2017
DOI: 10.1007/s10773-017-3553-x
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 38 publications
(12 citation statements)
references
References 35 publications
0
12
0
Order By: Relevance
“…In addition, machine learning techniques have been widely used in forecasting a variety of complex data, such as deep learning [Tu, Lin, Wang et al (2018)]. Liu et al [Liu, Xu, Yang et al (2018)] proposed an efficient and secure arbitrary N-Party quantum key agreement protocol.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In addition, machine learning techniques have been widely used in forecasting a variety of complex data, such as deep learning [Tu, Lin, Wang et al (2018)]. Liu et al [Liu, Xu, Yang et al (2018)] proposed an efficient and secure arbitrary N-Party quantum key agreement protocol.…”
Section: Literature Reviewmentioning
confidence: 99%
“…information processing, encrypted transmission, machine learning, etc.) has also achieved some important results, such as quantum key agreement (QKA) [6], [7], quantum secure direct communication (QSDC) [8], [9], quantum teleportation and remote state preparation (QT&RSP) [10]- [12], quantum steganography (QS) [13]- [15], delegating quantum computation (DQC) [16], [17], and quantum machine learning [18], [19].…”
Section: Introductionmentioning
confidence: 99%
“…By using the quantum entanglement resources, a variety of quantum communication protocols were put forward to solve the problem of quantum information transmission, such as quantum secure direct communication [Wang, Deng, Li et al (2005)], quantum secret sharing [Lin, Guo, Xu et al (2016); Chen, Tang, Xu et al (2018)], quantum key management [Xu, Chen, Duo et al (2015); Liu, Xu, Yang et al (2018)], quantum steganography [Wei, Chen, Niu et al (2015); Qu, Cheng, Liu et al (2018); Qu, Chen, Ji et al (2018)], quantum teleportation (QT) [Fortes and Rigolin (2017); Bennett, Brassard, Crépeau et al (1993); Tan, Li and Yang (2018)] and remote state preparation (RSP) [Pati (2000); Cavaillès, Le Jeannic, Raskop et al (2017]. In a RSP, the sender (Alice) can prepare a known state for a remote receiver (Bob) via a shared quantum channel and some classical communications.…”
Section: Introductionmentioning
confidence: 99%