Citation: | WANG He, ZHANG Yuqing, WU Gaofei, et al. “Authenticated Quantum Dialogue Without Information Leakage”. Chinese Journal of Electronics, vol. 27 no. 2. doi: 10.1049/cje.2018.01.010 |
C.H. Bennett and G. Brassard, "Quantum cryptography:Public key distribution and coin tossing", Proc. IEEE Int. Conf. on Computers, Systems and Signal Processing, Bangalore, India, pp.175-179, 1984.
|
C.H. Bennett, "Quantum cryptography using any two nonorthogonal states", Physical Review Letters, Vol.68, No.21, pp.3121-3124, 1992.
|
A.K. Ekert, "Quantum cryptography based on Bells theorem", Physical Review Letters, Vol.67, No.6, pp.661-663, 1991.
|
A. Cabello, "Quantum key distribution in the Holevo limit", Physical Review Letters, Vol.85, No.26, pp.5635-5638, 2000.
|
F.G. Deng and G.L. Long, "Controlled order rearrangement encryption for quantum key distribution", Physical Review A, Vol.68, No.4, pp.4343-4349, 2002.
|
F.G. Deng and G.L. Long, "Bidirectional quantum key distribution protocol with practical faint laser pulses", Physical Review A, Vol.70, No.1, pp.235-238, 2004.
|
X.H. Li, F.G. Deng and H.Y. Zhou, "Efficient quantum key distribution over a collective noise channel", Physical Review A, Vol.78, No.2, Article ID 022321, 2008.
|
A. Beige, B.G. Englert, et al., "Secure communication with a publicly known key", Acta Physica Polonica, Vol.101, No.1, pp.357-368, 2001.
|
K. Bostrom and T. Felbinger, "Deterministic secure direct communication using entanglement", Physical Review Letters, Vol.89, No.18, Article ID 187902, 2002.
|
F.G. Deng, G.L. Long and X.S. Liu, "Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block", Physical Review A, Vol.68, No.4, 042317, 2003.
|
Z.X. Man, Z.J. Zhang and Y. Li, "Deterministic secure direct communication by using swapping quantum entanglement and local unitary operations", Chinese Physics Letters, Vol.22, No.1, pp.18-21, 2005.
|
G.Y. Wang, X.M. Fang and X.H. Tan, "Quantum secure direct communication with cluster state", Chinese Physics Letters, Vol.23, No.10, pp.2658-2661, 2006.
|
A.D. Zhu, Y. Xia and Q.B. Fan, "Secure direct communication based on secret transmitting order of particles", Physical Review A, Vol.73, No.2, pp.457-460, 2006.
|
B.A. Nguyen, "Quantum dialogue", Physics Letters A, Vol.328, No.1, pp.6-10, 2004.
|
Z.X. Man, Z.J. Zhang and Y. Li, "Quantum dialogue revisited", Chinese Physics Letters, Vol.22, No.1, pp.22-24, 2005.
|
Z.X. Man, Y.J. Xia and Z.J. Zhang, "Secure deterministic bidirectional communication without entanglement", International Journal of Quantum Information, Vol.4, No.4, pp.739-746, 2006.
|
Y. Xia, J. Song and J. Nie, "Controlled secure quantum dialogue using a pure entangled GHZ states", Communications in Theoretical Physics, Vol.48, No.11, pp.841-846, 2007.
|
Y. Chen, Z.X. Man and Y.J. Xia, "Quantum bidirectional secure direct communication via entanglement swapping", Chinese Physics Letters, Vol.24, No.1, pp.19-22, 2007.
|
F. Gao, F.Z Guo and Q.Y. Wen, "Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication", Science China Physics, Mechanics and Astronomy, Vol.51, No.5, pp.559-566, 2008.
|
Y.G. Tan and Q.Y. Cai, "Classical correlation in quantum dialogue", International Journal of Quantum Information, Vol.6, No.2, pp.325-329, 2008.
|
T.Y. Ye and L.Z. Jiang, "Quantum dialogue without information leakage based on the entanglement swapping between any two Bell states and the shared Bell state", Physica Scripta, Vol.89, No.1, pp.169-174, 2014.
