2016
DOI: 10.14257/ijsia.2016.10.12.09
|View full text |Cite
|
Sign up to set email alerts
|

Semi-quantum Key Distribution Protocol Based on Bell States

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 25 publications
(38 reference statements)
0
2
0
Order By: Relevance
“…In [15] Tao Fang implemented a Controlled Quantum Secure Direct Communication Protocol Based on Extended Threeparticle GHZ State Decoy. In [16] Ting Wang, et al, realized a semi-quantum Key distribution protocol based on Bell States. In [17] Daehyon Kim studied normalization of input vectors in deep belief networks (DBNs) for automatic incident detection.…”
Section: Related Studiesmentioning
confidence: 99%
“…In [15] Tao Fang implemented a Controlled Quantum Secure Direct Communication Protocol Based on Extended Threeparticle GHZ State Decoy. In [16] Ting Wang, et al, realized a semi-quantum Key distribution protocol based on Bell States. In [17] Daehyon Kim studied normalization of input vectors in deep belief networks (DBNs) for automatic incident detection.…”
Section: Related Studiesmentioning
confidence: 99%
“…The base station BS can establish a shared key K AB (N-bit) with the user Alice through the well-known BB84, BBM92, or other mature QKD protocol. [9][10][11][12][13] Let K AB = fk(i); i = 1, 2, . .…”
Section: System Initializationmentioning
confidence: 99%