Let us consider a situation where two information brokers, whose currency is, of course, information, need to reciprocally exchange information. The two brokers, being somewhat distrustful, would like a third, mutually trusted entity to be involved in the exchange process so as to guarantee the successful completion of the transaction and also verify that it indeed took place. Can this be completed in such a way that both brokers receive their information simultaneously and securely, without the trusted intermediary knowing the exchanged information? This work presents and rigorously analyzes a new quantum entanglement-based protocol that provides a solution to the above problem. The proposed protocol is aptly named the entanglement-based r...
Bipartite quantum interactions have applications in a number of different areas of quantum physics, ...
Quantum communication provides several examples of communication protocols which cannot be imple-men...
Authentication is one of the security services that ensures sufficient security of the system by ide...
A verifiable quantum secret sharing protocol model is proposed based on entanglement swapping. The d...
ii Quantum secret sharing concerns secure and reliable distribution of classical or quantum informat...
Abstract. In this paper, we present a protocol in which two or more parties can share multipartite e...
We introduce a protocol for quantum secret sharing based on reusable entangled states. The entangled...
Abstract. Applying multipartite entanglement purification protocol, we present a quantum key distrib...
[[abstract]]Based on the multiparty quantum secret sharing (QSS) protocol called Zhang-Man protocol,...
International audience<p>In this work we address the issue of sharing a quantum secret over untruste...
Quantum cryptography is a well-stated field within quantum applications where quantum information is...
In this poster we propose a new protocol for multiparty secret key sharing by using quantum entangle...
This paper introduces two information-theoretically secure protocols that achieve quantum secure dir...
5 pages, added appendixFuture quantum information networks will likely consist of quantum and classi...
Copyright © 2014 Yao-Hsin Chou et al.This is an open access article distributed under the Creative C...
Bipartite quantum interactions have applications in a number of different areas of quantum physics, ...
Quantum communication provides several examples of communication protocols which cannot be imple-men...
Authentication is one of the security services that ensures sufficient security of the system by ide...
A verifiable quantum secret sharing protocol model is proposed based on entanglement swapping. The d...
ii Quantum secret sharing concerns secure and reliable distribution of classical or quantum informat...
Abstract. In this paper, we present a protocol in which two or more parties can share multipartite e...
We introduce a protocol for quantum secret sharing based on reusable entangled states. The entangled...
Abstract. Applying multipartite entanglement purification protocol, we present a quantum key distrib...
[[abstract]]Based on the multiparty quantum secret sharing (QSS) protocol called Zhang-Man protocol,...
International audience<p>In this work we address the issue of sharing a quantum secret over untruste...
Quantum cryptography is a well-stated field within quantum applications where quantum information is...
In this poster we propose a new protocol for multiparty secret key sharing by using quantum entangle...
This paper introduces two information-theoretically secure protocols that achieve quantum secure dir...
5 pages, added appendixFuture quantum information networks will likely consist of quantum and classi...
Copyright © 2014 Yao-Hsin Chou et al.This is an open access article distributed under the Creative C...
Bipartite quantum interactions have applications in a number of different areas of quantum physics, ...
Quantum communication provides several examples of communication protocols which cannot be imple-men...
Authentication is one of the security services that ensures sufficient security of the system by ide...