Tzone-lih Hwang
#155,763
Most Influential Person Now
Tzone-lih Hwang's AcademicInfluence.com Rankings
Tzone-lih Hwangengineering Degrees
Engineering
#6488
World Rank
#7819
Historical Rank
Electrical Engineering
#1937
World Rank
#2039
Historical Rank
Applied Physics
#2081
World Rank
#2120
Historical Rank

Download Badge
Engineering
Tzone-lih Hwang's Degrees
- PhD Electrical Engineering National Taiwan University
- Masters Electrical Engineering National Taiwan University
- Bachelors Electrical Engineering National Taiwan University
Why Is Tzone-lih Hwang Influential?
(Suggest an Edit or Addition)Tzone-lih Hwang's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network (2016) (541)
- New quantum private comparison protocol using EPR pairs (2012) (255)
- Quantum key agreement protocol based on BB84 (2010) (211)
- Three-party encrypted key exchange: attacks and a solution (2000) (207)
- A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks (2016) (180)
- Three-party encrypted key exchange without server public-keys (2001) (145)
- Authenticated semi-quantum key distribution protocol using Bell states (2014) (133)
- Improvement on “Quantum Key Agreement Protocol with Maximally Entangled States” (2011) (133)
- Multi-user private comparison protocol using GHZ class states (2013) (131)
- Non-interactive password authentications without password tables (1990) (131)
- A password authentication scheme with secure password updating (2003) (130)
- Threshold proxy signatures (1999) (126)
- Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders (1994) (125)
- Attacks and Solutions on Strong-Password Authentication (2001) (119)
- Fault tolerant two-step quantum secure direct communication protocol against collective noises (2011) (116)
- Dynamic quantum secret sharing (2013) (115)
- Lightweight and Energy-Efficient Mutual Authentication and Key Agreement Scheme With User Anonymity for Secure Communication in Global Mobility Networks (2016) (108)
- Secure key agreement protocols for three-party against guessing attacks (2005) (104)
- Enhanced three-party encrypted key exchange without server public keys (2004) (101)
- Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols (2007) (101)
- Quantum dialogue protocols immune to collective noise (2013) (101)
- Intercept–resend attacks on Chen et al.'s quantum private comparison protocol and the improvements (2011) (99)
- Provably secure three-party password-based authenticated key exchange protocol using Weil pairing (2005) (89)
- Untraceable Sensor Movement in Distributed IoT Infrastructure (2015) (87)
- Enhancement on “quantum blind signature based on two-state vector formalism” (2013) (86)
- On “Arbitrated quantum signature of classical messages against collective amplitude damping noise” (2011) (80)
- A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system (2015) (79)
- New circular quantum secret sharing for remote agents (2013) (78)
- New Efficient Three-Party Quantum Key Distribution Protocols (2009) (78)
- Authenticated semi-quantum direct communication protocols using Bell states (2015) (77)
- Improved QSDC Protocol over a Collective-Dephasing Noise Channel (2012) (75)
- Teleportation of a Pure EPR State via GHZ-like State (2010) (74)
- Dense coding using cluster states and its application on deterministic secure quantum communication (2011) (73)
- An enhancement on Shi et al.'s multiparty quantum secret sharing protocol (2011) (72)
- On Zhang's Nonrepudiable Proxy Signature Schemes (1998) (70)
- An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks (2016) (67)
- Reparable key distribution protocols for Internet environments (1995) (63)
- Mediated Semi‐Quantum Key Distribution Without Invoking Quantum Measurement (2018) (62)
- Cryptosystem for Group Oriented Cryptography (1991) (62)
- Dynamic quantum secret sharing protocol based on GHZ state (2014) (60)
- Comment on “Security analysis and improvements of arbitrated quantum signature schemes” (2011) (59)
- Semi-quantum private comparison protocol under an almost-dishonest third party (2016) (59)
