CommentComment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174]
Section snippets
Acknowledgements
We thank Ba An Nguyen and the anonymous reviewer for helpful comments. This work was supported by the National Natural Science Foundation of China, Grant No. 60373059; the Major Research Plan of the National Natural Science Foundation of China, Grant No. 90604023; the National Laboratory for Modern Communications Science Foundation of China; the National Research Foundation for the Doctoral Program of Higher Education of China, Grant No. 20040013007; the Graduate Students Innovation Foundation
References (7)
Phys. Lett. A
(2006)- et al.
Phys. Rev. A
(2005) - et al.
Phys. Rev. A
(1999)
Cited by (138)
Cryptanalysis of quantum digital signature for the access control of sensitive data
2022, Physica A: Statistical Mechanics and its ApplicationsCitation Excerpt :Therefore, cryptanalysis is also very important and interesting. In the study of quantum cryptography, quite a few effective attack strategies have been reported, such as teleportation attack [34,35], dense-coding attack [36], correlation-extractability attack [37], denial-of-service attack [38–40], and so on. Understanding these attacks will be significative for us to design new cryptographic protocols with higher security.
Controlled node dialogue in IoT networks based on nonlocal orthogonal product states
2024, Journal of Optical Communications and Networking