Security analysis and improvement of the dining cryptographer problem-based anonymous quantum communication via non-maximally entanglement state analysis
Recently, two novel anonymous quantum communication (AQC) protocols (Shi et al. in Int. J. Theor. Phys. 52, 376-384, 2013) are presented, respectively. One is in a public-receiver model, the other is in broadcasting channels. In their paper, the dining cryptographer problem (DCP) and the non-maximal...
Saved in:
Published in | International journal of theoretical physics Vol. 54; no. 1; pp. 106 - 115 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Boston
Springer US
01.01.2015
|
Subjects | |
Online Access | Get full text |
ISSN | 0020-7748 1572-9575 |
DOI | 10.1007/s10773-014-2206-6 |
Cover
Abstract | Recently, two novel anonymous quantum communication (AQC) protocols (Shi et al. in Int. J. Theor. Phys. 52, 376-384, 2013) are presented, respectively. One is in a public-receiver model, the other is in broadcasting channels. In their paper, the dining cryptographer problem (DCP) and the non-maximally entanglement state analysis (NESA) are applied. And they analyze some attack strategies, including the honest-but-curious and malicious participant attacking ones. Unfortunately, we find that there exist some potential loopholes in security. The identity of anonymous sender in the AQC protocol with a public receiver for three participants can be revealed. And the AQC protocol in broadcasting channels for
n
participants, which is sensitive to some special attacks, such as participant attacks, is still not so secure as expected. Here we detailedly analyze the security of their proposed protocols and make some improvements. |
---|---|
AbstractList | Recently, two novel anonymous quantum communication (AQC) protocols (Shi et al. in Int. J. Theor. Phys. 52, 376-384, 2013) are presented, respectively. One is in a public-receiver model, the other is in broadcasting channels. In their paper, the dining cryptographer problem (DCP) and the non-maximally entanglement state analysis (NESA) are applied. And they analyze some attack strategies, including the honest-but-curious and malicious participant attacking ones. Unfortunately, we find that there exist some potential loopholes in security. The identity of anonymous sender in the AQC protocol with a public receiver for three participants can be revealed. And the AQC protocol in broadcasting channels for
n
participants, which is sensitive to some special attacks, such as participant attacks, is still not so secure as expected. Here we detailedly analyze the security of their proposed protocols and make some improvements. |
Author | Zhang, Ke-jia Wang, Qing-le |
Author_xml | – sequence: 1 givenname: Qing-le surname: Wang fullname: Wang, Qing-le email: wqle519@Gmail.com organization: State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, The State Key Laboratory of Integrated Services Networks, Xidian University – sequence: 2 givenname: Ke-jia surname: Zhang fullname: Zhang, Ke-jia organization: State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications |
BookMark | eNp9kMFO3DAQhq2KSl1oH6A3v4DbsdeJs8cKUYqE1AP0HE2S8WIU24vtIPIofdsaFnHogdPM4f_-mf8_ZSchBmLsq4RvEsB8zxKM2QqQWigFrWg_sI1sjBK7xjQnbAOgQBiju0_sNOd7ANiB7jbs7w2NS3Jl5RhwXrPLdZm484cUH8lTKDxaXu6ITy64sOdjWg8l7hMe7ijxqhpm8mLATFMlY1h9XDJ_WDCUxfMxer8EN2JxMfBHh7xKhMcn53GeV179Mezn46FcsNDbH5_ZR4tzpi-v84z9-Xlxe_5LXP--vDr_cS3GbdMVseuM6vTQqFZZZbUFgwOartFkEC0RAVnZWqt3dsQGJ5rkYLHpbGu00mC3Z8wcfccUc05k-9GVl39LQjf3Evrnhvtjw31tuH9uuG8rKf8jD6nmSuu7jDoyuWrDnlJ_H5dUI-d3oH_MS5bl |
