Literature DB >> 14525523

The "ping-pong" protocol can be attacked without eavesdropping.

Qing-yu Cai.   

Abstract

Year:  2003        PMID: 14525523     DOI: 10.1103/PhysRevLett.91.109801

Source DB:  PubMed          Journal:  Phys Rev Lett        ISSN: 0031-9007            Impact factor:   9.161


× No keyword cloud information.
  5 in total

1.  Experimental demonstration on the deterministic quantum key distribution based on entangled photons.

Authors:  Hua Chen; Zhi-Yuan Zhou; Alaa Jabbar Jumaah Zangana; Zhen-Qiang Yin; Juan Wu; Yun-Guang Han; Shuang Wang; Hong-Wei Li; De-Yong He; Shelan Khasro Tawfeeq; Bao-Sen Shi; Guang-Can Guo; Wei Chen; Zheng-Fu Han
Journal:  Sci Rep       Date:  2016-02-10       Impact factor: 4.379

2.  One Step Quantum Key Distribution Based on EPR Entanglement.

Authors:  Jian Li; Na Li; Lei-Lei Li; Tao Wang
Journal:  Sci Rep       Date:  2016-06-30       Impact factor: 4.379

3.  Controlled bidirectional quantum secure direct communication.

Authors:  Yao-Hsin Chou; Yu-Ting Lin; Guo-Jyun Zeng; Fang-Jhu Lin; Chi-Yuan Chen
Journal:  ScientificWorldJournal       Date:  2014-05-05

4.  Security of modified Ping-Pong protocol in noisy and lossy channel.

Authors:  Yun-Guang Han; Zhen-Qiang Yin; Hong-Wei Li; Wei Chen; Shuang Wang; Guang-Can Guo; Zheng-Fu Han
Journal:  Sci Rep       Date:  2014-05-12       Impact factor: 4.379

5.  A generalized architecture of quantum secure direct communication for N disjointed users with authentication.

Authors:  Ahmed Farouk; Magdy Zakaria; Adel Megahed; Fatma A Omara
Journal:  Sci Rep       Date:  2015-11-18       Impact factor: 4.379

  5 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.