Author of the publication

A stronger participant attack on the measurement-device-independent protocol for deterministic quantum secret sharing.

, , , , , , and . Quantum Inf. Process., 20 (7): 1-12 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New quantum key agreement protocols based on Bell states., , , , and . Quantum Inf. Process., 18 (10): 322 (2019)Simple hash function using discrete-time quantum walks., , , , , and . Quantum Inf. Process., 17 (8): 189 (2018)Comment on "The enhanced quantum blind signature protocol"., , and . Quantum Inf. Process., 13 (6): 1305-1312 (2014)A new visually meaningful double-image encryption algorithm combining 2D compressive sensing with fractional-order chaotic system., , , , , and . Multim. Tools Appl., 83 (2): 3621-3655 (January 2024)Reducing the communication complexity of quantum private database queries by subtle classical post-processing with relaxed quantum ability., , , , , , and . Comput. Secur., (2019)Deterministic secure quantum communication based on spatial encoding., , , , , , and . Quantum Inf. Process., 21 (1): 2 (2022)An image reranking algorithm based on discrete-time quantum walk., , , , and . Multim. Tools Appl., 83 (12): 34979-34994 (April 2024)Combining long-term learning and active learning with semi-supervised method for content-based image retrieval., , , and . MMM, IEEE, (2006)Quantum network communication: a discrete-time quantum-walk approach., , , , , , and . Sci. China Inf. Sci., 61 (4): 042501:1-042501:10 (2018)Comment on "efficient and feasible quantum private comparison of equality against the collective amplitude damping noise"., , and . Quantum Inf. Process., 13 (2): 573-585 (2014)