2021
DOI: 10.1007/s10773-020-04703-x
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Key Agreement Protocol Based on Quantum Search Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 43 publications
0
12
0
Order By: Relevance
“…Recently, Huang et al [29] presented a new QKA scheme based on Grover's algorithm []. eirprotocol enables authorized users to negotiate on a shared secure key, and noneof the authorized users can fully get the final agreement key alone.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, Huang et al [29] presented a new QKA scheme based on Grover's algorithm []. eirprotocol enables authorized users to negotiate on a shared secure key, and noneof the authorized users can fully get the final agreement key alone.…”
Section: Introductionmentioning
confidence: 99%
“…
Recently, Huang et al (2021) presented a quantum key agreement schemeto securely negotiate on a secret key employing the properties of a quantumsearch algorithm. First, the authors proposed the two-party quantum key agreement, and then they extended their work to the three-party case.
…”
mentioning
confidence: 99%
“…The simulation parameters include: the maximum permissible error rate e max = 0.11, the experiment's repetition rate ω = 1, the error correction failure threshold ε EC = 10 (−10) , and the aborting probability ε abort = Fig. 4 Finite Secret-key rate of DGL22 compared with several recent protocols: Fair random-based protocols [19,18,35,34], and [15]; and memory-assisted protocols [23,1,14], and [22].…”
Section: Key Establishment Timementioning
confidence: 99%
“…CONCLUSIONS Before drawing our conclusion, we briefly discuss some advantages of the proposed protocol compared with Refs. [31] and [36]. First, we consider the impersonation attacks which are inevitable in practical applications.…”
Section: A Dishonest Participant's Impersonation Attackmentioning
confidence: 99%