2013
DOI: 10.11591/ijins.v2i3.1838
|View full text |Cite
|
Sign up to set email alerts
|

Quantum password sharing scheme using trusted servers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…Other cryptographic applications have been studied, such as secret sharing or the Byzantine chord problem. The more specific exploitation of quantum entanglement has also led to dense coding [17], quantum teleportation [18] and other applications, also recently a new stady of Quantum 2989 password sharing scheme using trusted servers is published [19]. In a previous work, we have presented the quantum key distribution with several intercept and resend attacks [20] and with several cloning attacks [21], and we have investigated the cases of quantum key distribution with several attacks via a depolarizing channel [22] [23] and partially non-orthogonal basis states [24].…”
Section: Introductionmentioning
confidence: 99%
“…Other cryptographic applications have been studied, such as secret sharing or the Byzantine chord problem. The more specific exploitation of quantum entanglement has also led to dense coding [17], quantum teleportation [18] and other applications, also recently a new stady of Quantum 2989 password sharing scheme using trusted servers is published [19]. In a previous work, we have presented the quantum key distribution with several intercept and resend attacks [20] and with several cloning attacks [21], and we have investigated the cases of quantum key distribution with several attacks via a depolarizing channel [22] [23] and partially non-orthogonal basis states [24].…”
Section: Introductionmentioning
confidence: 99%