CitedBy_id | crossref_primary_10_1007_s11128_015_0958_4 crossref_primary_10_3390_dynamics4010010 crossref_primary_10_1007_s10773_018_3788_1 |
Cites_doi | 10.1007/s11433-010-0145-7 10.1103/PhysRevA.71.016301 10.1103/PhysRevA.73.022320 10.1142/S0219749911007885 10.1109/JQE.2011.2107889 10.1088/0256-307X/25/5/011 10.1145/358549.358563 10.1016/j.optcom.2009.09.047 10.1007/BF00206326 10.1103/PhysRevA.76.062324 10.1088/1674-1056/18/4/007 10.1016/j.physleta.2005.09.010 10.1103/PhysRevA.76.036301 10.1103/PhysRevLett.101.208901 10.1007/s10773-012-1342-0 10.1016/j.physleta.2006.04.030 10.1103/PhysRevA.72.044302 10.1142/S0219749911007691 10.1088/1674-1056/17/9/006 10.1016/j.optcom.2009.01.026 10.1007/s11433-010-4109-8 10.1007/10719724_30 10.1109/ICQNM.2007.2 10.1088/0953-4075/43/24/245501 10.1007/978-3-540-76900-2_28 10.1007/11593447_12 |
ContentType | Journal Article |
Copyright | Springer Science+Business Media New York 2014 |
Copyright_xml | – notice: Springer Science+Business Media New York 2014 |
DBID | AAYXX CITATION |
DOI | 10.1007/s10773-014-2206-6 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Physics |
EISSN | 1572-9575 |
EndPage | 115 |
ExternalDocumentID | 10_1007_s10773_014_2206_6 |
GroupedDBID | -54 -5F -5G -BR -DZ -EM -Y2 -~C -~X .86 .VR 06D 0R~ 0VY 1N0 1SB 2.D 203 28- 29J 29~ 2J2 2JN 2JY 2KG 2KM 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5GY 5QI 5VS 67Z 6NX 78A 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDBF ABDZT ABECU ABEFU ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACNCT ACOKC ACOMO ACPIV ACUHS ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFFNX AFGCZ AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. B0M BA0 BBWZM BDATZ BGNMA BSONS CAG COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 EAD EAP EAS EBLON EBS EIOEI EJD EMK EPL ESBYG ESX FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GPTSA GQ3 GQ6 GQ7 GQ8 GXS H13 HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ H~9 I-F I09 IHE IJ- IKXTQ ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW LAK LLZTM M4Y MA- N2Q NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P9T PF0 PKN PT4 PT5 QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCLPG SDH SDM SGB SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPH SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TN5 TSG TSK TSV TUC TUS U2A UG4 UOJIU UPT UTJUX UZXMN VC2 VFIZW W23 W48 WH7 WK8 XJT YLTOR Z45 Z7R Z7U Z7X Z83 Z88 Z8R Z8W Z92 ZMTXR ~8M ~A9 ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG ADXHL AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP AMVHM ATHPR AYFIA CITATION |
ID | FETCH-LOGICAL-c358t-987284b5262f2f4f07aba7854e7aafeee0ef16ff49fca5aded1bfa58f674240f3 |
IEDL.DBID | AGYKE |
ISSN | 0020-7748 |
IngestDate | Thu Apr 24 22:53:48 EDT 2025 Wed Oct 01 05:00:27 EDT 2025 Fri Feb 21 02:34:23 EST 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Keywords | Anonymous quantum communication The dining cryptographer problem Non-maximally entanglement |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c358t-987284b5262f2f4f07aba7854e7aafeee0ef16ff49fca5aded1bfa58f674240f3 |
PageCount | 10 |
ParticipantIDs | crossref_citationtrail_10_1007_s10773_014_2206_6 crossref_primary_10_1007_s10773_014_2206_6 springer_journals_10_1007_s10773_014_2206_6 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2015-01-01 |
PublicationDateYYYYMMDD | 2015-01-01 |
PublicationDate_xml | – month: 01 year: 2015 text: 2015-01-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | Boston |
PublicationPlace_xml | – name: Boston |
