Author of the publication

Relativistic quantum private database queries.

, , and . Quantum Information Processing, 14 (4): 1443-1450 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Flexible protocol for quantum private query based on B92 protocol., , , and . Quantum Information Processing, 13 (3): 805-813 (2014)Trojan-horse attacks on quantum key distribution with classical Bob., , and . Quantum Information Processing, 14 (2): 681-686 (2015)Quantum oblivious transfer with relaxed constraints on the receiver., , , , and . Quantum Information Processing, 14 (8): 3031-3040 (2015)Novel quantum image encryption using one-dimensional quantum cellular automata., , , , and . Inf. Sci., (2016)Quantum cryptographic algorithm for color images using quantum Fourier transform and double random-phase encoding., , , and . Inf. Sci., (2014)Letter to the Editor regarding "Dynamic watermarking scheme for quantum images based on Hadamard transform" by Song et al., , and . Multimedia Syst., 22 (2): 271-272 (2016)Relativistic quantum private database queries., , and . Quantum Information Processing, 14 (4): 1443-1450 (2015)Revisiting the security of secure direct communication based on ping-pong protocolQuantum Inf. Process. 8, 347 (2009)., , , and . Quantum Information Processing, 10 (3): 317-323 (2011)Comment on "The enhanced quantum blind signature protocol"., , and . Quantum Information Processing, 13 (6): 1305-1312 (2014)Novel image encryption/decryption based on quantum Fourier transform and double phase encoding., , , and . Quantum Information Processing, 12 (11): 3477-3493 (2013)