2008
DOI: 10.1103/physrevlett.101.208901
|View full text |Cite
|
Sign up to set email alerts
|

Comment on “Experimental Demonstration of a Quantum Protocol for Byzantine Agreement and Liar Detection”

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
39
0
1

Year Published

2011
2011
2022
2022

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 130 publications
(40 citation statements)
references
References 3 publications
(5 reference statements)
0
39
0
1
Order By: Relevance
“…For the security of a protocol, a dishonest legitimate participant generally has more threat than an outsider eavesdropper [36][37][38]. The purpose of Alice's or Bob's attack is to attempt to obtain other's secret information, and a semi-honest TP is intended to steal the parties' private information from his record of all intermediate computations.…”
Section: Participant Attackmentioning
confidence: 99%
“…For the security of a protocol, a dishonest legitimate participant generally has more threat than an outsider eavesdropper [36][37][38]. The purpose of Alice's or Bob's attack is to attempt to obtain other's secret information, and a semi-honest TP is intended to steal the parties' private information from his record of all intermediate computations.…”
Section: Participant Attackmentioning
confidence: 99%
“…The term "participant attack", which emphasizes that the attacks from dishonest users are generally more powerful and should be paid more attention to, is first proposed by Gao et al in [31] and has attracted much attention in the cryptanalysis of quantum cryptography [32][33][34][35][36][37]. We analyze the possibility of the three parties to get information about X and Y in our protocol.…”
Section: Participant Attackmentioning
confidence: 99%
“…[39] and has attracted much attention in the cryptanalysis of quantum cryptography [40][41][42][43][44][45]. We analyze the possibility of the three participants to get information about X and Y in our protocol.…”
Section: Participant Attackmentioning
confidence: 99%