PublicationTitle | International journal of theoretical physics |
PublicationTitleAbbrev | Int J Theor Phys |
PublicationYear | 2015 |
Publisher | Springer US |
Publisher_xml | – name: Springer US |
References | Hillery, Ziman, Buzek, Bielikova (CR1) 2006; 349 Deng, Li, Zhou, Zhang (CR31) 2005; 044302 Qin, Gao, Wen, Zhu (CR40) 2007; 76 Gao, Guo, Wen, Zhu (CR33) 2008; 014302 Gisin, Fasel, Kraus, Zbinden, Ribordy (CR46) 2006; 73 Qin, Wen, Guo, Zhu (CR8) 2009; 282 Qin, Gao, Guo, Wen (CR20) 2010; 036–301 Gao, Qin, Wen, Zhu (CR36) 2010; 283 Song, Zhang, Gao (CR44) 2009; 18 Lin, Gao, Guo, Wen, Zhu (CR41) 2007; 76 CR17 (CR22) 1988; 1 CR14 CR13 CR12 Gao, Qin, Guo, Wen (CR26) 2011; 47 Wójcik (CR37) 2003; 90 Boykin (CR11) 2002 Bouda (CR15) 2011; 9 Gao, Guo, Wen, Zhu (CR23) 2008; 208901 Wójcik (CR38) 2005; 71 Chen, Xu, Niu, Wen, Yang (CR48) 2010; 283 Gao, Wen, Zhu (CR29) 2008; 17 Naseri (CR6) 2009; 282 Chaum (CR10) 1981; 24 CR5 Hao, Li, Long (CR27) 2010; 53 Deng, Li, Zhou, Zhang (CR45) 2005; 72 Chen, Chen, Schmiedmayer, Pan (CR47) 2007; 022–329 Shi, Su, Guo (CR18) 2013; 52 Zhang, Li, Guo (CR24) 2001; 036301 Gao, Qin, Wen, Zhu (CR39) 2007; 7 Gao, Qin, Wen, Zhu (CR25) 2007; 7 Bonanome, Buzek, Hillery, Ziman (CR3) 2011; 022–331 Qin, Gao, Wen, Zhu (CR28) 2006; 357 Liu, Chen, Liu, Xu, Li (CR21) 2011; 9 Gao, Qin, Wen (CR43) 2010; 283 Shimizu, Tamaki, Fukasaka (CR19) 2009; 022323 Gao, Guo, Wen, Zhu (CR42) 2008; 101 Cai (CR32) 2003; 109801 Jiang, He, Nie, Xiong, Zeng (CR4) 2012; 042–309 Yang, Naseri, Wen (CR7) 2009; 282 Gao, Lin, Wen, Zhu (CR35) 2008; 25 Gisin, Fasel, Kraus, Zbinden, Ribordy (CR30) 2006; 022320 Vaccaro, Spring, Chefles (CR2) 2007; 012–333 Zhao, Naseri, Zheng (CR9) 2010; 283 Wang, Wen, Zhu (CR16) 2010; 53 Gao, Wen, Zhu (CR34) 2007; 360 M Hillery (2206_CR1) 2006; 349 FG Deng (2206_CR31) 2005; 044302 F Gao (2206_CR29) 2008; 17 F Gao (2206_CR34) 2007; 360 TY Wang (2206_CR16) 2010; 53 S Lin (2206_CR41) 2007; 76 SJ Qin (2206_CR28) 2006; 357 F Gao (2206_CR25) 2007; 7 SJ Qin (2206_CR40) 2007; 76 M Naseri (2206_CR6) 2009; 282 SJ Qin (2206_CR8) 2009; 282 P Boykin (2206_CR11) 2002 L Hao (2206_CR27) 2010; 53 ZW Zhao (2206_CR9) 2010; 283 K Shimizu (2206_CR19) 2009; 022323 N Gisin (2206_CR46) 2006; 73 J Bouda (2206_CR15) 2011; 9 F Gao (2206_CR39) 2007; 7 F Gao (2206_CR43) 2010; 283 QY Cai (2206_CR32) 2003; 109801 A Wójcik (2206_CR37) 2003; 90 D Chaum (2206_CR10) 1981; 24 SJ Qin (2206_CR20) 2010; 036–301 YG Yang (2206_CR7) 2009; 282 YS Zhang (2206_CR24) 2001; 036301 TT Song (2206_CR44) 2009; 18 2206_CR14 Chaum. D. (2206_CR22) 1988; 1 F Gao (2206_CR23) 2008; 208901 2206_CR13 ZH Liu (2206_CR21) 2011; 9 2206_CR12 M Bonanome (2206_CR3) 2011; 022–331 A Wójcik (2206_CR38) 2005; 71 FG Deng (2206_CR45) 2005; 72 JA Vaccaro (2206_CR2) 2007; 012–333 2206_CR5 2206_CR17 XB Chen (2206_CR48) 2010; 283 F Gao (2206_CR36) 2010; 283 F Gao (2206_CR42) 2008; 101 RH Shi (2206_CR18) 2013; 52 L Jiang (2206_CR4) 2012; 042–309 F Gao (2206_CR35) 2008; 25 ZB Chen (2206_CR47) 2007; 022–329 F Gao (2206_CR26) 2011; 47 F Gao (2206_CR33) 2008; 014302 N Gisin (2206_CR30) 2006; 022320 |
