While secure communication between two quantum parties has been shown possible theoretically, what is the possible direct communication between a full quantum capability sender Alice and a limited quantum capability receiver Bob? This is called Semi- Quantum Direct Communication (SQDC). Several protocols have been proposed for secure SQDC. However, they all need a pre-shared key and at least linear entanglement preservation time, as well as a linear number of quantum bit registers, with respect to message length. Besides, complex hardware implementation (including quantum bit permutations) decreases the transmission efciency. This paper introduces a no-key SQDC protocol requiring only constant entanglement preservation time and a xed number...
Based on the 'ping-pong' quantum communication protocol proposed by Bostr$\overset{..}{o}$m and Felb...
Agile cryptography allows for a resource-efficient swap of a cryptographic core in case the security...
Problem statement: In previous researches, we investigated the security of communication channels, w...
Full quantum capability devices can provide secure communications, but they are challenging to make ...
Recently, quantum key distribution (QKD) with classical Bob has been suggested and proven completely...
Most of quantum secure direct communication protocols need a pre-established secure quantum channel....
Quantum algorithm puts serious threats to information security. Quantum cryptography offers new solu...
Quantum secure direct communication (QSDC) is capable of direct confidential communications over a q...
Abstract—A secure quantum deterministic communication protocol is described. The protocol is based o...
In this paper, we design a new quantum key distribution protocol, al-lowing two limited semi-quantum...
Abstract The practical implementation of quantum secure direct communication (QSDC) will undoubtedly...
Mediated semi-quantum key distribution involves the use of two end-users who have very restricted, a...
Agile cryptography allows for a resource-efficient swap of a cryptographic core in case the security...
This paper introduces two information-theoretically secure protocols that achieve quantum secure dir...
The paper proposes an efficient protocol for direct secure quantum communication that establishes cr...
Based on the 'ping-pong' quantum communication protocol proposed by Bostr$\overset{..}{o}$m and Felb...
Agile cryptography allows for a resource-efficient swap of a cryptographic core in case the security...
Problem statement: In previous researches, we investigated the security of communication channels, w...
Full quantum capability devices can provide secure communications, but they are challenging to make ...
Recently, quantum key distribution (QKD) with classical Bob has been suggested and proven completely...
Most of quantum secure direct communication protocols need a pre-established secure quantum channel....
Quantum algorithm puts serious threats to information security. Quantum cryptography offers new solu...
Quantum secure direct communication (QSDC) is capable of direct confidential communications over a q...
Abstract—A secure quantum deterministic communication protocol is described. The protocol is based o...
In this paper, we design a new quantum key distribution protocol, al-lowing two limited semi-quantum...
Abstract The practical implementation of quantum secure direct communication (QSDC) will undoubtedly...
Mediated semi-quantum key distribution involves the use of two end-users who have very restricted, a...
Agile cryptography allows for a resource-efficient swap of a cryptographic core in case the security...
This paper introduces two information-theoretically secure protocols that achieve quantum secure dir...
The paper proposes an efficient protocol for direct secure quantum communication that establishes cr...
Based on the 'ping-pong' quantum communication protocol proposed by Bostr$\overset{..}{o}$m and Felb...
Agile cryptography allows for a resource-efficient swap of a cryptographic core in case the security...
Problem statement: In previous researches, we investigated the security of communication channels, w...