Citation: | SHI Weimin, WANG Yanmei, LI Leilei, et al., “A Restricted Quantum Deniable Authentication Protocol Based on GHZ States,” Chinese Journal of Electronics, vol. 27, no. 2, pp. 229-233, 2018, doi: 10.1049/cje.2018.01.001 |
Y. Yang, Y.G. Wang, W. Chen, et al., "Design of electronics for phase coding QKD system", Acta Sinica Electronica, Vol.39, No.11, pp.2604-2609, 2011. (in Chinese)
|
C. Zhou, W.S. Bao and Q. Xiang, "Decoy-state quantum key distribution based on state-dependent imperfections", Acta Sinica of Electronica, Vol.40, No.11, pp.2015-2020, 2012. (in Chinese)
|
K.F. Yu, C.W. Yang, C.H. Liao, et al., "Authenticated semiquantum key distribution protocol using Bell states", Quantum Information Process, Vol.13, No.6, pp.1457-1465, 2014.
|
Z.W. Sun, J.W. Huang and P. Wang, "Efficient multiparty quantum key agreement protocol based on commutative encryption", Quantum Information Process, Vol.15, No.6, pp.2101-2111, 2016.
|
C.H. Bennett, "Quantum cryptography using any two nonorthogonal states", Physical Review Letters, Vol.68, Article ID 3121, 12 papes, 1992.
|
L. Goldenberg and L. Vaidman, "Quantum cryptography based on orthogonal states", Physical Review Letters, Vol.75, Article ID 1239, 10 papes, 1995.
|
L.Y. Zhao, Z.Q. Yin and W. Chen, "Loss-tolerant measurementdevice-independent quantum private queries", Scientific Reports, Vol.7, Article ID 39733, 12 papes, 2017.
|
R.H. Shi, Y. Mu and H. Zhong, "Privacy-preserving pointinclusion protocol for an arbitrary area based on phaseencodedquantum private query", Quantum Information Processing, Vol.16, Article ID 8, 10 papes, 2017.
|
Y.G. Yang, Z.C. Liu and J. Li, "Quantum private query with perfect user privacy against a joint-measurement attack", Physics Letters, Vol.380, No.48, pp.4033-4038, 2016.
|
Y.G. Yang, Z.C. Liu and X.B. Chen, "Novel classical postprocessing for quantum key distribution-based quantum private query", Quantum Information Processing, Vol.15, No.9, pp.3833-3840, 2016.
|
D.G. Marangon, V. Giuseppe and V. Paolo, "Source-deviceindependent ultrafast quantum random number generation", Physical Review Letters, Vol.118, Article ID 060503, 11 papes, 2017.
|
Y.Q. Nie, J.Y. Guan and H.Y. Zhou, "Experimental measurement-device-independent quantum random-number generation", Physical Review A, Vol.94, Article ID 060301, 13 papes, 2016.
|
C. Zhu, H.Y. Zhou and X.F. Ma, "Loss-tolerant measurementdevice-independent quantum random number generation", New Journal of Physics, Vol.17, Article ID 125011, 10 papes, 2015.
|
D.D. Li, Q.Y. Wen and Y.K. Wang, "Security of Semi-DeviceIndependent Random Number Expansion Protocols", Scientific Reports, Vol.5, No.10, pp.15543, 2015.
|
X. Deng, C.H. Lee and H. Zhu, "Deniable authentication protocols", IEEE Proceedings-Computers and Digital Techniques, Vol.148, No.2, pp.101-104, 2001.
|
Z.H. Shao, "Efficient deniable authentication protocol based on generalized ElGamal signature scheme", Computer Standards & Interfaces, Vol.26, No.5, pp.449-454, 2004.
|
W.B. Lee, C.C. Wu and W.J. Sui, "A novel deniable authentication protocol using generalized ElGamal signature scheme", Information Sciences, Vol.177, No.6, pp.1376-1381, 2007.
|
W.M. Shi, Y.H. Zhou and Y.G. Yang, "Quantum deniable authentication protocol", Quantum Information Process, Vol.13, No.7, pp.1501-1510, 2014.
|
W.M. Shi, Y.H. Zhou and Y.G. Yang, "A Real Quantum Designated Verifier Signature Scheme", Int J Theor Phys, Vol.54, No.9, pp.3115-3123, 2015.
|
Wei-Min Shi, Jian-Biao Zhang, Yi-Hua Zhou, et al., "A novel quantum deniable authentication protocol without entanglement", Quantum Information Processing, Vol.14, No.6, pp.2183-2193, 2015.
|
M.D. Raimondo and R. Gennaro, "New Approaches for Deniable Authentication", Journal of Cryptology, Vol.22, No.4, pp.572-615, 2005.
|
C.Y. Fan, S.J. Zhou and F.G. Li, "An identity-based restricted deniable authentication protocol", IEEE International Symposium on Parallel and Distributed Processing with Applications IEEE, Chengdu, Sichuan, China, pp.474-478, 2009.
|
F.G. Deng, G.L. Long and X.S. Liu, "Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block", Physical Review A, Vol.68, pp.042317, 2003.
|
A.K. Ekert, "Quantum cryptography based on Bell theorem", Physical Review Letters, Vol.67, pp.661-664, 1991.
|
S.K. Chong, C.W. Tsai and T. Hwang. "Improvement on quantum key agreement protocol with maximally entangled states", Int. J. Throe. Phys, Vol.50, No.6, pp.1793-1802, 2011.
|
J. Lin, H.Y. Tseng and T. Hwang, "Intercept-resend attacks on Chen et al.'s quantum private comparison protocol and the improvements", Opt. Commun., Vol.284, No.9, pp.2412-2414, 2011.
|
J. Lin and T. Hwang, "An enhancement on Shi et al.'s multiparty quantum secret sharing protocol", Opt. Commun, Vol.284, No.5, pp.1468-1471, 2011.
|