References_xml | – volume: 53 start-page: 491 year: 2010 ident: CR27 article-title: Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution publication-title: Sci. China Phys. Mech. Astron doi: 10.1007/s11433-010-0145-7 – year: 2002 ident: CR11 publication-title: Information security and quantum mechanics: security of quantum protocols. Ph.D. thesis – volume: 71 start-page: 016301 year: 2005 ident: CR38 article-title: Comment on quantum dense key distribution publication-title: Phys. Rev. A doi: 10.1103/PhysRevA.71.016301 – volume: 022–329 start-page: 76 year: 2007 ident: CR47 article-title: Fault-tolerant quantum repeater with atomic ensembles and linear optics publication-title: Phys. Rev. A – ident: CR14 – volume: 109801 start-page: 91 year: 2003 ident: CR32 article-title: The Ping-Pong protocol can be attacked without eavesdropping publication-title: Phys. Rev. Lett – ident: CR12 – volume: 73 start-page: 022320 year: 2006 ident: CR46 article-title: Trojan-horse attacks on quantum-key-distribution systems publication-title: Phys. Rev. A doi: 10.1103/PhysRevA.73.022320 – volume: 9 start-page: 1329 year: 2011 end-page: 1339 ident: CR21 article-title: Analyzing and revision a two-way protocols for quantum cryptography with a nonmaximally enatangled qubit pair publication-title: Int. J. Quant. Inf doi: 10.1142/S0219749911007885 – volume: 036301 start-page: 63 year: 2001 ident: CR24 article-title: Comment on Quantum key distribution without alternative measurements publication-title: [Phys. Rev. A 61, 052312 (2000)]. Phys. Rev. A – volume: 90 start-page: 157 year: 2003 end-page: 901 ident: CR37 article-title: Eavesdropping on the Ping-Pong quantum communication protocol publication-title: Phys. Rev. Lett – volume: 47 start-page: 630 year: 2011 end-page: 635 ident: CR26 article-title: Dense-coding attack on three-party quantum key distribution Pprotocols publication-title: IEEE J. Quantum Electron doi: 10.1109/JQE.2011.2107889 – volume: 012–333 start-page: 75 year: 2007 ident: CR2 article-title: Quantum protocols for anonymous voting and surveying publication-title: Phys. Rev. A – volume: 25 start-page: 1561 year: 2008 end-page: 1563 ident: CR35 article-title: A special eavesdropping on one-sender versus N-receiver QSDC protocol publication-title: Chin. Phys. Lett doi: 10.1088/0256-307X/25/5/011 – volume: 283 start-page: 15 year: 2010 end-page: 61 ident: CR48 article-title: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement publication-title: Opt. Commun – volume: 036–301 start-page: 82 year: 2010 ident: CR20 article-title: Comment on Two-way protocols for quantum cryptography with a nonmaximally enatangled qubit pair publication-title: Phys. Rev. A – volume: 24 start-page: 84 issue: 2 year: 1981 end-page: 88 ident: CR10 article-title: Untraceable electronic mail, return addresses, and digital pseudonyms publication-title: Commun. ACM doi: 10.1145/358549.358563 – volume: 044302 start-page: 72 year: 2005 ident: CR31 article-title: Improving the security of multiparty quantum secret sharing against Trojan horse attack publication-title: Phys. Rev. A – volume: 7 start-page: 329 year: 2007 ident: CR39 article-title: A simple participant attack on the brádler-dušek protocol publication-title: Quantum Inf.Comput – volume: 283 start-page: 192 year: 2010 ident: CR43 article-title: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state publication-title: Opt. Commun doi: 10.1016/j.optcom.2009.09.047 – volume: 022–331 start-page: 84 year: 2011 ident: CR3 article-title: Toward protocols for quantum-ensured privacy and secure voting publication-title: Phys. Rev. A – volume: 1 start-page: 65 year: 1988 end-page: 75 ident: CR22 article-title: The dining cryptographers problem: Unconditional sender and recipient untraceability publication-title: J. Cryptology doi: 10.1007/BF00206326 – volume: 7 start-page: 329 year: 2007 end-page: 334 ident: CR25 article-title: A simple participant attack on the Bradler-Dusek protocol publication-title: Quantum Inf. Comput – volume: 76 start-page: 062 year: 2007 end-page: 324 ident: CR40 article-title: Cryptanalysis of the Hillery-Bužek-Berthiaume quantum secret-sharing protocol publication-title: Phys. Rev. A doi: 10.1103/PhysRevA.76.062324 – volume: 282 start-page: 40 year: 2009 end-page: 17 ident: CR8 article-title: Cryptanalysis and improvement of a DSQC using four-particle entangled state publication-title: Opt. Commun – volume: 283 start-page: 31 year: 2010 end-page: 94 ident: CR9 article-title: Secure quantum sealed-bid auction with post-confirmation publication-title: Opt. Commun – volume: 042–309 start-page: 85 year: 2012 ident: CR4 article-title: Quantum anonymous voting for continuous variables publication-title: Phys. Rev. A – volume: 022323 start-page: 80 year: 2009 ident: CR19 article-title: Two-way protocols for quantum cryptography with a nonmaximally enatangled qubit pair publication-title: Phys. Rev. A – volume: 022320 start-page: 73 year: 2006 ident: CR30 article-title: Trojan-horse attacks on quantum-key-distribution systems publication-title: Phys. Rev. A – volume: 18 start-page: 1333 year: 2009 ident: CR44 article-title: Participant attack on quantum secret sharing based on entanglement swapping publication-title: Chin. Phys. B doi: 10.1088/1674-1056/18/4/007 – volume: 349 start-page: 75 year: 2006 ident: CR1 article-title: Towards quantum-based privacy and voting publication-title: Phys. Lett. A doi: 10.1016/j.physleta.2005.09.010 – volume: 360 start-page: 748 year: 2007 ident: CR34 article-title: Comment on: Quantum exam publication-title: [Phys. Lett. A 350 (2006) 174]. Phys. Lett. A – volume: 283 start-page: 192 year: 2010 ident: CR36 article-title: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state publication-title: Opt. Commun doi: 10.1016/j.optcom.2009.09.047 – volume: 76 start-page: 036301 year: 2007 ident: CR41 article-title: Comment on Multiparty quantum secret sharing of classical messages based on entanglement swapping publication-title: Phys. Rev. A doi: 10.1103/PhysRevA.76.036301 – volume: 101 start-page: 208901 year: 2008 ident: CR42 article-title: Comment on Experimental demonstration of a quantum protocol for byzantine agreement and liar detection publication-title: Phys. Rev. Lett doi: 10.1103/PhysRevLett.101.208901 – volume: 52 start-page: 376 year: 2013 end-page: 384 ident: CR18 article-title: Huang, D. Z. publication-title: Int. J. Theor. Phys doi: 10.1007/s10773-012-1342-0 – volume: 208901 start-page: 101 year: 2008 ident: CR23 article-title: Comment on Experimental Demonstration of a Quantum Protocol for Byzantine Agreement and Liar Detection publication-title: Phys. Rev. Lett – ident: CR17 – volume: 357 start-page: 101 year: 2006 ident: CR28 article-title: Improving the security of multiparty quantum secret sharing against an attack with a fake signal publication-title: Phys. Lett. A doi: 10.1016/j.physleta.2006.04.030 – ident: CR13 – volume: 72 start-page: 044302 year: 2005 ident: CR45 article-title: Improving the security of multiparty quantum secret sharing against Trojan horse attack publication-title: Phys. Rev. A doi: 10.1103/PhysRevA.72.044302 – volume: 9 start-page: 651 year: 2011 end-page: 663 ident: CR15 article-title: Šprojcar, J.: quantum communication between anonymous sender and anonymous receiver in the presence of strong adversary publication-title: Int. J. Quant. Inf. doi: 10.1142/S0219749911007691 – volume: 17 start-page: 3189 year: 2008 ident: CR29 article-title: Teleportation attack on the QSDC protocol with a random basis and order publication-title: Chin. Phys. B doi: 10.1088/1674-1056/17/9/006 – volume: 014302 start-page: 77 year: 2008 ident: CR33 article-title: Consistency of shared reference frames should be reexamined publication-title: Phys. Rev. A – volume: 282 start-page: 41 year: 2009 end-page: 67 ident: CR7 article-title: Improved secure quantum sealed-bid auction publication-title: Opt. Commun – ident: CR5 – volume: 282 start-page: 1939 year: 2009 ident: CR6 article-title: Secure quantum sealed-bid auction publication-title: Opt. Commun doi: 10.1016/j.optcom.2009.01.026 – volume: 53 start-page: 2227 issue: 12 year: 2010 ident: CR16 article-title: Quantum communications with an anonymous receiver publication-title: Sci. China. Phys. Mech. Astron doi: 10.1007/s11433-010-4109-8 – volume: 022–329 start-page: 76 year: 2007 ident: 2206_CR47 publication-title: Phys. Rev. A – volume: 109801 start-page: 91 year: 2003 ident: 2206_CR32 publication-title: Phys. Rev. Lett – volume: 036301 start-page: 63 year: 2001 ident: 2206_CR24 publication-title: [Phys. Rev. A 61, 052312 (2000)]. Phys. Rev. A – volume: 1 start-page: 65 year: 1988 ident: 2206_CR22 publication-title: J. Cryptology doi: 10.1007/BF00206326 – ident: 2206_CR5 doi: 10.1007/10719724_30 – volume: 71 start-page: 016301 year: 2005 ident: 2206_CR38 publication-title: Phys. Rev. A doi: 10.1103/PhysRevA.71.016301 – ident: 2206_CR13 doi: 10.1109/ICQNM.2007.2 – volume: 25 start-page: 1561 year: 2008 ident: 2206_CR35 publication-title: Chin. Phys. Lett doi: 10.1088/0256-307X/25/5/011 – volume: 044302 start-page: 72 year: 2005 ident: 2206_CR31 publication-title: Phys. Rev. A – ident: 2206_CR17 doi: 10.1088/0953-4075/43/24/245501 – volume: 357 start-page: 101 year: 2006 ident: 2206_CR28 publication-title: Phys. Lett. A doi: 10.1016/j.physleta.2006.04.030 – volume: 52 start-page: 376 year: 2013 ident: 2206_CR18 publication-title: Int. J. Theor. Phys doi: 10.1007/s10773-012-1342-0 – volume: 9 start-page: 1329 year: 2011 ident: 2206_CR21 publication-title: Int. J. Quant. Inf doi: 10.1142/S0219749911007885 – volume: 76 start-page: 036301 year: 2007 ident: 2206_CR41 publication-title: Phys. Rev. A doi: 10.1103/PhysRevA.76.036301 – volume: 022–331 start-page: 84 year: 2011 ident: 2206_CR3 publication-title: Phys. Rev. A – volume: 014302 start-page: 77 year: 2008 ident: 2206_CR33 publication-title: Phys. Rev. A – volume: 7 start-page: 329 year: 2007 ident: 2206_CR39 publication-title: Quantum Inf.Comput – volume: 042–309 start-page: 85 year: 2012 ident: 2206_CR4 publication-title: Phys. Rev. A – volume: 53 start-page: 491 year: 2010 ident: 2206_CR27 publication-title: Sci. China Phys. Mech. Astron doi: 10.1007/s11433-010-0145-7 – volume: 76 start-page: 062 year: 2007 ident: 2206_CR40 publication-title: Phys. Rev. A – ident: 2206_CR14 doi: 10.1007/978-3-540-76900-2_28 – volume: 282 start-page: 40 year: 2009 ident: 2206_CR8 publication-title: Opt. Commun – volume: 208901 start-page: 101 year: 2008 ident: 2206_CR23 publication-title: Phys. Rev. Lett – volume: 036–301 start-page: 82 year: 2010 ident: 2206_CR20 publication-title: Phys. Rev. A – volume: 17 start-page: 3189 year: 2008 ident: 2206_CR29 publication-title: Chin. Phys. B doi: 10.1088/1674-1056/17/9/006 – volume: 283 start-page: 192 year: 2010 ident: 2206_CR36 publication-title: Opt. Commun doi: 10.1016/j.optcom.2009.09.047 – volume: 283 start-page: 31 year: 2010 ident: 2206_CR9 publication-title: Opt. Commun – ident: 2206_CR12 doi: 10.1007/11593447_12 – volume: 022320 start-page: 73 year: 2006 ident: 2206_CR30 publication-title: Phys. Rev. A – volume: 73 start-page: 