Author of the publication

A stronger participant attack on the measurement-device-independent protocol for deterministic quantum secret sharing.

, , , , , , and . Quantum Inf. Process., 20 (7): 1-12 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comment on "The enhanced quantum blind signature protocol"., , and . Quantum Inf. Process., 13 (6): 1305-1312 (2014)Simple hash function using discrete-time quantum walks., , , , , and . Quantum Inf. Process., 17 (8): 189 (2018)New quantum key agreement protocols based on Bell states., , , , and . Quantum Inf. Process., 18 (10): 322 (2019)A new visually meaningful double-image encryption algorithm combining 2D compressive sensing with fractional-order chaotic system., , , , , and . Multim. Tools Appl., 83 (2): 3621-3655 (January 2024)Reducing the communication complexity of quantum private database queries by subtle classical post-processing with relaxed quantum ability., , , , , , and . Comput. Secur., (2019)Deterministic secure quantum communication based on spatial encoding., , , , , , and . Quantum Inf. Process., 21 (1): 2 (2022)An image reranking algorithm based on discrete-time quantum walk., , , , and . Multim. Tools Appl., 83 (12): 34979-34994 (April 2024)Efficient color image encryption by color-grayscale conversion based on steganography., , , , and . Multim. Tools Appl., 82 (7): 10835-10866 (March 2023)A visually meaningful image encryption algorithm based on adaptive 2D compressive sensing and chaotic system., , , , , and . Multim. Tools Appl., 82 (14): 22033-22062 (2023)Combining long-term learning and active learning with semi-supervised method for content-based image retrieval., , , and . MMM, IEEE, (2006)