- THE ENHANCEMENT OF ZHOU et al.'s QUANTUM SECRET SHARING PROTOCOL (2009) (59)
- EFFICIENT KEY CONSTRUCTION ON SEMI-QUANTUM SECRET SHARING PROTOCOLS (2013) (59)
- Secret Error-Correcting Codes (SECC) (1988) (57)
- Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks (2015) (56)
- On "multiparty quantum secret sharing with Bell states and Bell measurements" (2010) (56)
- Controlled remote state preparation protocols via AKLT states (2014) (55)
- EPR quantum key distribution protocols with potential 100% qubit efficiency (2007) (55)
- The enhancement of three-party simultaneous quantum secure direct communication scheme with EPR pairs (2011) (54)
- Simple password-based three-party authenticated key exchange without server public keys (2010) (54)
- Efficient semi-quantum private comparison using single photons (2019) (53)
- Multi-party quantum private comparison with an almost-dishonest third party (2015) (52)
- Multiparty quantum secret sharing based on GHZ states (2011) (51)
- Quantum private comparison of equality protocol without a third party (2014) (51)
- Intercept-Resend Attacks on Semi-quantum Secret Sharing and the Improvements (2011) (50)
- Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space (1989) (49)
- Multiparty quantum private comparison with almost dishonest third parties for strangers (2017) (49)
- On ‘a simple three‐party password‐based key exchange protocol’ (2011) (46)
- Efficient Three-Party Authentication and Key Agreement Protocols Resistant to Password Guessing Attacks (2003) (45)
- Convertible ring signature (2005) (45)
- Efficient quantum dialogue using single photons (2014) (45)
- Quantum Secret Sharing Using Symmetric W State (2012) (45)
- Modified Harn signature scheme based on factorising and discrete logarithms (1996) (43)
- Remark on the Threshold RSA Signature Scheme (1993) (42)
- Thwarting intercept-and-resend attack on Zhang’s quantum secret sharing using collective rotation noises (2012) (42)
- Provably secure authenticated key exchange protocols for low power computing clients (2006) (40)
- Multi-party quantum secret sharing based on two special entangled states (2012) (40)
- Two Attacks on Neuman-Stubblebine Authentication Protocols (1995) (40)
- Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing (2017) (39)
- Enhanced delegation-based authentication protocol for PCSs (2009) (39)
- Controlled quantum dialogue using cluster states (2017) (38)
- Intercept-and-resend attack on controlled bidirectional quantum direct communication and its improvement (2015) (38)
- On the Matsumoto and Imai's Human Identification Scheme (1995) (37)
- Quantum authencryption: one-step authenticated quantum secure direct communications for off-line communicants (2014) (37)
- Bell state entanglement swappings over collective noises and their applications on quantum cryptography (2013) (35)
- Provably Secure Mutual Authentication and Key Exchange Scheme for Expeditious Mobile Communication Through Synchronously One-Time Secrets (2014) (34)
- Double C-NOT attack and counterattack on ‘Three-step semi-quantum secure direct communication protocol’ (2018) (34)
- Authenticated semi-quantum key distributions without classical channel (2016) (34)
- Controlled quantum dialogue robust against conspiring users (2016) (33)
- Quantum Secret Sharing Using GHZ-Like State (2010) (33)
- Revisiting Deng et al.’s Multiparty Quantum Secret Sharing Protocol (2011) (32)
- Comment on 'Quantum secret sharing between multiparty and multiparty without entanglement' (2006) (32)
- Modification Attack on QSDC with Authentication and the Improvement (2013) (30)
- Privacy and non-repudiation on pay-TV systems (2000) (29)
- On the Security of Some Password Authentication Protocols (2003) (29)
- Identity-based conference key broadcast systems (1994) (29)
- On the Security of SPLICE/AS - The Authentication System in WIDE Internet (1995) (29)
- Quantum Secret Sharing Based on Quantum Search Algorithm (2012) (27)
- New quantum private comparison protocol using EPR pairs (2011) (27)
