Netinfo Security ›› 2019, Vol. 19 ›› Issue (8): 44-50.doi: 10.3969/j.issn.1671-1122.2019.08.007
Previous Articles Next Articles
Runhua SHI(), Fengyu LIANG, Qing WANG, Shun ZHANG
Received:
2019-04-16
Online:
2019-08-10
Published:
2020-05-11
CLC Number:
Runhua SHI, Fengyu LIANG, Qing WANG, Shun ZHANG. An Effective Quantum Sealed-bid Auction Protocol[J]. Netinfo Security, 2019, 19(8): 44-50.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2019.08.007
[1] | NASERI M.Secure Quantum Sealed-bid Auction[J]. Optics Communications, 2009, 282(9): 1939-1943. |
[2] | QIN Sujuan, GAO Fei, WEN Qiaoyan, et al.Cryptanalysis and Improvement of A Secure Quantum Sealed-bid Auction[J]. Optics Communications, 2009, 282(19): 4014-4016. |
[3] | YANG Yuguang, NASERI M, WEN Qiaoyan.Improved Secure Quantum Sealed-bid Auction[J]. Optics Communications, 2009, 282(20): 4167-4170. |
[4] | ZHAO Zhiwen, NASERI M, ZHENG Yuanqing.Secure Quantum Sealed-bid Auction with Post-confirmation[J]. Optics Communications, 2010, 283(16): 3194-3197. |
[5] | XU Guoai, ZHAO Zhiwen, CHEN Xiubo, et al.Cryptanalysis and Improvement of the Secure Quantum Sealed-bid Auction with Post-confirmation[J]. International Journal of Quantum Information, 2011, 9(6): 1383-1392. |
[6] | HE Libao, HUANG Liusheng, YANY Wei, et al.Cryptanalysis and Melioration of Secure Quantum Sealed-bid Auction with Post-confirmation[J]. Quantum Information Processing, 2012, 11(6): 1359-1369. |
[7] | ZHAO Zhangji, WANG Weijia. Comment on “Cryptanalysis and Improvement of the Secure Quantum Sealed-bid Auction with Post-confirmation”[EB/OL]. , 2019-1-22. |
[8] | LUO Yi, ZHAO Zhiwen, ZHAO Zhangji, et al.The Loophole of the Improved Secure Quantum Sealed-bid Auction with Post-confirmation and Solution[J]. Quantum Information Processing, 2013, 12(1): 295-302. |
[9] | WANG Qingle, ZHANG Weiwei, SU Qi.Revisiting “The Loophole of the Improved Secure Quantum Sealed-bid Auction with Post-confirmation and Solution”[J]. International Journal of Theoretical Physics, 2014, 53(9): 3147-3153. |
[10] | WANG Jingtao, CHEN Xiubo, XU Gang, et al.A New Quantum Sealed-bid Auction Protocol with Secret Order in Post-confirmation[J]. Quantum Information Processing, 2015, 14(10): 3899-3911. |
[11] | WANG Zhangyin.Quantum Secure Direct Communication and Quantum Sealed-bid Auction with EPR Pairs[J]. Communications in Theoretical Physics, 2010, 54(6): 997-1002. |
[12] | LIU Wenjie, WANG Fang, JI Sai, et al.Attacks and Improvement of Quantum Sealed-bid Auction with EPR Pairs[J]. Communications in Theoretical Physics, 2014, 61(6): 686-690. |
[13] | ZHANG Kejia, KWEK L C, MA Chunguang, et al.Security Analysis with Improved Design of Post-confirmation Mechanism for Quantum Sealed-bid Auction with Single Photons[J]. Quantum Information Processing, 2018, 17(2): 38-52. |
[14] | LIU Wenjie, WANG Haibin, YUAN Gonglin, et al.Multiparty Quantum Sealed-bid Auction Using Single Photons as Message Carrier[J]. Quantum Information Processing, 2016, 15(2): 869-879. |
[15] | ZHANG Rui, SHI Runhua, QIN Jiaqi, et al.An Economic and Feasible Quantum Sealed-bid Auction Protocol[J]. Quantum Information Processing, 2018, 17(2): 35-49. |
[1] | Zhiyan ZHAO, Xiaomo JI. Research on the Intelligent Fusion Model of Network Security Situation Awareness [J]. Netinfo Security, 2020, 20(4): 87-93. |
[2] | Min LIU, Shuhui CHEN. Research on VoLTE Traffic Based on Association Fusion [J]. Netinfo Security, 2020, 20(4): 81-86. |
[3] | Lingyu BIAN, Linlin ZHANG, Kai ZHAO, Fei SHI. Ethereum Malicious Account Detection Method Based on LightGBM [J]. Netinfo Security, 2020, 20(4): 73-80. |
[4] | Yifeng DU, Yuanbo GUO. A Dynamic Access Control Method for Fog Computing Based on Trust Value [J]. Netinfo Security, 2020, 20(4): 65-72. |
[5] | Zhizhou FU, Liming WANG, Ding TANG, Shuguang ZHANG. HBase Secondary Ciphertext Indexing Method Based on Homomorphic Encryption [J]. Netinfo Security, 2020, 20(4): 55-64. |
[6] | Rong WANG, Chunguang MA, Peng WU. An Intrusion Detection Method Based on Federated Learning and Convolutional Neural Network [J]. Netinfo Security, 2020, 20(4): 47-54. |
[7] | Xiaoli DONG, Shuai SHANG, Jie CHEN. Impossible Differential Attacks on 9-Round Block Cipher Rijndael-192 [J]. Netinfo Security, 2020, 20(4): 40-46. |
[8] | Chun GUO, Changqing CHEN, Guowei SHEN, Chaohui JIANG. A Ransomware Classification Method Based on Visualization [J]. Netinfo Security, 2020, 20(4): 31-39. |
[9] | Lu CHEN, Yajie SUN, Liqiang ZHANG, Yun CHEN. A Scheme of Measurement for Terminal Equipment Based on DICE in IoT [J]. Netinfo Security, 2020, 20(4): 21-30. |
[10] | Jinfang JIANG, Guangjie HAN. Survey of Trust Management Mechanism in Wireless Sensor Network [J]. Netinfo Security, 2020, 20(4): 12-20. |
[11] | Jianwei LIU, Yiran HAN, Bin LIU, Beiyuan YU. Research on 5G Network Slicing Security Model [J]. Netinfo Security, 2020, 20(4): 1-11. |
[12] | Peng LIU, Qian HE, Wangyang LIU, Xu CHENG. CP-ABE Scheme Supporting Attribute Revocation and Outsourcing Decryption [J]. Netinfo Security, 2020, 20(3): 90-97. |
[13] | Yubo SONG, Ming FAN, Junjie YANG, Aiqun HU. Multipath Solution and Blocking Method of Network Attack Traffic Based on Topology Analysis [J]. Netinfo Security, 2020, 20(3): 9-17. |
[14] | Tengfei WANG, Manchun CAI, Tianliang LU, Ting YUE. IPv6 Network Attack Source Tracing Method Based on iTrace_v6 [J]. Netinfo Security, 2020, 20(3): 83-89. |
[15] | Yi ZHANG, Hongyan LIU, Hequn XIAN, Chengliang TIAN. A Cloud Storage Encrypted Data Deduplication Method Based on Authorization Records [J]. Netinfo Security, 2020, 20(3): 75-82. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||