2004
DOI: 10.1016/j.physleta.2004.06.009
|View full text |Cite
|
Sign up to set email alerts
|

Quantum dialogue

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
218
0

Year Published

2006
2006
2019
2019

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 330 publications
(218 citation statements)
references
References 11 publications
0
218
0
Order By: Relevance
“…In this paper, we prove that QD protocol presented by [11,12,13,14] are insecure because classical com- * Electronic address: qycai@wipm.ac.cn munication is erroneously used in these protocols. Alice and Bob's encoding operations are correlated given the published measurement results.…”
Section: Introductionmentioning
confidence: 91%
See 1 more Smart Citation
“…In this paper, we prove that QD protocol presented by [11,12,13,14] are insecure because classical com- * Electronic address: qycai@wipm.ac.cn munication is erroneously used in these protocols. Alice and Bob's encoding operations are correlated given the published measurement results.…”
Section: Introductionmentioning
confidence: 91%
“…In the entanglement-based QD protocol [12], it is claimed that both Alice and Bob can encode two-bit secret message on an EPR pair. After a public announcement, both Alice and Bob can obtain two-bit secret message from each other.…”
Section: Introductionmentioning
confidence: 99%
“…And we need checking security only once. Furthermore, we also apply this strategy of secret transmitting order to bidirectional communication, which is so-called quantum dialogue [17]. Our present schemes not only ensure the unconditional security but also improve the efficiency of communication.…”
Section: Introductionmentioning
confidence: 99%
“…Many people are interested in researching QSDC, and many protocols like QSDC were proposed, including the protocols without using entanglement [15][16][17], the protocols using entanglement [18][19][20][21][22][23] and the two-way QSDC protocols [24][25][26][27][28][29][30][31][32][33].The QSDC protocol can also be used in some special environments as first proposed by Bostr?m et al [34] and Deng et al [18]. In Ref.…”
Section: Introductionmentioning
confidence: 99%