Guo-Jyun Zeng

Guo-Jyun Zeng
National Chi Nan University · Department of Computer Science and Information Engineering

About

17
Publications
1,972
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
167
Citations

Publications

Publications (17)
Article
Full-text available
Secret sharing is a widely-used security protocol and cryptographic primitive in which all people cooperate to restore encrypted information. The characteristics of a quantum field guarantee the security of information; therefore, many researchers are interested in quantum cryptography and quantum secret sharing (QSS) is an important research topic...
Article
Full-text available
A correction to this article has been published and is linked from the HTML and PDF versions of this paper. The error has not been fixed in the paper.
Article
Full-text available
This research proposes the first one-out-of-two quantum oblivious transfer (QOT) scheme that does not have a two-level structure and is not subject to Lo’s no-go theorem. Instead, the proposed scheme is a simple and efficient approach based on nonorthogonal states. The nonorthogonality causes one of a pair of messages to be unable to be measured to...
Article
Full-text available
This paper presents a novel dynamic group multi-party Quantum Key Agreement (DGMQKA) protocol, achieved by a multicast transmission method. The proposed method is able to achieve arbitrary number of groups and members under the same resources. In addition, it can be dynamically adjusted by joining a new member, combining two groups into one group,...
Article
In this article, we proposed an simple and efficient one-out-of-two quantum oblivious transfer (QOT) protocol based on nonorthogonal states. This property makes the quantum immune some operations to accomplish irreversible goal. In addition, the property can also avoid entangled cheat from illegal agent. Therefore, it can build QOT protocol on the...
Article
Full-text available
Quantum Key Agreement (QKA) signifies that two or more participants together generate a key and QKA has to satisfy the following conditions: 1 Every participant can change the key and the key is not decided by any participant individually. 2 Only participants can know the key; nonparticipants cannot get the key through illegal means. Because of the...
Article
Quantum computing can effectively and efficiently perform dense coding, teleportation, prime factoring, and database search methods. Quantum cryptography can be used in secret sharing, secure computation, and secure direct communications. Cloud computing and e-commerce are also ensured by applying quantum computation. In this article we introduce e...
Article
We propose a controlled quantum secure direct communication protocol which can be used for online shopping. The online shopping mall is able to control the shopping process, so the customer’s shopping information can be more secure. In this paper, single photons are used to carry customer’s information, so the cost of our protocol is less than othe...
Article
Full-text available
We propose a novel protocol for controlled bidirectional quantum secure communication based on a nonlocal swap gate scheme. Our proposed protocol would be applied to a system in which a controller (supervisor/Charlie) controls the bidirectional communication with quantum information or secret messages between legitimate users (Alice and Bob). In th...
Article
In this paper, we propose a communication protocol called Controlled Bidirectional Quantum Secret Direct Communication (CBQSDC) for mobile networks. In mobile networks, telecom companies assist the agent ensuring both sides could receive the other's secret messages in the transmission by quantum theory simultaneously. This protocol is based on n-pa...
Conference Paper
This paper proposes a bidirectional quantum secure direct communication protocol with a controller, who assists the users in making sure both sides could receive the other's secret messages simultaneously during the transmission. This protocol is based on Einstein-Podolsky-Rosen (EPR) pairs. If any eavesdropper tries to steal dealer's messages, the...
Article
We propose a quantum secure direct communication protocol with a controller, who assists the agent gets the secret messages sent from the dealer. Single photons are used to carry dealer's message, so the cost of our protocol is less than others use entangled qubits. If any eavesdropper tries to steal dealer's messages, the lawful participants will...

Network

Cited By