Quantum cryptography beyond quantum key distribution
Quantum cryptography is the art and science of exploiting quantum mechanical effects in
order to perform cryptographic tasks. While the most well-known example of this discipline is …
order to perform cryptographic tasks. While the most well-known example of this discipline is …
Quantum private query: A new kind of practical quantum cryptographic protocol
This research aims to review the developments in the field of quantum private query (QPQ),
a type of practical quantum cryptographic protocol. The primary protocol, as proposed by …
a type of practical quantum cryptographic protocol. The primary protocol, as proposed by …
Towards a global quantum network
C Simon - Nature Photonics, 2017 - nature.com
Towards a global quantum network | Nature Photonics Skip to main content Thank you for
visiting nature.com. You are using a browser version with limited support for CSS. To obtain the …
visiting nature.com. You are using a browser version with limited support for CSS. To obtain the …
Decoy-state method for quantum-key-distribution-based quantum private query
B Liu, S **a, D **ao, W Huang, B Xu, Y Li - Science China Physics …, 2022 - Springer
The quantum private query (QPQ) is a quantum solution for the symmetrically private
information retrieval problem. We study the security of quantum-key-distribution-based QPQ …
information retrieval problem. We study the security of quantum-key-distribution-based QPQ …
A generic construction of quantum-oblivious-key-transfer-based private query with ideal database security and zero failure
CY Wei, XQ Cai, B Liu, TY Wang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Higher security and lower failure probability have always been people's pursuits in quantum-
oblivious-key-transfer-based private query (QOKT-PQ) protocols since Jacobi et al.[Phys …
oblivious-key-transfer-based private query (QOKT-PQ) protocols since Jacobi et al.[Phys …
Practical quantum private query with better performance in resisting joint-measurement attack
CY Wei, TY Wang, F Gao - Physical Review A, 2016 - APS
As a kind of practical protocol, quantum-key-distribution (QKD)-based quantum private
queries (QPQs) have drawn lots of attention. However, joint-measurement (JM) attack poses …
queries (QPQs) have drawn lots of attention. However, joint-measurement (JM) attack poses …
Quantum cryptography: Key distribution and beyond
Quantum Cryptography: Key Distribution and Beyond Page 1 Quantum Cryptography: Key
Distribution and Beyond Akshata Shenoy-Hejamadi 1, Anirban Pathak 2 & Srikanth …
Distribution and Beyond Akshata Shenoy-Hejamadi 1, Anirban Pathak 2 & Srikanth …
Flexible quantum private queries based on quantum key distribution
F Gao, B Liu, QY Wen, H Chen - Optics express, 2012 - opg.optica.org
By adding a parameter θ in M. Jakobi et al's protocol [Phys. Rev. A 83, 022301 (2011)], we
present a flexible quantum-key-distribution-based protocol for quantum private queries. We …
present a flexible quantum-key-distribution-based protocol for quantum private queries. We …
Novel multiparty quantum key agreement protocol with GHZ states
GB Xu, QY Wen, F Gao, SJ Qin - Quantum information processing, 2014 - Springer
In many circumstances, a shared key is needed to realize secure communication. Based on
quantum mechanics principles, quantum key agreement (QKA) is a good method to …
quantum mechanics principles, quantum key agreement (QKA) is a good method to …
Survey on quantum information security
H Zhang, Z Ji, H Wang, W Wu - China Communications, 2019 - ieeexplore.ieee.org
The security of classical cryptography based on computational complexity assumptions has
been severely challenged with the rapid development of quantum computers and quantum …
been severely challenged with the rapid development of quantum computers and quantum …