热点话题人物,欢迎提交收录!
最优雅的名人百科,欢迎向我们提交收录。
李琴
2023-05-15 21:37
  • 李琴
  • 李琴 - 教授 博导-湘潭大学-计算机学院 网络空间安全学院-个人资料

近期热点

资料介绍

个人简历


2001.9-2005.7 湖南师范大学,计算机科学与技术,工学学士\r
2005.9-2010.7 中山大学, 计算机软件与理论,工学博士\r
2010.7-2012.11 湘潭大学,信息工程学院,讲师\r
2012.12-2018.12 湘潭大学,信息工程学院,副教授 \r
2019.1-2019.12 湘潭大学,信息工程学院,教授\r
2020.1-至今 湘潭大学,计算机学院·网络空间安全学院,教授

研究领域


""量子计算、量子密码、经典密码及信息安全相关研究。欢迎对信息安全或量子计算感兴趣的同学加入,学过信息安全相关课程或者熟练Python者优先。目前团队成员凝聚力强,学习氛围非常好,升学与就业都表现出色""""

近期论文


Qin Li, W. H. Chan, D. Y. Long, “Arbitrated quantum signature using Bell states,” Physical Review A, vol. 79, no. 5, art. no. 054307, 2009. \r
\r
Qin Li, R. G. Du, D. Y. Long, C. J. Wang, W. H. Chan, “Entanglement enhances the security of arbitrated quantum signature,” International Journal of Quantum Information, vol. 7, no. 5, pp. 913-925, 2009. \r
\r
Qin Li, W. H. Chan, Dong-Yang Long, “Semi-quantum secret sharing using entangled states.,” Physical Review A, vol. 82, no. 2, art. no. 022303, 2010. \r
\r
Qin Li, D. Y. Long, W. H. Chan, D. W. Qiu, “Sharing a quantum secret without a trusted party,” Quantum Information Processing, vol.10, no. 1, pp. 97-106, 2011.\r
\r
Qin Li, C. Q. Li, D. Y Long, W. H. Chan, C. H. Wu, “On the impossibility of non-static quantum bit commitment between two parties,” Quantum Information Processing, vol. 11, no. 2, pp. 519-527, 2012.\r
\r
Qin Li, C. Q. Li, Z. H. Wen, W. Z. Zhao, W. H. Chan, “On the security of arbitrated quantum signature schemes,” Journal of Physics A: Mathematical and Theoretical, vol 46, no. 1, art. no. 015307, 2013.\r
\r
Qin Li, C. Q. Li, D. Y. Long, W. H. Chan, C. J. Wang, “Efficient arbitrated quantum signature and its proof of security,” Quantum Information Processing, vol. 12, no. 7, pp. 2427-2439, 2013.\r
\r
Qin Li, W. H. Chan, C. H. Wu, Z. H. Wen, “On the existence of quantum signature for quantum messages,” International Journal of Theoretical Physics. vol. 52, no. 12, pp. 4335-4341, 2013.\r
\r
Qin Li, W. H. Chan, C. H. Wu, Z. H. Wen, “Triple-server blind quantum computation using entanglement swapping.,” Physical Review A, vol. 89, no. 4, art. no. 040302(R), 2014.\r
\r
Qin Li, Wai Hong Chan, Shengyu Zhang, “Semiquantum key distribution with secure delegated quantum computation,” Scientific Reports, vol. 6, art. no.19898, 2016.\r
\r
X. Kong, Qin Li*, C. Wu, F. Yu, J He, Z. Sun, “Multiple-server Flexible Blind Quantum Computation in Networks,” International Journal of Theoretical Physics, vol. 55, vol. 6, pp. 3001-3007, 2016\r
\r
Qin Li, Z. Li, W.H. Chan, S. Zhang, C. Liu, “Blind quantum computation with identity authentication”, Physics Letter A, vol. 382, no. 14, pp. 938-941, 2018.\r
\r
J. He, Qin Li*, C. Wu, W.H. Chan, S. Zhang, “Measurement-device-independent semiquantum key distribution”, International Journal of Quantum Information, vol. 16, no. 1, art. no. 1850012, 2018 \r
\r
Z. Sun, Qin Li*, F. Yu, W. H. Chan, “Application of Blind Quantum Computation to Two-Party Quantum Computation”, International Journal of Theoretical Physics, vol. 57, no. 6, pp. 1864–1871, 2018 \r
\r
Y. Zhu, Qin Li*, C. Liu, Z. Sun, Y. Peng, D. Shen, “Secure two-party computation based on blind quantum computation”, International Journal of Theoretical Physics, vol. 59, no. 7, pp. 2074–2082, 2020 \r
\r
J. Quan, Qin Li*, C. Liu, J. Shi, Y. Peng, “A simplified verifiable blind quantum computing protocol with quantum input verification”, Quantum Engineering, vol. 3, no. 1, art. no. e58, 2021

相关热点

扫码添加好友