- Authenticated Quantum Dialogue Based on Bell States (2015) (27)
- Improvement of “Novel Multiparty Quantum Key Agreement Protocol with GHZ States” (2017) (27)
- Arbitrated quantum signature of classical messages without using authenticated classical channels (2014) (26)
- Mediated Semi‐Quantum Key Distribution Using Single Photons (2019) (25)
- New deterministic quantum communication via symmetric W state (2010) (25)
- Probabilistic authenticated quantum dialogue (2015) (25)
- Quantum dialogue protocols over collective noise using entanglement of GHZ state (2016) (25)
- Private Authentication Techniques for the Global Mobility Network (2005) (25)
- Controlled Deterministic Secure Quantum Communication Based on Quantum Search Algorithm (2012) (24)
- On the Matsumoto and Imai human identification scheme (1995) (23)
- Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels (2013) (23)
- Proxy-protected signature secure against the undelegated proxy signature attack (2007) (23)
- Multiparty controlled quantum secure direct communication based on quantum search algorithm (2013) (21)
- On the traceability on RSA-based partially signature with low computation (2005) (21)
- Comment on “Quantum Key Distribution and Quantum Authentication Based on Entangled State” (2011) (21)
- Publicly verifiable authenticated encryption (2003) (21)
- Multi-Party Quantum Private Comparison Protocol with an Almost-Dishonest Third Party using GHZ States (2016) (20)
- On the security enhancement for anonymous secure e-voting over computer network (2005) (20)
- Fault tolerant deterministic quantum communications using GHZ states over collective-noise channels (2013) (20)
- Man-in-the-Middle Attack on “Quantum Dialogue with Authentication Based on Bell States” (2013) (19)
- Probabilistic quantum key distribution (2011) (19)
- Deterministic quantum communication using the symmetric W state (2013) (19)
- One-Way Quantum Authenticated Secure Communication Using Rotation Operation (2011) (18)
- Cryptanalysis of enhancement for simple authentication key agreement algorithm (2002) (18)
- Provably secure and efficient authentication techniques for the global mobility network (2011) (18)
- The security of He and Kiesler's signature schemes (1995) (18)
- On “A new quantum blind signature with unlinkability” (2017) (17)
- Comments on "Dynamic Key Management Schemes for Access control in a Hierarchy" (1999) (16)
- SECURE DIRECT COMMUNICATION USING DETERMINISTIC BB84 PROTOCOL (2008) (16)
- Security analysis of the generalized key agreement and password authentication protocol (2001) (16)
- Semi-quantum Key Distribution Robust Against Combined Collective Noise (2018) (16)
- Improved authenticated multiple-key agreement protocol (2003) (14)
- Provably Secure Three-Party Password-Authenticated Key Exchange (2004) (14)
- Trojan horse attack free fault-tolerant quantum key distribution protocols (2014) (14)
- Comment on “Dynamic quantum secret sharing” (2013) (14)
- Trojan Horse Attack Free Fault-Tolerant Quantum Key Distribution Protocols Using GHZ States (2016) (13)
- Enhanced Multiparty Controlled QSDC Using GHZ State (2011) (13)
- Forgery attack on one-time proxy signature and the improvement (2014) (13)
- Identity-based conference key broadcast schemes with user authentication (1994) (13)
- IAR-CTR and IAR-CFB: integrity aware real-time based counter and cipher feedback modes (2015) (12)
- On the Controlled Cyclic Quantum Teleportation of an Arbitrary Two-Qubit Entangled State by Using a Ten-Qubit Entangled State (2020) (12)
- Group-oriented undeniable signature schemes with a trusted center (1999) (12)
- Efficient one-out-of-two quantum oblivious transfer based on four-coherent-state postselection protocol (2008) (12)
- Scheme for secure digital mobile communications based on symmetric key cryptography (1992) (11)
- Key generation of algebraic-code cryptosystems (1994) (11)
- Comment on (t, n) Threshold d-level Quantum Secret Sharing (2018) (11)
