Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-party quantum state sharing of an arbitrary two-qubit state with Bell states., , , and . Quantum Information Processing, 10 (2): 231-239 (2011)A Secure Scheme for Data Statistics., , and . ICEE, page 1289-1291. IEEE, (2010)Keyword search protocol with privacy preservation using ID-based proxy reencryption., , , , and . IJSN, 11 (4): 188-195 (2016)A privacy-preserving quantum sealed-bid auction protocol with EPR pairs., , and . Quantum Inf. Process., 21 (1): 1 (2022)An Efficient Multiparty Quantum Secret Sharing with Pure Entangled Two Photon States., and . CSEE (1), volume 214 of Communications in Computer and Information Science, page 489-495. Springer, (2011)Quantum state sharing against the controller's cheating., , and . Quantum Information Processing, 12 (8): 2889-2899 (2013)Erratum to: Multi-party quantum key agreement with Bell states and Bell measurements., and . Quantum Information Processing, 12 (2): 933 (2013)Quantum private set intersection cardinality and its application to anonymous authentication., , , , and . Inf. Sci., (2016)Multiparty quantum secret sharing with the pure entangled two-photon states., and . Quantum Information Processing, 11 (1): 161-169 (2012)Asymmetric multi-party quantum state sharing of an arbitrary m-qubit state., , , and . Quantum Information Processing, 10 (1): 53-61 (2011)