A fast quantum mechanical algorithm for database search
STOC '96 Proceedings of the twenty-eighth annual ACM symposium on Theory of computing
Securing QKD Links in the Full Hilbert Space
Quantum Information Processing
Unambiguous State Discrimination in Quantum Key Distribution
Quantum Information Processing
Algorithms for quantum computation: discrete logarithms and factoring
SFCS '94 Proceedings of the 35th Annual Symposium on Foundations of Computer Science
A simple participant attack on the brádler-dušek protocol
Quantum Information & Computation
Quantum key distribution via tripartite coherent states
Quantum Information Processing
Multiparty quantum secret sharing with the pure entangled two-photon states
Quantum Information Processing
New quantum private comparison protocol using EPR pairs
Quantum Information Processing
New multiparty authentication services and key agreement protocols
IEEE Journal on Selected Areas in Communications
Multi-party quantum key agreement with bell states and bell measurements
Quantum Information Processing
Efficient quantum private comparison employing single photons and collective detection
Quantum Information Processing
Quantum key agreement with EPR pairs and single-particle measurements
Quantum Information Processing
Improvements on "multiparty quantum key agreement with single particles"
Quantum Information Processing
Hi-index | 0.00 |
Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. That is, a secure QKA protocol can not only prevent the outside attackers from stealing the key, but also resist the attack from inside participants, i.e. some dishonest participants determine the key alone by illegal means. How to resist participant attack is an aporia in the design of QKA protocols, especially the multi-party ones. In this paper we present the first secure multiparty QKA protocol against both outside and participant attacks. Further more, we have proved its security in detail.