- Comment on “Cryptanalysis of the blind signatures based on the discrete logarithm problem (1996) (11)
- Provably secure extended chaotic map-based three-party key agreement protocols using password authentication (2015) (11)
- Controlled remote state preparation protocols via AKLT states (2014) (10)
- Improving the Security of ‘High-Capacity Quantum Summation with Single Photons in both Polarization and Spatial-Mode Degrees of Freedom’ (2019) (10)
- A branch oriented key management solution to dynamic access control in a hierarchy (1991) (9)
- (t,n) THRESHOLD-MULTISIGNATURE SCHEME AND GENERALIZED-MULTISIGNATURE SCHEME WHERE SUSPECTED FORGERY IMPLIES TRACEABILITY OF ADVERSARIAL SHAREHOLDERS (2000) (9)
- Robust stream-cipher mode of authenticated encryption for secure communication in wireless sensor network (2016) (9)
- An Efficient Quantum Private Comparison of Equality over Collective-Noise Channels (2016) (9)
- Double CNOT attack on “Quantum key distribution with limited classical Bob” (2019) (9)
- Comments on Two Group Signatures (1999) (9)
- Comment on the “Quantum Private Comparison Protocol Based on Bell Entangled States” (2014) (9)
- Attacks and Improvement on “Quantum Direct Communication with Mutual Authentication” (2014) (9)
- All-in-one group-oriented cryptosystem based on bilinear pairing (2007) (8)
- New generalized group-oriented cryptosystem based on Diffie-Hellman scheme (1999) (8)
- Multi-Party Quantum Private Comparison Protocol with an Almost-Dishonest Third Party using GHZ States (2016) (8)
- (t, n) Threshold Untraceable Signatures (2000) (8)
- Quantum dialogue protocols immune to collective noise (2012) (8)
- Man-in-the-middle attack on quantum secure communications with authentication (2014) (8)
- Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing (2017) (8)
- On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives (1999) (8)
- Comment on N quantum channel are sufficient for multi-user quantum key distribution protocol between n users (2010) (7)
- ID based public key cryptosystems based on Okamoto and Tanaka's ID based one way communication scheme (1990) (7)
- Statistics attack on ‘quantum private comparison with a malicious third party’ and its improvement (2018) (7)
- Erratum “New arbitrated quantum signature of classical messages against collective amplitude damping noise” [Optics Communications 284 (2011) 3144] (2013) (7)
- On the lightweight authenticated semi-quantum key distribution protocol without Trojan horse attack (2020) (7)
- Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem (2007) (7)
- Comment on: Supervisory Asymmetric Deterministic Secure Quantum Communication (2012) (7)
- Fault tolerant authenticated quantum direct communication immune to collective noises (2013) (7)
- Subliminal channels in the identity-based threshold ring signature (2009) (6)
- Multiparty quantum remote control (2013) (6)
- Quantum private comparison of equality protocol without a third party (2013) (6)
- Revocation-free public-key encryption based on security-mediated public-key infrastructure (2007) (6)
- CNOT extraction attack on “quantum asymmetric cryptography with symmetric keys” (2014) (6)
- Comment on "An arbitrated quantum signature protocol based on the chained CNOT operations encryption" (2015) (6)
- Fault-tolerant controlled quantum secure direct communication over a collective quantum noise channel (2014) (6)
- On the security of fair blind signature scheme using oblivious transfer (1999) (6)
- Entanglement swapping of a GHZ state via a GHZ-like state (2011) (5)
- On the "Deterministic Secure Quantum Communication using Four-Particle Entangled State and Entanglement Swapping" (2012) (5)
- The Security of Two ID-Based Multisignature Protocols for Sequential and Broadcasting Architectures (1999) (5)
- Security of Park-Lim key agreement schemes for VSAT satellite communications (2003) (5)
- Measure-resend authenticated semi-quantum key distribution with single photons (2020) (5)
- Security Weaknesses on a Delegation-Based Authentication Protocol for PCSs (2015) (5)
