2022
DOI: 10.1007/s11128-022-03534-5
|View full text |Cite
|
Sign up to set email alerts
|

Multiparty anonymous quantum communication without multipartite entanglement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 78 publications
0
2
0
Order By: Relevance
“…However, with the rapid development of quantum computers and quantum information, the security of classical anonymous communication protocols based on computational complexity protocols will confront formidable challenges in the future. Fortunately, anonymous quantum communication (AQC) [3][4][5][6][7][8][9][10][11][12][13][14][15][16] provides a promising approach to address these challenges, as it offers unconditional security in theory. AQC is an important branch of quantum communication.…”
Section: Introductionmentioning
confidence: 99%
“…However, with the rapid development of quantum computers and quantum information, the security of classical anonymous communication protocols based on computational complexity protocols will confront formidable challenges in the future. Fortunately, anonymous quantum communication (AQC) [3][4][5][6][7][8][9][10][11][12][13][14][15][16] provides a promising approach to address these challenges, as it offers unconditional security in theory. AQC is an important branch of quantum communication.…”
Section: Introductionmentioning
confidence: 99%
“…Hence, a W-state-based quantum anonymous transmission protocol that outperformed the GHZ state-based and entanglement relay-based protocols in the presence of noise was proposed [ 9 ]. To date, various anonymous quantum communication protocols have been proposed based on single particles, Bell states, GHZ states, and W states [ 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 ]. In order to employ these protocols in practical network scenarios, they must be able to provide the desired communication task under the presence of adversaries and a noisy environment.…”
Section: Introductionmentioning
confidence: 99%