2015
DOI: 10.1007/s11128-015-1107-9
|View full text |Cite
|
Sign up to set email alerts
|

A scheme for secure quantum communication network with authentication using GHZ-like states and cluster states controlled teleportation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 63 publications
(20 citation statements)
references
References 78 publications
0
20
0
Order By: Relevance
“…Compared to previous protocols, in the proposed protocol the participants encode their votes not only on their received particles by the organizer but also by repeating their votes on the other participant's particle sequences shared by the CEO, so in votes collecting phase, when the encoded particles are returned to the CEO, two particle sequences including mixed votes of the voters are transmitted to CEO and no one is able to know information about the voting of individual voters. Also the presented protocol is realizable since quantum superdense coding among three parties can be realized experimentally with nuclear magnetic resonance [28].…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Compared to previous protocols, in the proposed protocol the participants encode their votes not only on their received particles by the organizer but also by repeating their votes on the other participant's particle sequences shared by the CEO, so in votes collecting phase, when the encoded particles are returned to the CEO, two particle sequences including mixed votes of the voters are transmitted to CEO and no one is able to know information about the voting of individual voters. Also the presented protocol is realizable since quantum superdense coding among three parties can be realized experimentally with nuclear magnetic resonance [28].…”
Section: Resultsmentioning
confidence: 99%
“…The senders of the particle sequences make a record of the inserted positions of the decoy photons for eavesdropping check. As the states and the positions of the decoy photons are unknown for any one, the eavesdropping done by the eavesdropper will inevitably disturb these decoy photons and will be detected [28,29].…”
Section: Amentioning
confidence: 99%
See 2 more Smart Citations
“…The essential concept of this CQT scheme is that it is possible for the receiver (Bob) to recover the unknown state with information of the sender (Alice) and also information of a controller (or arbitrator, Trent). After this, CQT schemes were proposed using a Brown state via cavity QED 5 , quantum dots (QDs) 10 , GHZ-like states 12 , nitrogen vacancy centers 13 , a GHZ state in an ion-trapped system 15 , a four-particle cluster state 17 .…”
Section: Introductionmentioning
confidence: 99%