|
H. Wang, Y.Q. Zhang, et al., "Two quantum dialogue schemes based on Bell states and two-qutrit entangled states without information leakage", Journal of National University of Defense Technology, Vol.34, No.2, pp.10-13, 2012.
|
H. Wang, Y.Q. Zhang and Y.P. Hu, "Efficient quantum dialogue by using the two-qutrit entangled states without information leakage", International Journal of Theoretical Physics, Vol.52, No.6, pp.1745-1750, 2013.
|
H. Wang, X.F. liu, Y.Q. Zhang, et al., "Efficient quantum dialogue using entangled states and entanglement swapping without information leakage", Quantum Information Processing, Vol.15, No.6, 2593-2603, 2016.
|
H. Lee, J. Lim and H.J. Yang, "Quantum direct communication with authentication", Physical Review A, Vol.73, No.4, Article ID 042305, 2006.
|
Z.J. Zhang, J. Liu, et al., "Comment on quantum direct communication with authentication", Physical Review A, Vol.75, No.2, pp.243-262, 2010.
|
D. Liu, C.X. Pei, D.X. Quan, et al.,"A new quantum secure direct communication scheme with authentication", Chinese Physics Letters, Vol.27, No.5, pp.23-25, 2010.
|
F. Gao, S.J. Qin, F.Z. Guo, et al., "Cryptanalysis of quantum secure direct communication and authentication scheme via Bell states", Chinese Physics Letters, Vol.28, No.2, pp.20303-20306, 2011.
|
M. Naseri, "An efficient protocol for quantum secure dialogue with authentication by using single photons", International Journal of Quantum Information, Vol.9, No.07n08, pp.1677-1684, 2011.
|
D. Shen, W. Ma, X. Yin, et al., "Quantum dialogue with authentication based on Bell states", International Journal of Theoretical Physics, Vol.52, No.6, pp.1825-1835, 2013.
|
T.H, Lin, C.Y. Lin and T. Hwang, "Man-in-the-middle attack on quantum dialogue with authentication based on Bell states", International Journal of Theoretical Physics, Vol.52, No.6, pp.3199-3203, 2013.
|
M. Naseri, "Revisiting quantum authentication scheme based on entanglement swapping", International Journal of Theoretical Physics, Vol.55, No.5, pp.2428-2435, 2016.
|
C.Y. Lin, C.W. Yang and T. Hwang, "Authenticated quantum dialogue based on Bell states", International Journal of Theoretical Physics, Vol.54, No.3, pp.780-786, 2015.
|
J. LI, X.X Ye, et al., "Improved eavesdropping detection strategy based on extended three-particle greenberger-hornezeilinger state in two-step quantum direct communication protocol", Chinese Journal of Electronics, Vol.21, No.4, pp.736-739, 2012.
|
T.Y. Ye, "Fault-tolerant authenticated quantum dialogue using logical Bell states", Quantum Information Processing, Vol.14, No.9, pp.3499-3514, 2015.
|
F.G. Deng, X.H. Li and H.Y. Zhou, "Improving the security of multiparty quantum secret sharing against Trojan horse attack", Physical Review A, Vol.72, Article ID 044302, 2005.
|
J. Li, Z. Pan, J. Zheng, et al., "The security analysis of quantum SAGR04 protocol in collective-rotation noise channel",Chinese Journal of Electronics, Vol.24, No.4, pp.689-693, 2015.
|
Z.H. Liu, H.W. Chen and W.J. Liu, "Information leakage problem in high-capacity quantum secure communication with authentication using Einstein-Podolsky-Rosen pairs", Chinese Physics Letters, Vol.33, No.7, pp.14-15, 2016.
|
G. Gao and Y. Wang, "Cryptanalysis of controlled mutual quantum entity authentication using entanglement swapping", Communications in Theoretical Physics, Vol.67, No.1, pp.33-36, 2017.
|
M. Xiao, Y.R. Cao and X.L. Song, "Efficient and secure authenticated quantum dialogue protocols over collective-noise channels", Chinese Physics Letters, Vol.34, No.3, pp.6-10, 2017.
|