparison section, the performance of the proposed protocol was shown to be superior to the compared MQKA protocols 5355,57,58,60,61 .…”
Section: Resultsmentioning
confidence: 99%
“…The five existing MQKA protocols are “LGHW protocol”20, “SZ protocol”21, “SZWYZL protocol”26, “SYW protocol”28, and “SZWLL protocol”29. The qubit efficiency can be defined as , where c is the length of target common key sequence, q is the number of qubits used in transmission and security checking, and “b” is the number of used classical bits.…”
Section: Resultsmentioning
confidence: 99%
“…Anther very important topic named Quantum key agreement(QKA)1617181920212223242526272829 also received widespread concerns. Compared with QKD protocols in which one participant distributes a predetermined secret key to the other participants, QKA protocols require that all participants need to negotiate mutually and equally to derive a common secret key, and any nontrivial subset of participants could not fully determine the target key.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Sun et al [37] presented a scheme of bidirectional quantum controlled teleportation in which a six-qubit maximally entangled state quantum channel was initially shared by the Alice, Bob, and supervisor Charlie. Sun et al [38] gave a multi-party quantum key agreement protocol utilized the state. However, to our best knowledge, up to now, there have been no protocols for how to generate DRSP of an arbitrary three-qubit state with this entangled six-qubit state as the shared quantum channel.…”
Section: Related Workmentioning
confidence: 99%