About
17
Publications
1,972
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
167
Citations
Introduction
Publications
Publications (17)
Secret sharing is a widely-used security protocol and cryptographic primitive in which all people cooperate to restore encrypted information. The characteristics of a quantum field guarantee the security of information; therefore, many researchers are interested in quantum cryptography and quantum secret sharing (QSS) is an important research topic...
A correction to this article has been published and is linked from the HTML and PDF versions of this paper. The error has not been fixed in the paper.
This research proposes the first one-out-of-two quantum oblivious transfer (QOT) scheme that does not have a two-level structure and is not subject to Lo’s no-go theorem. Instead, the proposed scheme is a simple and efficient approach based on nonorthogonal states. The nonorthogonality causes one of a pair of messages to be unable to be measured to...
This paper presents a novel dynamic group multi-party Quantum Key Agreement (DGMQKA) protocol, achieved by a multicast transmission method. The proposed method is able to achieve arbitrary number of groups and members under the same resources. In addition, it can be dynamically adjusted by joining a new member, combining two groups into one group,...
In this article, we proposed an simple and efficient one-out-of-two quantum oblivious transfer (QOT) protocol based on nonorthogonal states. This property makes the quantum immune some operations to accomplish irreversible goal. In addition, the property can also avoid entangled cheat from illegal agent. Therefore, it can build QOT protocol on the...
Quantum Key Agreement (QKA) signifies that two or more participants together generate a key and QKA has to satisfy the following conditions: 1 Every participant can change the key and the key is not decided by any participant individually. 2 Only participants can know the key; nonparticipants cannot get the key through illegal means. Because of the...
Quantum computing can effectively and efficiently perform dense coding, teleportation, prime factoring, and database search methods. Quantum cryptography can be used in secret sharing, secure computation, and secure direct communications. Cloud computing and e-commerce are also ensured by applying quantum computation. In this article we introduce e...
We propose a controlled quantum secure direct communication protocol which can be used for online shopping. The online shopping mall is able to control the shopping process, so the customer’s shopping information can be more secure. In this paper, single photons are used to carry customer’s information, so the cost of our protocol is less than othe...
We propose a novel protocol for controlled bidirectional quantum secure communication based on a nonlocal swap gate scheme. Our proposed protocol would be applied to a system in which a controller (supervisor/Charlie) controls the bidirectional communication with quantum information or secret messages between legitimate users (Alice and Bob). In th...
In this paper, we propose a communication protocol called Controlled Bidirectional Quantum Secret Direct Communication (CBQSDC) for mobile networks. In mobile networks, telecom companies assist the agent ensuring both sides could receive the other's secret messages in the transmission by quantum theory simultaneously. This protocol is based on n-pa...
This paper proposes a bidirectional quantum secure direct communication protocol with a controller, who assists the users in making sure both sides could receive the other's secret messages simultaneously during the transmission. This protocol is based on Einstein-Podolsky-Rosen (EPR) pairs. If any eavesdropper tries to steal dealer's messages, the...
We propose a quantum secure direct communication protocol with a controller, who assists the agent gets the secret messages sent from the dealer. Single photons are used to carry dealer's message, so the cost of our protocol is less than others use entangled qubits. If any eavesdropper tries to steal dealer's messages, the lawful participants will...