- Forward/Backward Unforgeable Digital Signature Scheme Using Symmetric-Key Crypto-System (2016) (5)
- Comment on “Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise” (2013) (5)
- Parallel decoding of binary BCH codes (1991) (5)
- Fault-tolerant controlled deterministic secure quantum communication using EPR states against collective noise (2016) (5)
- SECURITY OF "ASYMMETRICAL QUANTUM KEY DISTRIBUTION PROTOCOL" (2007) (4)
- Cryptanalysis of group signature scheme using self-certified public keys (1999) (4)
- Six-Qubit Decoherence-Free State Measurement Method and its Application to Development of Authenticated Quantum Secure Direct Communication Protocol (2018) (4)
- RT-OCFB: Real-Time Based Optimized Cipher Feedback Mode (2016) (4)
- Measure-and-Resend Attack and Improvement on “A Scheme to Share Information via Employing Discrete Algorithm to Quantum States” (2014) (4)
- Collective Attack and Improvement on “Mediated Semi‐Quantum Key Distribution Using Single Photons” (2020) (4)
- Protocols for Group Oriented Secret Sharing (1992) (4)
- Quantum entanglement establishment between two strangers (2014) (4)
- A Pseudo-Key Scheme for Dynamic Access Control in a Hierarchy (1994) (4)
- An Efficient Quantum Private Comparison of Equality over Collective-Noise Channels (2015) (4)
- Private-Key Algebraic-Code Cryptosystems with High Information Rates (Extended Abstract) (1990) (4)
- ID-based non-interactive zero-knowledge proof system based on one-out-of-two non-interactive oblivious transfer (1995) (4)
- New Multistage Secret Sharing Scheme Based on Factorization Problem (2001) (4)
- Efficient and practical DHEKE protocols (2001) (3)
- Comment on ‘improving the security of protocols of quantum key agreement solely using bell states and bell measurement’ (2015) (3)
- Modular Design for Round-Oriented Password Authentication Protocols (2006) (3)
- Enhancement of GAO's Multiparty Quantum Secret Sharing (2011) (3)
- Comment on "cryptanalysis of a novel ultralightweight mutual authentication protocol for IoT devices using RFID tags" (2018) (3)
- PFX: an essence of authencryption for block-cipher security (2016) (3)
- Attacks on ID-based signature scheme based upon Rabin's public key cryptosystem (1993) (3)
- Design of Quantum Key Agreement Protocols with Strong Fairness Property (2015) (3)
- On the secure communications of group oriented societies (1990) (3)
- Three-party authenticated key agreements for optimal communication (2017) (3)
- Multiparty quantum private comparison with almost dishonest third parties for strangers (2016) (3)
- Quantum Key Recycling with optimal key recycling rate based on a noise level (2020) (3)
- Anonymous proof of membership with ring signature (2005) (3)
- Erratum to: Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks (2015) (3)
- On double-one matrices and double-zero matrices (1992) (2)
- On the security of Park et al.'s key distribution protocol for digital mobile communications (1996) (2)
- An efficient probabilistic public-key block encryption and signature scheme based on El-Gamal's scheme (1991) (2)
- Multi-controller quantum teleportation with remote rotation and its applications (2015) (2)
- Provably Secure Mutual Authentication and Key Exchange Scheme for Expeditious Mobile Communication Through Synchronously One-Time Secrets (2013) (2)
- Double C-NOT attack and counterattack on ‘Three-step semi-quantum secure direct communication protocol’ (2018) (2)
- (t, m) Threshold and generalized ID-based conference key distribution system (2000) (2)
- Authenticated semi-quantum direct communication protocols using Bell states (2015) (2)
- On the security of Chang and Wu`s broadcasting cryptosystem for computer networks (1996) (2)
- Unitary operation attack and the improvement on probabilistic quantum key distribution (2014) (2)
- Efficient semi-quantum private comparison using single photons (2019) (2)
- Multiparty Quantum Private Comparsion with Individually Dishonest Third Parties for Strangers (2016) (2)
- An improved algorithm for Davida and Cowles's decoding method☆ (1993) (2)
