2018
DOI: 10.1007/s10773-018-3875-3
|View full text |Cite
|
Sign up to set email alerts
|

Semi-Quantum Key Distribution Protocols with GHZ States

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(20 citation statements)
references
References 33 publications
0
19
0
Order By: Relevance
“…By generalizing the Bell state measurement (BSM) to a GHZ state measurement (GHZ-SM), the proposed protocol could be extended to authenticate more than one user and be used as a multy-party QKD, be used in quantum secret sharing applications or with semiQKD for the interconnectivity of networks. [66,67] An additional advantage of the approach we present over other mdiQKD is that, in crowded environments with many users, it is simpler to have one trusted gateway (Charlie) than many trusted users.…”
Section: Discussionmentioning
confidence: 99%
“…By generalizing the Bell state measurement (BSM) to a GHZ state measurement (GHZ-SM), the proposed protocol could be extended to authenticate more than one user and be used as a multy-party QKD, be used in quantum secret sharing applications or with semiQKD for the interconnectivity of networks. [66,67] An additional advantage of the approach we present over other mdiQKD is that, in crowded environments with many users, it is simpler to have one trusted gateway (Charlie) than many trusted users.…”
Section: Discussionmentioning
confidence: 99%
“…Liu et al [148] use an untrusted quantum server that try to steal session keys. Currently, various quantum states and technologies are used and to devise novel protocoles [149], [150], [151], [152], [153], [155]. Additionally, some authors analyze the security vulnerabilities of SQKD [156], [157], [158].…”
Section: F Semi-quantum Key Distributionmentioning
confidence: 99%
“…The process of authentication and key sharing is performed simultaneously to provide a sustainable flow of data. Semi-QKD was proposed in [96] where Charlie, as the third party prepares Green-Horne-Zeilinger (GHZ) states, divides them into a sequence and inserts decoy states into the sequence. Then, the quantum Alice requests the sequence of GHZ states and shares it with classical Bob.…”
Section: Qkd Based On Entanglementmentioning
confidence: 99%