Security analysis and improvement of the dining cryptographer problem-based anonymous quantum communication via non-maximally entanglement state analysis
International Journal of Theoretical Physics, ISSN: 1572-9575, Vol: 54, Issue: 1, Page: 106-115
2015
- 4Citations
- 2Captures
Metric Options: Counts1 Year3 YearSelecting the 1-year or 3-year option will change the metrics count to percentiles, illustrating how an article or review compares to other articles or reviews within the selected time period in the same journal. Selecting the 1-year option compares the metrics against other articles/reviews that were also published in the same calendar year. Selecting the 3-year option compares the metrics against other articles/reviews that were also published in the same calendar year plus the two years prior.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Article Description
Recently, two novel anonymous quantum communication (AQC) protocols (Shi et al. in Int. J. Theor. Phys. 52, 376-384, 2013) are presented, respectively. One is in a public-receiver model, the other is in broadcasting channels. In their paper, the dining cryptographer problem (DCP) and the non-maximally entanglement state analysis (NESA) are applied. And they analyze some attack strategies, including the honest-but-curious and malicious participant attacking ones. Unfortunately, we find that there exist some potential loopholes in security. The identity of anonymous sender in the AQC protocol with a public receiver for three participants can be revealed. And the AQC protocol in broadcasting channels for n participants, which is sensitive to some special attacks, such as participant attacks, is still not so secure as expected. Here we detailedly analyze the security of their proposed protocols and make some improvements.
Bibliographic Details
http://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&scp=84929954264&origin=inward; http://dx.doi.org/10.1007/s10773-014-2206-6; http://link.springer.com/10.1007/s10773-014-2206-6; http://link.springer.com/content/pdf/10.1007/s10773-014-2206-6; http://link.springer.com/content/pdf/10.1007/s10773-014-2206-6.pdf; http://link.springer.com/article/10.1007/s10773-014-2206-6/fulltext.html; https://dx.doi.org/10.1007/s10773-014-2206-6; https://link.springer.com/article/10.1007/s10773-014-2206-6
Springer Science and Business Media LLC
Provide Feedback
Have ideas for a new metric? Would you like to see something else here?Let us know