- Provably secure mutual authentication and key agreement scheme with user anonymity (2013) (2)
- Improvement on "Secure multi-party quantum summation based on quantum Fourier transform" (2019) (2)
- PFC-CTR, PFC-OCB: Efficient stream cipher modes of authencryption (2016) (2)
- On the Security of Two Blind Quantum Computations (2015) (2)
- (t+1,n) threshold and generalized DSS signatures without a trusted party (1997) (2)
- Multi-user private comparison protocol using GHZ class states (2012) (2)
- On “controlled quantum teleportation and secure direct communication” (2012) (2)
- Semi-quantum Inspired Lightweight Mediated Quantum Key Distribution Protocol (2020) (2)
- On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes (2007) (1)
- (t,m) THRESHOLD AND GENERALIZED ID-BASED CONFERENCE KEY DISTRIBUTION SYSTEM (2000) (1)
- Nonrepudiable threshold proxy signatures (1999) (1)
- Efficient quantum dialogue using single photons (2014) (1)
- Man-in-the-Middle Attack on “Quantum Dialogue with Authentication Based on Bell States” (2013) (1)
- On the security of Wu and Yeh's conference key distribution system (1995) (1)
- Improvement on ‘Cryptanalysis and Improvement of a Multiparty Quantum Direct Secret Sharing of Classical Messages with Bell States and Bell Measurements’ (2019) (1)
- Collusion Attack and Counterattack on the Quantum Key Agreement Via Non-maximally Entangled Cluster States (2020) (1)
- Quantum Secret Authentication Code (2011) (1)
- Modified Chen-Hwang identity-based conference key broadcast schemes with user authentication (1997) (1)
- IA-CTR: Integrity-Aware Conventional Counter Mode for Secure and Efficient Communication in Wireless Sensor Networks (2017) (1)
- Attacks on Okamoto and Tanaka's One-Way ID-Based Key Distribution System (1992) (1)
- Arbitrated Unconditionally Secure Authentication Scheme with Multi-senders (1997) (1)
- Secure Quantum Communication Scheme for Six-Qubit Decoherence-Free States (2018) (1)
- Mediated Authenticated Differential Phase Shift Quantum Key Distribution (2022) (1)
- Quantum Secure Direct Communication between Two Strangers (2014) (1)
- Mediated semi-quantum key distribution in randomization-based environment. (2020) (1)
- Quantum dialogue protocols over collective noise using entanglement of GHZ state (2016) (1)
- Comment on 'Semi-Quantum Private Comparison Based on Bell States' (2020) (1)
- Conspiracy Attacks on the Threshold RSA Signature Scheme (1994) (1)
- Public-key ID-based cryptosystem (1991) (1)
- Comment on "Reparable key distribution protocols for Internet environments" [and reply] (1998) (1)
- Authenticated semi-quantum key distributions without classical channel (2016) (1)
- Multi-party quantum private comparison with an almost-dishonest third party (2015) (1)
- Controlled quantum dialogue robust against conspiring users (2016) (0)
- Author's Reply (1998) (0)
- Lightweight Quantum Security Protocols. (2020) (0)
- Parallel Decoding of the (31, 16, 7) Quadratic Residue Code (1992) (0)
- A Secure Authentication at Remote Real-Time Data Access in IWSN-Based Healthcare Environment (2022) (0)
- Controlled quantum dialogue using cluster states (2017) (0)
- Quantum Secret Sharing Using Symmetric W State (2012) (0)
- Comment on “A practical protocol for three-party authenticated quantum key distribution” (2017) (0)
- Quantum Secret Sharing Based on Quantum Search Algorithm (2012) (0)
- Threshold proxy signatures with undeniable signers (2002) (0)
- An Improved Protocol for Controlled Deterministic Secure Quantum Communication Using Five-Qubit Entangled State (2018) (0)
- Intercept-and-resend attack on controlled bidirectional quantum direct communication and its improvement (2015) (0)
- Deterministic quantum communication using the symmetric W state (2013) (0)
- Semi-Quantum Inspired Lightweight Mediated Quantum Key Distribution with Limited Resource and Untrusted TP (2021) (0)
- Fault tolerant deterministic quantum communications using GHZ states over collective-noise channels (2013) (0)
