[1] |
Zhan Shao-Kang, Wang Jin-Dong, Dong Shuang, Huang Si-Ying, Hou Qing-Cheng, Mo Nai-Da, Mi Shang, Xiang Li-Bing, Zhao Tian-Ming, Yu Ya-Fei, Wei Zheng-Jun, Zhang Zhi-Ming.Finite-key analysis of decoy model semi-quantum key distribution based on four-state protocol. Acta Physica Sinica, 2023, 72(22): 220303.doi:10.7498/aps.72.20230849 |
[2] |
Gong Li-Hua, Chen Zhen-Yong, Xu Liang-Chao, Zhou Nan-Run.Bi-directional semi-quantum secure direct communication protocol based on high-dimensional single-particle states. Acta Physica Sinica, 2022, 71(13): 130304.doi:10.7498/aps.71.20211702 |
[3] |
Rong Min-Xi, Xin Xiang-Jun, Li Fa-Gen.Quantum signature for designated verifier with strong security. Acta Physica Sinica, 2020, 69(19): 190302.doi:10.7498/aps.69.20200244 |
[4] |
Tang Jie, Shi Lei, Wei Jia-Hua, Yu Hui-Cun, Xue Yang, Wu Tian-Xiong.Multi-party quantum key agreement based ond-level GHZ states. Acta Physica Sinica, 2020, 69(20): 200301.doi:10.7498/aps.69.20200799 |
[5] |
Shi Bao-Sen, Ding Dong-Sheng, Zhang Wei, Li En-Ze.Raman protocol-based quantum memories. Acta Physica Sinica, 2019, 68(3): 034203.doi:10.7498/aps.68.20182215 |
[6] |
Li Jian, Chen Yan-Hua, Pan Ze-Shi, Sun Feng-Qi, Li Na, Li Lei-Lei.Security analysis of BB84 protocol in the collective-rotation noise channel. Acta Physica Sinica, 2016, 65(3): 030302.doi:10.7498/aps.65.030302 |
[7] |
Nie Min, Wang Lin-Fei, Yang Guang, Zhang Mei-Ling, Pei Chang-Xing.Transmission protocol and its performance analysis of quantum communication network based on packet switching. Acta Physica Sinica, 2015, 64(21): 210303.doi:10.7498/aps.64.210303 |
[8] |
Zhao Feng.Simulation analysis of one-way error reconciliation protocol for quantum key distribution. Acta Physica Sinica, 2013, 62(20): 200303.doi:10.7498/aps.62.200303 |
[9] |
Zhao Nan, Pei Chang-Xing, Liu Dan, Quan Dong-Xiao, Sun Xiao-Nan.Quantum key distribution secure threshold based on BB84 protocol. Acta Physica Sinica, 2011, 60(9): 090307.doi:10.7498/aps.60.090307 |
[10] |
Wang Jing, Jiang Guo-Ping.Cryptanalysis of a hyper-chaotic image encryption algorithm and its improved version. Acta Physica Sinica, 2011, 60(6): 060503.doi:10.7498/aps.60.060503 |
[11] |
Quan Dong-Xiao, Pei Chang-Xing, Liu Dan, Zhao Nan.One-way deterministic secure quantum communication protocol based on single photons. Acta Physica Sinica, 2010, 59(4): 2493-2497.doi:10.7498/aps.59.2493 |
[12] |
Wang Yu-Wu, Zhan You-Bang.A theoretical scheme for zero-knowledge proof quantum identity authentication. Acta Physica Sinica, 2009, 58(11): 7668-7671.doi:10.7498/aps.58.7668 |
[13] |
Zhang Sheng, Wang Jian, Zhang Quan, Tang Chao-Jing.An analysis of the model of the error bits of quantum cryptography protocol. Acta Physica Sinica, 2009, 58(1): 73-77.doi:10.7498/aps.58.73 |
[14] |
Wang Tian-Yin, Qin Su-Juan, Wen Qiao-Yan, Zhun Fu-Chen.Analysis and improvement of multiparty controlled quantum secure direct communication protocol. Acta Physica Sinica, 2008, 57(12): 7452-7456.doi:10.7498/aps.57.7452 |
[15] |
He Guang-Qiang, Guo Hong-Bin, Li Yu-Dan, Zhu Si-Wei, Zeng Gui-Hua.Quantum key distribution using binary-modulated coherent states. Acta Physica Sinica, 2008, 57(4): 2212-2217.doi:10.7498/aps.57.2212 |
[16] |
Wang Jian, Chen Huang-Qing, Zhang Quan, Tang Chao-Jing.Multiparty controlled quantum secure direct communication protocol. Acta Physica Sinica, 2007, 56(2): 673-677.doi:10.7498/aps.56.673 |
[17] |
He Guang-Qiang, Yi Zhi, Zhu Jun, Zeng Gui-Hua.Quantum key distribution using two-mode squeezd states. Acta Physica Sinica, 2007, 56(11): 6427-6433.doi:10.7498/aps.56.6427 |
[18] |
Wang Kai, Pei Wen-Jiang, Zou Liu-Hua, He Zhen-Ya.Cryptanalysis of multiple chaotic systems based public key encryption technique. Acta Physica Sinica, 2006, 55(12): 6243-6247.doi:10.7498/aps.55.6243 |
[19] |
Zhang Quan, Tang Chao-Jing, Zhang Shen-Qiang.. Acta Physica Sinica, 2002, 51(7): 1439-1447.doi:10.7498/aps.51.1439 |
[20] |
Yang Li, Wu Ling-An, Liu Song-Hao.. Acta Physica Sinica, 2002, 51(11): 2446-2451.doi:10.7498/aps.51.2446 |