• Acta Photonica Sinica
  • Vol. 41, Issue 10, 1256 (2012)
LI Chao* and NIE Min
Author Affiliations
  • [in Chinese]
  • show less
    DOI: 10.3788/gzxb20124110.1256 Cite this Article
    LI Chao, NIE Min. Damage Model of Quantum Signaling of Multi-user Based on Malicious Attack and Repair Strategy[J]. Acta Photonica Sinica, 2012, 41(10): 1256 Copy Citation Text show less
    References

    [1] ZHAO Yi, QI Bing, MA Xiong-feng, et al. Experimental quantum key distribution with decoy states[J]. Physical Review Letters, 2006, 96(7):070502-1-070502-4.

    [2] QUAN Dong-xiao, PEI Chang-xing, ZHU Chang-hua, et al. New method of decoy state quantum key distribution with a heralded single-photon source[J]. Acta Physica Sinica, 2008, 57(9): 5600-5604.

    [3] CHEN Xia,WANG Fa-qiang,LU Yi-qun, et al. A differentialphase shift key distribution QKD system combing wit hefficient BB84 scheme[J]. Acta Photonica Sinca, 2008, 37(5): 1052-1056.

    [4] LIU Dan, PEI Chang-xing, QUAN Dong-xiao, et al. A new quantum secure direct communication scheme with authentication[J]. Chinese Physics Letters, 2010, 27(5): 050306.

    [5] CHEN Zhi-xin, TANG Zhi-lie, LIAO Chang-jun, et al. Practical security problem of six states Q KD protocol[J].Acta Photonica Sinica, 2006, 35(1): 126-129.

    [6] QUAN Dong-xiao, PEI Chang-xing, LIU Dan, et al. Qne-way quantum secure direct communication based on single photons[C]. 2009 Forth Internal Conference on Communications and Networking in China, Xi′an, China, Aug. 26-28, 2009.(EI: 20095112557671).

    [7] BOSTROEM K, FELBINGER T. Deterministic secure direct communication using entanglement[J]. Physical Review Letters, 2002, 89(18): 187902.

    [8] DENG Fu-guo, LONG Gui-lu, LIU Xiao-shu. Two-step quantum direct communication protocol using t he Einstein-Podolsky-Rosen pair block[J]. Physical Review A, 2003, 68(4): 042317.

    [9] DENG Fu-guo, LI Xi-han, LI Chun-yan, et al. Economical quantum secure direct communication network wit h single photons[J]. Chinese Physics, 2007, 16(12): 355323559.

    [10] GISIN N, FASEL S, KRAUS B, et al. Trojan-horse attacks on quantum-key-distribution systems[J]. Physical Review A, 2006, 73(2): 022320.

    [11] GISIN N, RIBORDY G, TITTEL W, et al. Quantum cryptography[J]. Review of Modern Physics, 2002, 74(1): 145

    [12] DENG Fu-guo, LI Xi-han, ZHOU Hong-yu, et al. Improving the security of multiparty quantum secret sharing against Trojan horse attack[J]. Physical Review A, 2005, 72(4): 044302.

    LI Chao, NIE Min. Damage Model of Quantum Signaling of Multi-user Based on Malicious Attack and Repair Strategy[J]. Acta Photonica Sinica, 2012, 41(10): 1256
    Download Citation