- On “A new quantum blind signature with unlinkability” (2017) (0)
- Efficient ID-Based Key Distribution with Tamperfree Devices (1992) (0)
- Statistics attack on ‘quantum private comparison with a malicious third party’ and its improvement (2017) (0)
- Improvement on ‘Cryptanalysis and Improvement of a Multiparty Quantum Direct Secret Sharing of Classical Messages with Bell States and Bell Measurements’ (2019) (0)
- Improved QSDC Protocol over a Collective-Dephasing Noise Channel (2012) (0)
- Provably secure extended chaotic map-based three-party key agreement protocols using password authentication (2015) (0)
- Quantum Teleportation with Remote Rotation on a GHZ State (2013) (0)
- Six-Qubit Decoherence-Free State Measurement Method and its Application to Development of Authenticated Quantum Secure Direct Communication Protocol (2018) (0)
- Quantum entanglement establishment between two strangers (2015) (0)
- Enhancement on “quantum blind signature based on two-state vector formalism” (2012) (0)
- Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem (1994) (0)
- A Secure Lightweight Authentication Scheme in IoT Environment with Perfect Forward and Backward Secrecy (2022) (0)
- On the unlinkability of randomization-enhanced Chaum's blind signature scheme (2005) (0)
- Trojan horse attack free fault-tolerant quantum key distribution protocols (2013) (0)
- Comment on the “Quantum Private Comparison Protocol Based on Bell Entangled States” (2013) (0)
- Controlled Deterministic Secure Quantum Communication Based on Quantum Search Algorithm (2012) (0)
- Arbitrated quantum signature of classical messages without using authenticated classical channels (2013) (0)
- Collusion Attack and Counterattack on the Quantum Key Agreement Via Non-maximally Entangled Cluster States (2021) (0)
- Arbetrated Unconditionally Secure Authentication Scheme with Multi-Senders (1998) (0)
- Untraceable and Unclonable Sensor Movement in the Distributed IoT Environment (2021) (0)
- Improvement of “Novel Multiparty Quantum Key Agreement Protocol with GHZ States” (2017) (0)
- Semi-quantum Key Distribution Robust Against Combined Collective Noise (2018) (0)
- Controlled probabilistic quantum key distribution using a ground state (2014) (0)
- Measure-and-Resend Attack and Improvement on “A Scheme to Share Information via Employing Discrete Algorithm to Quantum States” (2013) (0)
- Erratum to: Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks (2015) (0)
- Comment on “Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise” (2013) (0)
- Multi-controller quantum teleportation with remote rotation and its applications (2015) (0)
- Group-oriented secure communications based on the RSA scheme (1992) (0)
- Attacks and Improvement on “Quantum Direct Communication with Mutual Authentication” (2013) (0)
- Comment on "Quantum Asymmetric Cryptography with Symmetric Keys" (2011) (0)
- Mediated Asymmetric Semi-Quantum Key Distribution (2020) (0)
- Comment on: Supervisory Asymmetric Deterministic Secure Quantum Communication (2012) (0)
- Fault tolerant authenticated quantum direct communication immune to collective noises (2013) (0)
- TWO-WAY QUANTUM-BIT-STRING COMMITMENT (2010) (0)
- A framework for one-round mobile agent transaction (2004) (0)
- Identity-based Hierarchical Designated Decryption (2010) (0)
- Multiparty controlled quantum secure direct communication based on quantum search algorithm (2013) (0)
- Blind Quantum Computation without Trusted Center (2015) (0)
- Multiparty quantum remote control (2013) (0)
- How to Thwart the Mafia Attack (1995) (0)
- Bell state entanglement swappings over collective noises and their applications on quantum cryptography (2012) (0)
- Comment on "An arbitrated quantum signature scheme with fast signing and verifying" (2015) (0)
- Improving the Security of ‘High-Capacity Quantum Summation with Single Photons in both Polarization and Spatial-Mode Degrees of Freedom’ (2019) (0)
- A ug 2 01 1 Quantum Secret Authentication Code (2021) (0)
