Author of the publication

Secure quantum network coding based on quantum homomorphic message authentication.

, , , and . Quantum Inf. Process., 18 (1): 14 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain., , , , , and . IEEE Access, (2018)Fault-tolerant error correction for quantum Hamming codes with only two ancillary qudits., , , , and . Quantum Inf. Process., 22 (1): 70 (January 2023)A quantum image dual-scrambling encryption scheme based on random permutation., , and . Sci. China Inf. Sci., 62 (12): 229501 (2019)Quantum homomorphic encryption scheme with flexible number of evaluator based on (k, n)-threshold quantum state sharing., , , and . Inf. Sci., (2019)SLBRS: Network Virus Propagation Model based on Safety Entropy., , , , and . Appl. Soft Comput., 97 (Part): 106784 (2020)Secure quantum network coding based on quantum homomorphic message authentication., , , and . Quantum Inf. Process., 18 (1): 14 (2019)Weight Distributions of q-ary Optimal Locally Repairable Codes with Locality 2, Distance 5 and Even Dimension., , , , and . ISIT, page 611-615. IEEE, (2020)On the Maximal Code Length of Optimal Linear Locally Repairable Codes., , , and . ISIT, page 1326-1330. IEEE, (2018)IoT Device Recognition Framework Based on Network Protocol Keyword Query., , , , , and . ICAIS (1), volume 12239 of Lecture Notes in Computer Science, page 219-231. Springer, (2020)Quantum network coding without loss of information., , , , and . Quantum Inf. Process., 20 (2): 65 (2021)