2016
DOI: 10.1007/s11128-016-1438-1
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Oblivious Transfer: a secure practical implementation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(8 citation statements)
references
References 10 publications
0
8
0
Order By: Relevance
“…The details of this verification were provided in Section 3 of Ref. [30]. In brief, she picks a sequence and asks Bob to announce the state of each qubit, and checks whether the announced numbers of |0 , |1 , |+ , and |− in this sequence are equal.…”
Section: The Ot Protocol Of Nagy Et Almentioning
confidence: 99%
See 3 more Smart Citations
“…The details of this verification were provided in Section 3 of Ref. [30]. In brief, she picks a sequence and asks Bob to announce the state of each qubit, and checks whether the announced numbers of |0 , |1 , |+ , and |− in this sequence are equal.…”
Section: The Ot Protocol Of Nagy Et Almentioning
confidence: 99%
“…[11,12] Therefore, researchers sought for practically secure OT in recent years. [13][14][15][16][17][18][19][20][21][22][23][24][25][26][27][28][29] Recently, Nagy et al [30] proposed a very feasible quantum OT protocol, which does not require quantum storage when all participants are honest. The authors proved that the protocol is secure against individual measurements, as well as 2-qubit entanglement-based attacks.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…; Schaffner (2010); Sikora (2012); Chailloux, Kerenidis and Sikora (2013); Yang, Yang, Lei et al (2015)] and experiment[Fattal, Fiorentino, Chefles et al (2008); Li,Wen, Qin et al (2014);Nagy and Nagy (2017)]. …”
mentioning
confidence: 99%