- Two attacks and counterattacks on the mutual semi-quantum key agreement protocol using Bell states (2020) (0)
- Controlled probabilistic quantum key distribution using a ground state (2015) (0)
- Multi-party quantum secret sharing based on two special entangled states (2012) (0)
- Permutation attack and counterattack on the two-party quantum key agreement over a collective noisy channel (2020) (0)
- Modification Attack on QSDC with Authentication and the Improvement (2013) (0)
- CNOT extraction attack on “quantum asymmetric cryptography with symmetric keys” (2014) (0)
- Dynamic quantum secret sharing (2012) (0)
- ON THE SECURITY OF PARK ET AL.'S KEY DISTRIBUTION PROTOCOL FOR DIG ITA L M 0 BILE C 0 M M U N IC AT1 0 N S (1996) (0)
- On the Linkability of Some Group Signature Schemes (2003) (0)
- Thwarting intercept-and-resend attack on Zhang’s quantum secret sharing using collective rotation noises (2011) (0)
- Quantum Key Recycling can share key more efficient than BB84 (2020) (0)
- Double C-NOT Attack on a Single-State Semi-Quantum Key Distribution Protocol and Its Improvement (2020) (0)
- Comment on “A practical protocol for three-party authenticated quantum key distribution” (2017) (0)
- Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels (2013) (0)
- IA-CTR: Integrity-Aware Conventional Counter Mode for Secure and Efficient Communication in Wireless Sensor Networks (2015) (0)
- Comment on "Semiquantum secret sharing using entangled states" (2011) (0)
- Improved conference key distribution protocol based on a symmetric balanced incomplete block design (2004) (0)
- SECURITY WEAKNESSES ON A MUTUAL AUTHENTICATION AND KEY AGREEMENT SCHEME IN GLOBAL MOBILE NETWORKS (2014) (0)
- Improved “bidirectional quantum secure communication protocol based on a shared private Bell state” (2012) (0)
- Forgery attack on one-time proxy signature and the improvement (2014) (0)
- Comment on 'Multiparty Quantum Key Agreement with GHZ State' (2016) (0)
- Lightweight authenticated quantum key distribution protocols with key recycling (2021) (0)
- Deciphering the Secret Code in 'The Lady of Shalott' (2005) (0)
- Quantum Key Recycling with Optimal Key Recycling Rate based on Error Rate (2020) (0)
- Quantum authencryption: one-step authenticated quantum secure direct communications for off-line communicants (2013) (0)
- Intercept-Resend Attacks on Semi-quantum Secret Sharing and the Improvements (2012) (0)
- Yet another efficient access control for user hierarchy (1995) (0)
- Secure Unknown Quantum State Transmission Using GHZ Class State via Collective Noise Channel (2011) (0)
- Short Paper ( t , n ) Threshold Untraceable Signatures (0)
- New circular quantum secret sharing for remote agents (2012) (0)
- Probabilistic authenticated quantum dialogue (2015) (0)
- On the Controlled Cyclic Quantum Teleportation of an Arbitrary Two-Qubit Entangled State by Using a Ten-Qubit Entangled State (2019) (0)
- Remarks on Change-Buehrer access control scheme in a hierarchy (1997) (0)
- Authenticated Quantum Dialogue Based on Bell States (2014) (0)
- Fault-tolerant controlled deterministic secure quantum communication using EPR states against collective noise (2016) (0)
- Authenticated semi-quantum key distribution protocol using Bell states (2014) (0)
- An Improved Protocol for Controlled Deterministic Secure Quantum Communication Using Five-Qubit Entangled State (2018) (0)
- Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks (2015) (0)
- Secure Quantum Communication Scheme for Six-Qubit Decoherence-Free States (2018) (0)
- On the security of Chang et al. ‘s cryptographic key assignment scheme for access control in a hierarchy (1996) (0)
- Trojan Horse Attack Free Fault-Tolerant Quantum Key Distribution Protocols Using GHZ States (2016) (0)
- WITH HIGH INFORMATION RATES (1990) (0)
- DYNAMIC THRESHOLD SCHEME BASED ON THE DEFINITION OF CROSS-PRODUCT IN AN N-DIMENSIONAL LINEAR SPACE CHI-SUNG LAIH*, LEIN (2001) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Tzone-lih Hwang?
Tzone-lih Hwang is affiliated with the following schools: