Security analysis and improvement of the dining cryptographer problem-based anonymous quantum communication via non-maximally entanglement state analysis

Recently, two novel anonymous quantum communication (AQC) protocols (Shi et al. in Int. J. Theor. Phys. 52, 376-384, 2013) are presented, respectively. One is in a public-receiver model, the other is in broadcasting channels. In their paper, the dining cryptographer problem (DCP) and the non-maximal...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of theoretical physics Vol. 54; no. 1; pp. 106 - 115
Main Authors Wang, Qing-le, Zhang, Ke-jia
Format Journal Article
LanguageEnglish
Published Boston Springer US 01.01.2015
Subjects
Online AccessGet full text
ISSN0020-7748
1572-9575
DOI10.1007/s10773-014-2206-6

Cover

Abstract Recently, two novel anonymous quantum communication (AQC) protocols (Shi et al. in Int. J. Theor. Phys. 52, 376-384, 2013) are presented, respectively. One is in a public-receiver model, the other is in broadcasting channels. In their paper, the dining cryptographer problem (DCP) and the non-maximally entanglement state analysis (NESA) are applied. And they analyze some attack strategies, including the honest-but-curious and malicious participant attacking ones. Unfortunately, we find that there exist some potential loopholes in security. The identity of anonymous sender in the AQC protocol with a public receiver for three participants can be revealed. And the AQC protocol in broadcasting channels for n participants, which is sensitive to some special attacks, such as participant attacks, is still not so secure as expected. Here we detailedly analyze the security of their proposed protocols and make some improvements.
AbstractList Recently, two novel anonymous quantum communication (AQC) protocols (Shi et al. in Int. J. Theor. Phys. 52, 376-384, 2013) are presented, respectively. One is in a public-receiver model, the other is in broadcasting channels. In their paper, the dining cryptographer problem (DCP) and the non-maximally entanglement state analysis (NESA) are applied. And they analyze some attack strategies, including the honest-but-curious and malicious participant attacking ones. Unfortunately, we find that there exist some potential loopholes in security. The identity of anonymous sender in the AQC protocol with a public receiver for three participants can be revealed. And the AQC protocol in broadcasting channels for n participants, which is sensitive to some special attacks, such as participant attacks, is still not so secure as expected. Here we detailedly analyze the security of their proposed protocols and make some improvements.
Author Zhang, Ke-jia
Wang, Qing-le
Author_xml – sequence: 1
  givenname: Qing-le
  surname: Wang
  fullname: Wang, Qing-le
  email: wqle519@Gmail.com
  organization: State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, The State Key Laboratory of Integrated Services Networks, Xidian University
– sequence: 2
  givenname: Ke-jia
  surname: Zhang
  fullname: Zhang, Ke-jia
  organization: State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications
BookMark eNp9kMFO3DAQhq2KSl1oH6A3v4DbsdeJs8cKUYqE1AP0HE2S8WIU24vtIPIofdsaFnHogdPM4f_-mf8_ZSchBmLsq4RvEsB8zxKM2QqQWigFrWg_sI1sjBK7xjQnbAOgQBiju0_sNOd7ANiB7jbs7w2NS3Jl5RhwXrPLdZm484cUH8lTKDxaXu6ITy64sOdjWg8l7hMe7ijxqhpm8mLATFMlY1h9XDJ_WDCUxfMxer8EN2JxMfBHh7xKhMcn53GeV179Mezn46FcsNDbH5_ZR4tzpi-v84z9-Xlxe_5LXP--vDr_cS3GbdMVseuM6vTQqFZZZbUFgwOartFkEC0RAVnZWqt3dsQGJ5rkYLHpbGu00mC3Z8wcfccUc05k-9GVl39LQjf3Evrnhvtjw31tuH9uuG8rKf8jD6nmSuu7jDoyuWrDnlJ_H5dUI-d3oH_MS5bl
CitedBy_id crossref_primary_10_1007_s11128_015_0958_4
crossref_primary_10_3390_dynamics4010010
crossref_primary_10_1007_s10773_018_3788_1
Cites_doi 10.1007/s11433-010-0145-7
10.1103/PhysRevA.71.016301
10.1103/PhysRevA.73.022320
10.1142/S0219749911007885
10.1109/JQE.2011.2107889
10.1088/0256-307X/25/5/011
10.1145/358549.358563
10.1016/j.optcom.2009.09.047
10.1007/BF00206326
10.1103/PhysRevA.76.062324
10.1088/1674-1056/18/4/007
10.1016/j.physleta.2005.09.010
10.1103/PhysRevA.76.036301
10.1103/PhysRevLett.101.208901
10.1007/s10773-012-1342-0
10.1016/j.physleta.2006.04.030
10.1103/PhysRevA.72.044302
10.1142/S0219749911007691
10.1088/1674-1056/17/9/006
10.1016/j.optcom.2009.01.026
10.1007/s11433-010-4109-8
10.1007/10719724_30
10.1109/ICQNM.2007.2
10.1088/0953-4075/43/24/245501
10.1007/978-3-540-76900-2_28
10.1007/11593447_12
ContentType Journal Article
Copyright Springer Science+Business Media New York 2014
Copyright_xml – notice: Springer Science+Business Media New York 2014
DBID AAYXX
CITATION
DOI 10.1007/s10773-014-2206-6
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Physics
EISSN 1572-9575
EndPage 115
ExternalDocumentID 10_1007_s10773_014_2206_6
GroupedDBID -54
-5F
-5G
-BR
-DZ
-EM
-Y2
-~C
-~X
.86
.VR
06D
0R~
0VY
1N0
1SB
2.D
203
28-
29J
29~
2J2
2JN
2JY
2KG
2KM
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5GY
5QI
5VS
67Z
6NX
78A
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDBF
ABDZT
ABECU
ABEFU
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACNCT
ACOKC
ACOMO
ACPIV
ACUHS
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFFNX
AFGCZ
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
B0M
BA0
BBWZM
BDATZ
BGNMA
BSONS
CAG
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
EAD
EAP
EAS
EBLON
EBS
EIOEI
EJD
EMK
EPL
ESBYG
ESX
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GPTSA
GQ3
GQ6
GQ7
GQ8
GXS
H13
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
H~9
I-F
I09
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
LAK
LLZTM
M4Y
MA-
N2Q
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P2P
P9T
PF0
PKN
PT4
PT5
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCLPG
SDH
SDM
SGB
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPH
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TN5
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UPT
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WH7
WK8
XJT
YLTOR
Z45
Z7R
Z7U
Z7X
Z83
Z88
Z8R
Z8W
Z92
ZMTXR
~8M
~A9
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
ADXHL
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
AMVHM
ATHPR
AYFIA
CITATION
ID FETCH-LOGICAL-c358t-987284b5262f2f4f07aba7854e7aafeee0ef16ff49fca5aded1bfa58f674240f3
IEDL.DBID AGYKE
ISSN 0020-7748
IngestDate Thu Apr 24 22:53:48 EDT 2025
Wed Oct 01 05:00:27 EDT 2025
Fri Feb 21 02:34:23 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Anonymous quantum communication
The dining cryptographer problem
Non-maximally entanglement
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c358t-987284b5262f2f4f07aba7854e7aafeee0ef16ff49fca5aded1bfa58f674240f3
PageCount 10
ParticipantIDs crossref_citationtrail_10_1007_s10773_014_2206_6
crossref_primary_10_1007_s10773_014_2206_6
springer_journals_10_1007_s10773_014_2206_6
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2015-01-01
PublicationDateYYYYMMDD 2015-01-01
PublicationDate_xml – month: 01
  year: 2015
  text: 2015-01-01
  day: 01
PublicationDecade 2010
PublicationPlace Boston
PublicationPlace_xml – name: Boston
PublicationTitle International journal of theoretical physics
PublicationTitleAbbrev Int J Theor Phys
PublicationYear 2015
Publisher Springer US
Publisher_xml – name: Springer US
References Hillery, Ziman, Buzek, Bielikova (CR1) 2006; 349
Deng, Li, Zhou, Zhang (CR31) 2005; 044302
Qin, Gao, Wen, Zhu (CR40) 2007; 76
Gao, Guo, Wen, Zhu (CR33) 2008; 014302
Gisin, Fasel, Kraus, Zbinden, Ribordy (CR46) 2006; 73
Qin, Wen, Guo, Zhu (CR8) 2009; 282
Qin, Gao, Guo, Wen (CR20) 2010; 036–301
Gao, Qin, Wen, Zhu (CR36) 2010; 283
Song, Zhang, Gao (CR44) 2009; 18
Lin, Gao, Guo, Wen, Zhu (CR41) 2007; 76
CR17
(CR22) 1988; 1
CR14
CR13
CR12
Gao, Qin, Guo, Wen (CR26) 2011; 47
Wójcik (CR37) 2003; 90
Boykin (CR11) 2002
Bouda (CR15) 2011; 9
Gao, Guo, Wen, Zhu (CR23) 2008; 208901
Wójcik (CR38) 2005; 71
Chen, Xu, Niu, Wen, Yang (CR48) 2010; 283
Gao, Wen, Zhu (CR29) 2008; 17
Naseri (CR6) 2009; 282
Chaum (CR10) 1981; 24
CR5
Hao, Li, Long (CR27) 2010; 53
Deng, Li, Zhou, Zhang (CR45) 2005; 72
Chen, Chen, Schmiedmayer, Pan (CR47) 2007; 022–329
Shi, Su, Guo (CR18) 2013; 52
Zhang, Li, Guo (CR24) 2001; 036301
Gao, Qin, Wen, Zhu (CR39) 2007; 7
Gao, Qin, Wen, Zhu (CR25) 2007; 7
Bonanome, Buzek, Hillery, Ziman (CR3) 2011; 022–331
Qin, Gao, Wen, Zhu (CR28) 2006; 357
Liu, Chen, Liu, Xu, Li (CR21) 2011; 9
Gao, Qin, Wen (CR43) 2010; 283
Shimizu, Tamaki, Fukasaka (CR19) 2009; 022323
Gao, Guo, Wen, Zhu (CR42) 2008; 101
Cai (CR32) 2003; 109801
Jiang, He, Nie, Xiong, Zeng (CR4) 2012; 042–309
Yang, Naseri, Wen (CR7) 2009; 282
Gao, Lin, Wen, Zhu (CR35) 2008; 25
Gisin, Fasel, Kraus, Zbinden, Ribordy (CR30) 2006; 022320
Vaccaro, Spring, Chefles (CR2) 2007; 012–333
Zhao, Naseri, Zheng (CR9) 2010; 283
Wang, Wen, Zhu (CR16) 2010; 53
Gao, Wen, Zhu (CR34) 2007; 360
M Hillery (2206_CR1) 2006; 349
FG Deng (2206_CR31) 2005; 044302
F Gao (2206_CR29) 2008; 17
F Gao (2206_CR34) 2007; 360
TY Wang (2206_CR16) 2010; 53
S Lin (2206_CR41) 2007; 76
SJ Qin (2206_CR28) 2006; 357
F Gao (2206_CR25) 2007; 7
SJ Qin (2206_CR40) 2007; 76
M Naseri (2206_CR6) 2009; 282
SJ Qin (2206_CR8) 2009; 282
P Boykin (2206_CR11) 2002
L Hao (2206_CR27) 2010; 53
ZW Zhao (2206_CR9) 2010; 283
K Shimizu (2206_CR19) 2009; 022323
N Gisin (2206_CR46) 2006; 73
J Bouda (2206_CR15) 2011; 9
F Gao (2206_CR39) 2007; 7
F Gao (2206_CR43) 2010; 283
QY Cai (2206_CR32) 2003; 109801
A Wójcik (2206_CR37) 2003; 90
D Chaum (2206_CR10) 1981; 24
SJ Qin (2206_CR20) 2010; 036–301
YG Yang (2206_CR7) 2009; 282
YS Zhang (2206_CR24) 2001; 036301
TT Song (2206_CR44) 2009; 18
2206_CR14
Chaum. D. (2206_CR22) 1988; 1
F Gao (2206_CR23) 2008; 208901
2206_CR13
ZH Liu (2206_CR21) 2011; 9
2206_CR12
M Bonanome (2206_CR3) 2011; 022–331
A Wójcik (2206_CR38) 2005; 71
FG Deng (2206_CR45) 2005; 72
JA Vaccaro (2206_CR2) 2007; 012–333
2206_CR5
2206_CR17
XB Chen (2206_CR48) 2010; 283
F Gao (2206_CR36) 2010; 283
F Gao (2206_CR42) 2008; 101
RH Shi (2206_CR18) 2013; 52
L Jiang (2206_CR4) 2012; 042–309
F Gao (2206_CR35) 2008; 25
ZB Chen (2206_CR47) 2007; 022–329
F Gao (2206_CR26) 2011; 47
F Gao (2206_CR33) 2008; 014302
N Gisin (2206_CR30) 2006; 022320
References_xml – volume: 53
  start-page: 491
  year: 2010
  ident: CR27
  article-title: Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution
  publication-title: Sci. China Phys. Mech. Astron
  doi: 10.1007/s11433-010-0145-7
– year: 2002
  ident: CR11
  publication-title: Information security and quantum mechanics: security of quantum protocols. Ph.D. thesis
– volume: 71
  start-page: 016301
  year: 2005
  ident: CR38
  article-title: Comment on quantum dense key distribution
  publication-title: Phys. Rev. A
  doi: 10.1103/PhysRevA.71.016301
– volume: 022–329
  start-page: 76
  year: 2007
  ident: CR47
  article-title: Fault-tolerant quantum repeater with atomic ensembles and linear optics
  publication-title: Phys. Rev. A
– ident: CR14
– volume: 109801
  start-page: 91
  year: 2003
  ident: CR32
  article-title: The Ping-Pong protocol can be attacked without eavesdropping
  publication-title: Phys. Rev. Lett
– ident: CR12
– volume: 73
  start-page: 022320
  year: 2006
  ident: CR46
  article-title: Trojan-horse attacks on quantum-key-distribution systems
  publication-title: Phys. Rev. A
  doi: 10.1103/PhysRevA.73.022320
– volume: 9
  start-page: 1329
  year: 2011
  end-page: 1339
  ident: CR21
  article-title: Analyzing and revision a two-way protocols for quantum cryptography with a nonmaximally enatangled qubit pair
  publication-title: Int. J. Quant. Inf
  doi: 10.1142/S0219749911007885
– volume: 036301
  start-page: 63
  year: 2001
  ident: CR24
  article-title: Comment on Quantum key distribution without alternative measurements
  publication-title: [Phys. Rev. A 61, 052312 (2000)]. Phys. Rev. A
– volume: 90
  start-page: 157
  year: 2003
  end-page: 901
  ident: CR37
  article-title: Eavesdropping on the Ping-Pong quantum communication protocol
  publication-title: Phys. Rev. Lett
– volume: 47
  start-page: 630
  year: 2011
  end-page: 635
  ident: CR26
  article-title: Dense-coding attack on three-party quantum key distribution Pprotocols
  publication-title: IEEE J. Quantum Electron
  doi: 10.1109/JQE.2011.2107889
– volume: 012–333
  start-page: 75
  year: 2007
  ident: CR2
  article-title: Quantum protocols for anonymous voting and surveying
  publication-title: Phys. Rev. A
– volume: 25
  start-page: 1561
  year: 2008
  end-page: 1563
  ident: CR35
  article-title: A special eavesdropping on one-sender versus N-receiver QSDC protocol
  publication-title: Chin. Phys. Lett
  doi: 10.1088/0256-307X/25/5/011
– volume: 283
  start-page: 15
  year: 2010
  end-page: 61
  ident: CR48
  article-title: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement
  publication-title: Opt. Commun
– volume: 036–301
  start-page: 82
  year: 2010
  ident: CR20
  article-title: Comment on Two-way protocols for quantum cryptography with a nonmaximally enatangled qubit pair
  publication-title: Phys. Rev. A
– volume: 24
  start-page: 84
  issue: 2
  year: 1981
  end-page: 88
  ident: CR10
  article-title: Untraceable electronic mail, return addresses, and digital pseudonyms
  publication-title: Commun. ACM
  doi: 10.1145/358549.358563
– volume: 044302
  start-page: 72
  year: 2005
  ident: CR31
  article-title: Improving the security of multiparty quantum secret sharing against Trojan horse attack
  publication-title: Phys. Rev. A
– volume: 7
  start-page: 329
  year: 2007
  ident: CR39
  article-title: A simple participant attack on the brádler-dušek protocol
  publication-title: Quantum Inf.Comput
– volume: 283
  start-page: 192
  year: 2010
  ident: CR43
  article-title: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state
  publication-title: Opt. Commun
  doi: 10.1016/j.optcom.2009.09.047
– volume: 022–331
  start-page: 84
  year: 2011
  ident: CR3
  article-title: Toward protocols for quantum-ensured privacy and secure voting
  publication-title: Phys. Rev. A
– volume: 1
  start-page: 65
  year: 1988
  end-page: 75
  ident: CR22
  article-title: The dining cryptographers problem: Unconditional sender and recipient untraceability
  publication-title: J. Cryptology
  doi: 10.1007/BF00206326
– volume: 7
  start-page: 329
  year: 2007
  end-page: 334
  ident: CR25
  article-title: A simple participant attack on the Bradler-Dusek protocol
  publication-title: Quantum Inf. Comput
– volume: 76
  start-page: 062
  year: 2007
  end-page: 324
  ident: CR40
  article-title: Cryptanalysis of the Hillery-Bužek-Berthiaume quantum secret-sharing protocol
  publication-title: Phys. Rev. A
  doi: 10.1103/PhysRevA.76.062324
– volume: 282
  start-page: 40
  year: 2009
  end-page: 17
  ident: CR8
  article-title: Cryptanalysis and improvement of a DSQC using four-particle entangled state
  publication-title: Opt. Commun
– volume: 283
  start-page: 31
  year: 2010
  end-page: 94
  ident: CR9
  article-title: Secure quantum sealed-bid auction with post-confirmation
  publication-title: Opt. Commun
– volume: 042–309
  start-page: 85
  year: 2012
  ident: CR4
  article-title: Quantum anonymous voting for continuous variables
  publication-title: Phys. Rev. A
– volume: 022323
  start-page: 80
  year: 2009
  ident: CR19
  article-title: Two-way protocols for quantum cryptography with a nonmaximally enatangled qubit pair
  publication-title: Phys. Rev. A
– volume: 022320
  start-page: 73
  year: 2006
  ident: CR30
  article-title: Trojan-horse attacks on quantum-key-distribution systems
  publication-title: Phys. Rev. A
– volume: 18
  start-page: 1333
  year: 2009
  ident: CR44
  article-title: Participant attack on quantum secret sharing based on entanglement swapping
  publication-title: Chin. Phys. B
  doi: 10.1088/1674-1056/18/4/007
– volume: 349
  start-page: 75
  year: 2006
  ident: CR1
  article-title: Towards quantum-based privacy and voting
  publication-title: Phys. Lett. A
  doi: 10.1016/j.physleta.2005.09.010
– volume: 360
  start-page: 748
  year: 2007
  ident: CR34
  article-title: Comment on: Quantum exam
  publication-title: [Phys. Lett. A 350 (2006) 174]. Phys. Lett. A
– volume: 283
  start-page: 192
  year: 2010
  ident: CR36
  article-title: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state
  publication-title: Opt. Commun
  doi: 10.1016/j.optcom.2009.09.047
– volume: 76
  start-page: 036301
  year: 2007
  ident: CR41
  article-title: Comment on Multiparty quantum secret sharing of classical messages based on entanglement swapping
  publication-title: Phys. Rev. A
  doi: 10.1103/PhysRevA.76.036301
– volume: 101
  start-page: 208901
  year: 2008
  ident: CR42
  article-title: Comment on Experimental demonstration of a quantum protocol for byzantine agreement and liar detection
  publication-title: Phys. Rev. Lett
  doi: 10.1103/PhysRevLett.101.208901
– volume: 52
  start-page: 376
  year: 2013
  end-page: 384
  ident: CR18
  article-title: Huang, D. Z.
  publication-title: Int. J. Theor. Phys
  doi: 10.1007/s10773-012-1342-0
– volume: 208901
  start-page: 101
  year: 2008
  ident: CR23
  article-title: Comment on Experimental Demonstration of a Quantum Protocol for Byzantine Agreement and Liar Detection
  publication-title: Phys. Rev. Lett
– ident: CR17
– volume: 357
  start-page: 101
  year: 2006
  ident: CR28
  article-title: Improving the security of multiparty quantum secret sharing against an attack with a fake signal
  publication-title: Phys. Lett. A
  doi: 10.1016/j.physleta.2006.04.030
– ident: CR13
– volume: 72
  start-page: 044302
  year: 2005
  ident: CR45
  article-title: Improving the security of multiparty quantum secret sharing against Trojan horse attack
  publication-title: Phys. Rev. A
  doi: 10.1103/PhysRevA.72.044302
– volume: 9
  start-page: 651
  year: 2011
  end-page: 663
  ident: CR15
  article-title: Šprojcar, J.: quantum communication between anonymous sender and anonymous receiver in the presence of strong adversary
  publication-title: Int. J. Quant. Inf.
  doi: 10.1142/S0219749911007691
– volume: 17
  start-page: 3189
  year: 2008
  ident: CR29
  article-title: Teleportation attack on the QSDC protocol with a random basis and order
  publication-title: Chin. Phys. B
  doi: 10.1088/1674-1056/17/9/006
– volume: 014302
  start-page: 77
  year: 2008
  ident: CR33
  article-title: Consistency of shared reference frames should be reexamined
  publication-title: Phys. Rev. A
– volume: 282
  start-page: 41
  year: 2009
  end-page: 67
  ident: CR7
  article-title: Improved secure quantum sealed-bid auction
  publication-title: Opt. Commun
– ident: CR5
– volume: 282
  start-page: 1939
  year: 2009
  ident: CR6
  article-title: Secure quantum sealed-bid auction
  publication-title: Opt. Commun
  doi: 10.1016/j.optcom.2009.01.026
– volume: 53
  start-page: 2227
  issue: 12
  year: 2010
  ident: CR16
  article-title: Quantum communications with an anonymous receiver
  publication-title: Sci. China. Phys. Mech. Astron
  doi: 10.1007/s11433-010-4109-8
– volume: 022–329
  start-page: 76
  year: 2007
  ident: 2206_CR47
  publication-title: Phys. Rev. A
– volume: 109801
  start-page: 91
  year: 2003
  ident: 2206_CR32
  publication-title: Phys. Rev. Lett
– volume: 036301
  start-page: 63
  year: 2001
  ident: 2206_CR24
  publication-title: [Phys. Rev. A 61, 052312 (2000)]. Phys. Rev. A
– volume: 1
  start-page: 65
  year: 1988
  ident: 2206_CR22
  publication-title: J. Cryptology
  doi: 10.1007/BF00206326
– ident: 2206_CR5
  doi: 10.1007/10719724_30
– volume: 71
  start-page: 016301
  year: 2005
  ident: 2206_CR38
  publication-title: Phys. Rev. A
  doi: 10.1103/PhysRevA.71.016301
– ident: 2206_CR13
  doi: 10.1109/ICQNM.2007.2
– volume: 25
  start-page: 1561
  year: 2008
  ident: 2206_CR35
  publication-title: Chin. Phys. Lett
  doi: 10.1088/0256-307X/25/5/011
– volume: 044302
  start-page: 72
  year: 2005
  ident: 2206_CR31
  publication-title: Phys. Rev. A
– ident: 2206_CR17
  doi: 10.1088/0953-4075/43/24/245501
– volume: 357
  start-page: 101
  year: 2006
  ident: 2206_CR28
  publication-title: Phys. Lett. A
  doi: 10.1016/j.physleta.2006.04.030
– volume: 52
  start-page: 376
  year: 2013
  ident: 2206_CR18
  publication-title: Int. J. Theor. Phys
  doi: 10.1007/s10773-012-1342-0
– volume: 9
  start-page: 1329
  year: 2011
  ident: 2206_CR21
  publication-title: Int. J. Quant. Inf
  doi: 10.1142/S0219749911007885
– volume: 76
  start-page: 036301
  year: 2007
  ident: 2206_CR41
  publication-title: Phys. Rev. A
  doi: 10.1103/PhysRevA.76.036301
– volume: 022–331
  start-page: 84
  year: 2011
  ident: 2206_CR3
  publication-title: Phys. Rev. A
– volume: 014302
  start-page: 77
  year: 2008
  ident: 2206_CR33
  publication-title: Phys. Rev. A
– volume: 7
  start-page: 329
  year: 2007
  ident: 2206_CR39
  publication-title: Quantum Inf.Comput
– volume: 042–309
  start-page: 85
  year: 2012
  ident: 2206_CR4
  publication-title: Phys. Rev. A
– volume: 53
  start-page: 491
  year: 2010
  ident: 2206_CR27
  publication-title: Sci. China Phys. Mech. Astron
  doi: 10.1007/s11433-010-0145-7
– volume: 76
  start-page: 062
  year: 2007
  ident: 2206_CR40
  publication-title: Phys. Rev. A
– ident: 2206_CR14
  doi: 10.1007/978-3-540-76900-2_28
– volume: 282
  start-page: 40
  year: 2009
  ident: 2206_CR8
  publication-title: Opt. Commun
– volume: 208901
  start-page: 101
  year: 2008
  ident: 2206_CR23
  publication-title: Phys. Rev. Lett
– volume: 036–301
  start-page: 82
  year: 2010
  ident: 2206_CR20
  publication-title: Phys. Rev. A
– volume: 17
  start-page: 3189
  year: 2008
  ident: 2206_CR29
  publication-title: Chin. Phys. B
  doi: 10.1088/1674-1056/17/9/006
– volume: 283
  start-page: 192
  year: 2010
  ident: 2206_CR36
  publication-title: Opt. Commun
  doi: 10.1016/j.optcom.2009.09.047
– volume: 283
  start-page: 31
  year: 2010
  ident: 2206_CR9
  publication-title: Opt. Commun
– ident: 2206_CR12
  doi: 10.1007/11593447_12
– volume: 022320
  start-page: 73
  year: 2006
  ident: 2206_CR30
  publication-title: Phys. Rev. A
– volume: 73
  start-page: 022320
  year: 2006
  ident: 2206_CR46
  publication-title: Phys. Rev. A
  doi: 10.1103/PhysRevA.73.022320
– volume: 282
  start-page: 1939
  year: 2009
  ident: 2206_CR6
  publication-title: Opt. Commun
  doi: 10.1016/j.optcom.2009.01.026
– volume: 360
  start-page: 748
  year: 2007
  ident: 2206_CR34
  publication-title: [Phys. Lett. A 350 (2006) 174]. Phys. Lett. A
– volume: 022323
  start-page: 80
  year: 2009
  ident: 2206_CR19
  publication-title: Phys. Rev. A
– volume-title: Information security and quantum mechanics: security of quantum protocols. Ph.D. thesis
  year: 2002
  ident: 2206_CR11
– volume: 282
  start-page: 41
  year: 2009
  ident: 2206_CR7
  publication-title: Opt. Commun
– volume: 72
  start-page: 044302
  year: 2005
  ident: 2206_CR45
  publication-title: Phys. Rev. A
  doi: 10.1103/PhysRevA.72.044302
– volume: 283
  start-page: 15
  year: 2010
  ident: 2206_CR48
  publication-title: Opt. Commun
– volume: 47
  start-page: 630
  year: 2011
  ident: 2206_CR26
  publication-title: IEEE J. Quantum Electron
  doi: 10.1109/JQE.2011.2107889
– volume: 101
  start-page: 208901
  year: 2008
  ident: 2206_CR42
  publication-title: Phys. Rev. Lett
  doi: 10.1103/PhysRevLett.101.208901
– volume: 24
  start-page: 84
  issue: 2
  year: 1981
  ident: 2206_CR10
  publication-title: Commun. ACM
  doi: 10.1145/358549.358563
– volume: 283
  start-page: 192
  year: 2010
  ident: 2206_CR43
  publication-title: Opt. Commun
  doi: 10.1016/j.optcom.2009.09.047
– volume: 349
  start-page: 75
  year: 2006
  ident: 2206_CR1
  publication-title: Phys. Lett. A
  doi: 10.1016/j.physleta.2005.09.010
– volume: 18
  start-page: 1333
  year: 2009
  ident: 2206_CR44
  publication-title: Chin. Phys. B
  doi: 10.1088/1674-1056/18/4/007
– volume: 012–333
  start-page: 75
  year: 2007
  ident: 2206_CR2
  publication-title: Phys. Rev. A
– volume: 53
  start-page: 2227
  issue: 12
  year: 2010
  ident: 2206_CR16
  publication-title: Sci. China. Phys. Mech. Astron
  doi: 10.1007/s11433-010-4109-8
– volume: 9
  start-page: 651
  year: 2011
  ident: 2206_CR15
  publication-title: Int. J. Quant. Inf.
  doi: 10.1142/S0219749911007691
– volume: 7
  start-page: 329
  year: 2007
  ident: 2206_CR25
  publication-title: Quantum Inf. Comput
– volume: 90
  start-page: 157
  year: 2003
  ident: 2206_CR37
  publication-title: Phys. Rev. Lett
SSID ssj0009048
Score 2.0447116
Snippet Recently, two novel anonymous quantum communication (AQC) protocols (Shi et al. in Int. J. Theor. Phys. 52, 376-384, 2013) are presented, respectively. One is...
SourceID crossref
springer
SourceType Enrichment Source
Index Database
Publisher
StartPage 106
SubjectTerms Elementary Particles
Mathematical and Computational Physics
Physics
Physics and Astronomy
Quantum Field Theory
Quantum Physics
Theoretical
Title Security analysis and improvement of the dining cryptographer problem-based anonymous quantum communication via non-maximally entanglement state analysis
URI https://link.springer.com/article/10.1007/s10773-014-2206-6
Volume 54
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: EBSCOhost Academic Search Ultimate
  customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn
  eissn: 1572-9575
  dateEnd: 20241001
  omitProxy: true
  ssIdentifier: ssj0009048
  issn: 0020-7748
  databaseCode: ABDBF
  dateStart: 20030201
  isFulltext: true
  titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn
  providerName: EBSCOhost
– providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1572-9575
  dateEnd: 20241001
  omitProxy: false
  ssIdentifier: ssj0009048
  issn: 0020-7748
  databaseCode: ADMLS
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVLSH
  databaseName: SpringerLink Journals
  customDbUrl:
  mediaType: online
  eissn: 1572-9575
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0009048
  issn: 0020-7748
  databaseCode: AFBBN
  dateStart: 19680501
  isFulltext: true
  providerName: Library Specific Holdings
– providerCode: PRVAVX
  databaseName: SpringerLINK - Czech Republic Consortium
  customDbUrl:
  eissn: 1572-9575
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0009048
  issn: 0020-7748
  databaseCode: AGYKE
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://link.springer.com
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLink Journals (ICM)
  customDbUrl:
  eissn: 1572-9575
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0009048
  issn: 0020-7748
  databaseCode: U2A
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://www.springerlink.com/journals/
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTxsxEB5BUCUuLdCiQtvIB04go92NX3tM2gQEggtEgtPK9tpVREJpskHAP-HfMrvr5aUWidsexquRPfa8vwHYMlbpKHWemjx1FDWepkbIDpW5dUlk0zi1ZUb36FjsD9nBGT8Lfdyzptq9SUlWL_WzZjcpy9ofRpME3WCxCEu89E9asNTdOz_sP2HtRqx-gNEzQutGNcnMf_3kpTp6mQutVMzgE5w2zNWVJRe788Ls2rtXuI3v5H4FPgaTk3RrGVmFBXe5Bh-q0k87-wz3J2GEHdEBoAQ_cjKqog1V8JD88QTtRJJXwySInd5eFTXStZuSMJGGluowx5UhmkD-zvHM5hNin3egkOuRJkhCJ_pmNNHj8S0pa9cvf9dF7KRqb3rk4wsMB_3Tn_s0DGygtsNVQVMlUdsZnojEJ575SGqjpeLMSa29cy5yPhbes9RbzXXu8th4zZUX6KCzyHfWoYU8uK9ApOPCpHksrBNMsVgLFtuO8so4b3DtBkTNuWU2oJmXQzXG2RMOc7njGe54Vu54JjZg-3HJVQ3l8RbxTnOOWbjVs_9Tb76L-hsso9nF60DOd2gV07n7gaZNYdooyr1fvUE7iHQbFodJ9wFWbfe-
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLZgE4ILb8R45sAJFNR2aZIeEWKM54VNglOVpAma2HhsHWL8E_4taZsCQ4DErQe7suIkdvz4DLAjFRdepA2WSaSxtXgCS8rqmCVKB56K_EhlGd2LS9psk9Pr8Nr1cQ_KavcyJZnf1F-a3RjLan8IDgL7DKaTUCU-56QC1YPjm7OjT6xdjxQXsH0ZWe-Gl8nMn34ybo7Gc6G5iWnMQasUrqgsudsfpnJfvX7Dbfyn9PMw61xOdFDskQWY0PeLMJWXfqrBErxduRF2SDiAEvuRoE4ebciDh-jBIOsnoiQfJoFUf_SYFkjXuo_cRBqcmcPEcrpoAnoaWp0Ne0h97UBBzx2BLAnuiZdOT3S7I5TVrt_fFkXsKG9v-pBjGdqNo9ZhE7uBDVjVQ57iiDNr7WQY0MAEhhiPCSkYD4lmQhittaeNT40hkVEiFIlOfGlEyA21D3TimfoKVKwMehUQ0yGVUeJTpSnhxBeU-KrODZfaSMtbA6_UW6wcmnk2VKMbf-IwZyse2xWPsxWPaQ12P1geCyiPv4j3Sj3G7lQPfqde-xf1Nkw3Wxfn8fnJ5dk6zFgXLCyCOhtQSftDvWndnFRuuW39DpCS-FQ
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JS8QwFA4uKF7EFcc1B09KsO2kSXoUdXBH0AFvJasMzIzjTEf0p_hvfWlTF1DBWw8vJeSlffv3IbSrtJBRZh1RJrMELJ4kivEm4UbbJNJZnGlf0b26Zqdten6f3gee01Hd7V6XJKuZBo_S1C8OBsYdfBl849z3AVGSJBASs0k0TcFU--irnRx-ou5GtPoVQ4wEfo6oy5o_veK7YfpeFS2NTWsBzQcvER9Wal1EE7a_hGbKbk09WkZvt4F1DsuAKQIPBnfKBEGZ78OPDoNrh03J_4D18HVQVODUdogDiQzxFszAypAAwE9jOOZxD-uvQyP4uSMxiJCefOn0ZLf7in27ef-h6jvH5UTSxz5WULt1cnd0SgLHAtHNVBQkExwMlEoTlrjEURdxqSQXKbVcSmetjayLmXM0c1qm0lgTKydT4RjE1DRyzVU0BXuwawhzmzKVmZhpy6igsWQ01k3hhLJOwdoGiuoDznUAIPc8GN38EzrZ6yQHneReJzlroL2PJYMKfeMv4f1aa3n4EEe_S6__S3oHzd4ct_LLs-uLDTQHTlNapWE20VQxHNstcEwKtV1evneva9_S
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+analysis+and+improvement+of+the+dining+cryptographer+problem-based+anonymous+quantum+communication+via+non-maximally+entanglement+state+analysis&rft.jtitle=International+journal+of+theoretical+physics&rft.au=Wang%2C+Qing-le&rft.au=Zhang%2C+Ke-jia&rft.date=2015-01-01&rft.issn=0020-7748&rft.eissn=1572-9575&rft.volume=54&rft.issue=1&rft.spage=106&rft.epage=115&rft_id=info:doi/10.1007%2Fs10773-014-2206-6&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s10773_014_2206_6
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0020-7748&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0020-7748&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0020-7748&client=summon