022320 year: 2006 ident: 2206_CR46 publication-title: Phys. Rev. A doi: 10.1103/PhysRevA.73.022320 – volume: 282 start-page: 1939 year: 2009 ident: 2206_CR6 publication-title: Opt. Commun doi: 10.1016/j.optcom.2009.01.026 – volume: 360 start-page: 748 year: 2007 ident: 2206_CR34 publication-title: [Phys. Lett. A 350 (2006) 174]. Phys. Lett. A – volume: 022323 start-page: 80 year: 2009 ident: 2206_CR19 publication-title: Phys. Rev. A – volume-title: Information security and quantum mechanics: security of quantum protocols. Ph.D. thesis year: 2002 ident: 2206_CR11 – volume: 282 start-page: 41 year: 2009 ident: 2206_CR7 publication-title: Opt. Commun – volume: 72 start-page: 044302 year: 2005 ident: 2206_CR45 publication-title: Phys. Rev. A doi: 10.1103/PhysRevA.72.044302 – volume: 283 start-page: 15 year: 2010 ident: 2206_CR48 publication-title: Opt. Commun – volume: 47 start-page: 630 year: 2011 ident: 2206_CR26 publication-title: IEEE J. Quantum Electron doi: 10.1109/JQE.2011.2107889 – volume: 101 start-page: 208901 year: 2008 ident: 2206_CR42 publication-title: Phys. Rev. Lett doi: 10.1103/PhysRevLett.101.208901 – volume: 24 start-page: 84 issue: 2 year: 1981 ident: 2206_CR10 publication-title: Commun. ACM doi: 10.1145/358549.358563 – volume: 283 start-page: 192 year: 2010 ident: 2206_CR43 publication-title: Opt. Commun doi: 10.1016/j.optcom.2009.09.047 – volume: 349 start-page: 75 year: 2006 ident: 2206_CR1 publication-title: Phys. Lett. A doi: 10.1016/j.physleta.2005.09.010 – volume: 18 start-page: 1333 year: 2009 ident: 2206_CR44 publication-title: Chin. Phys. B doi: 10.1088/1674-1056/18/4/007 – volume: 012–333 start-page: 75 year: 2007 ident: 2206_CR2 publication-title: Phys. Rev. A – volume: 53 start-page: 2227 issue: 12 year: 2010 ident: 2206_CR16 publication-title: Sci. China. Phys. Mech. Astron doi: 10.1007/s11433-010-4109-8 – volume: 9 start-page: 651 year: 2011 ident: 2206_CR15 publication-title: Int. J. Quant. Inf. doi: 10.1142/S0219749911007691 – volume: 7 start-page: 329 year: 2007 ident: 2206_CR25 publication-title: Quantum Inf. Comput – volume: 90 start-page: 157 year: 2003 ident: 2206_CR37 publication-title: Phys. Rev. Lett |
SSID | ssj0009048 |
Score | 2.0447116 |
Snippet | Recently, two novel anonymous quantum communication (AQC) protocols (Shi et al. in Int. J. Theor. Phys. 52, 376-384, 2013) are presented, respectively. One is... |
SourceID | crossref springer |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 106 |
SubjectTerms | Elementary Particles Mathematical and Computational Physics Physics Physics and Astronomy Quantum Field Theory Quantum Physics Theoretical |
Title | Security analysis and improvement of the dining cryptographer problem-based anonymous quantum communication via non-maximally entanglement state analysis |
URI | https://link.springer.com/article/10.1007/s10773-014-2206-6 |
Volume | 54 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
journalDatabaseRights | – providerCode: PRVEBS databaseName: EBSCOhost Academic Search Ultimate customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn eissn: 1572-9575 dateEnd: 20241001 omitProxy: true ssIdentifier: ssj0009048 issn: 0020-7748 databaseCode: ABDBF dateStart: 20030201 isFulltext: true titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn providerName: EBSCOhost – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1572-9575 dateEnd: 20241001 omitProxy: false ssIdentifier: ssj0009048 issn: 0020-7748 databaseCode: ADMLS dateStart: 19970101 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVLSH databaseName: SpringerLink Journals customDbUrl: mediaType: online eissn: 1572-9575 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0009048 issn: 0020-7748 databaseCode: AFBBN dateStart: 19680501 isFulltext: true providerName: Library Specific Holdings – providerCode: PRVAVX databaseName: SpringerLINK - Czech Republic Consortium customDbUrl: eissn: 1572-9575 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0009048 issn: 0020-7748 databaseCode: AGYKE dateStart: 19970101 isFulltext: true titleUrlDefault: http://link.springer.com providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Journals (ICM) customDbUrl: eissn: 1572-9575 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0009048 issn: 0020-7748 databaseCode: U2A dateStart: 19970101 isFulltext: true titleUrlDefault: http://www.springerlink.com/journals/ providerName: Springer Nature |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTxsxEB5BUCUuLdCiQtvIB04go92NX3tM2gQEggtEgtPK9tpVREJpskHAP-HfMrvr5aUWidsexquRPfa8vwHYMlbpKHWemjx1FDWepkbIDpW5dUlk0zi1ZUb36FjsD9nBGT8Lfdyzptq9SUlWL_WzZjcpy9ofRpME3WCxCEu89E9asNTdOz_sP2HtRqx-gNEzQutGNcnMf_3kpTp6mQutVMzgE5w2zNWVJRe788Ls2rtXuI3v5H4FPgaTk3RrGVmFBXe5Bh-q0k87-wz3J2GEHdEBoAQ_cjKqog1V8JD88QTtRJJXwySInd5eFTXStZuSMJGGluowx5UhmkD-zvHM5hNin3egkOuRJkhCJ_pmNNHj8S0pa9cvf9dF7KRqb3rk4wsMB_3Tn_s0DGygtsNVQVMlUdsZnojEJ575SGqjpeLMSa29cy5yPhbes9RbzXXu8th4zZUX6KCzyHfWoYU8uK9ApOPCpHksrBNMsVgLFtuO8so4b3DtBkTNuWU2oJmXQzXG2RMOc7njGe54Vu54JjZg-3HJVQ3l8RbxTnOOWbjVs_9Tb76L-hsso9nF60DOd2gV07n7gaZNYdooyr1fvUE7iHQbFodJ9wFWbfe- |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLZgE4ILb8R45sAJFNR2aZIeEWKM54VNglOVpAma2HhsHWL8E_4taZsCQ4DErQe7suIkdvz4DLAjFRdepA2WSaSxtXgCS8rqmCVKB56K_EhlGd2LS9psk9Pr8Nr1cQ_KavcyJZnf1F-a3RjLan8IDgL7DKaTUCU-56QC1YPjm7OjT6xdjxQXsH0ZWe-Gl8nMn34ybo7Gc6G5iWnMQasUrqgsudsfpnJfvX7Dbfyn9PMw61xOdFDskQWY0PeLMJWXfqrBErxduRF2SDiAEvuRoE4ebciDh-jBIOsnoiQfJoFUf_SYFkjXuo_cRBqcmcPEcrpoAnoaWp0Ne0h97UBBzx2BLAnuiZdOT3S7I5TVrt_fFkXsKG9v-pBjGdqNo9ZhE7uBDVjVQ57iiDNr7WQY0MAEhhiPCSkYD4lmQhittaeNT40hkVEiFIlOfGlEyA21D3TimfoKVKwMehUQ0yGVUeJTpSnhxBeU-KrODZfaSMtbA6_UW6wcmnk2VKMbf-IwZyse2xWPsxWPaQ12P1geCyiPv4j3Sj3G7lQPfqde-xf1Nkw3Wxfn8fnJ5dk6zFgXLCyCOhtQSftDvWndnFRuuW39DpCS-FQ |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JS8QwFA4uKF7EFcc1B09KsO2kSXoUdXBH0AFvJasMzIzjTEf0p_hvfWlTF1DBWw8vJeSlffv3IbSrtJBRZh1RJrMELJ4kivEm4UbbJNJZnGlf0b26Zqdten6f3gee01Hd7V6XJKuZBo_S1C8OBsYdfBl849z3AVGSJBASs0k0TcFU--irnRx-ou5GtPoVQ4wEfo6oy5o_veK7YfpeFS2NTWsBzQcvER9Wal1EE7a_hGbKbk09WkZvt4F1DsuAKQIPBnfKBEGZ78OPDoNrh03J_4D18HVQVODUdogDiQzxFszAypAAwE9jOOZxD-uvQyP4uSMxiJCefOn0ZLf7in27ef-h6jvH5UTSxz5WULt1cnd0SgLHAtHNVBQkExwMlEoTlrjEURdxqSQXKbVcSmetjayLmXM0c1qm0lgTKydT4RjE1DRyzVU0BXuwawhzmzKVmZhpy6igsWQ01k3hhLJOwdoGiuoDznUAIPc8GN38EzrZ6yQHneReJzlroL2PJYMKfeMv4f1aa3n4EEe_S6__S3oHzd4ct_LLs-uLDTQHTlNapWE20VQxHNstcEwKtV1evneva9_S |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+analysis+and+improvement+of+the+dining+cryptographer+problem-based+anonymous+quantum+communication+via+non-maximally+entanglement+state+analysis&rft.jtitle=International+journal+of+theoretical+physics&rft.au=Wang%2C+Qing-le&rft.au=Zhang%2C+Ke-jia&rft.date=2015-01-01&rft.issn=0020-7748&rft.eissn=1572-9575&rft.volume=54&rft.issue=1&rft.spage=106&rft.epage=115&rft_id=info:doi/10.1007%2Fs10773-014-2206-6&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s10773_014_2206_6 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0020-7748&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0020-7748&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0020-7748&client=summon |