首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 375 毫秒
1.
Recently, Wang et al. proposed a three-party simultaneous quantum secure direct communication (3P-SQSDC) scheme with EPR pairs, which enables three involved parties to exchange their secret messages simultaneously by using an EPR pair. This work proposed an enhancement on Wang et al.'s scheme. With the enhancement, the communications in the improved 3P-SQSDC can be paralleled and thus improves the protocol efficiency.  相似文献   

2.
Enhanced Multiparty Controlled QSDC Using GHZ State   总被引:1,自引:0,他引:1  
Recently, Gao et al. [Opt. Commun. 283 (2010) 192] pointed out that Wang et al.'s multiparty controlled quantum secure directcommunication (CQSDC) protocol [Opt. Commun. 266 (2006)732] has the information leakage problem and proposed an improvedprotocol. However, in the improved protocol, due to the introductionof an additional random sampling to avoid the weakness, the qubitefficiency is decreased. By introducing the base changing techniqueto the random sampling in Wang et al.'s protocol, this study overcomesthe information leakage problem and provides a better qubit efficiency.  相似文献   

3.
Recently, Chong et al. [Opt. Comm. 284, (2011) 893-895] pointed out that a dishonest party in Yang and Wen's arbitrated quantum signature scheme [Opt. Comm. 283, (2010) 3198-3201] is able to reveal the other party's secret key without being detected by using the Trojan-horse attacks. However, the solution to avoid the attack still remains open. This work further points out that in Yang and Wen's scheme, the arbitrator is unable to arbitrate the dispute between two users. Consequently, a user can deny that he/she has signed or verified a signature without performing a Trojan-horse attack. A solution is proposed to solve this problem as well as the open problem mentioned earlier.  相似文献   

4.
Jason Lin 《Optics Communications》2011,284(5):1468-1471
Recently, Shi et al. proposed a multiparty quantum secret sharing (QSS) using Bell states and Bell measurements. In their protocol, for sharing two classical bits, all parties have to possess two photons after entanglement swapping. This paper proposes an enhancement of Shi et al.'s protocol. Based on the idea that all parties (except dealer) possess two photons to share two classical bits, the qubit efficiency has further improved by removing the photons the dealer has to hold in Shi et al.'s protocol. Moreover, an insider attack is also prevented in the proposed scheme.  相似文献   

5.
A scheme of multiparty quantum secret sharing of classical messages (QSSCM) [Z.J. Zhang et al., Opt. Commun. 269 (2007) 418] was proposed. Lin et al. [S. Lin et al., Opt. Commun. 281 (2008) 4553] showed the last agent can obtain half of the secret in Z.J. Zhang's et al. three-party QSSCM scheme and gave an improved version. We further show the first agent and the last agent can obtain all the secret without introducing any error in Zhang's et al. multiparty QSSCM scheme by a special attack with quantum teleportation. We also present an improved version.  相似文献   

6.
Lin et al. [Song Lin, Fei Gao, Qiao-yan Wen, Fu-chen Zhu, Opt. Commun. 281 (2008) 4553] pointed out that the multiparty quantum secret sharing protocol [Zhan-jun Zhang, Gan Gao, Xin Wang, Lian-fang Han, Shou-hua Shi, Opt. Commun. 269 (2007) 418] is not secure and proposed an improved three-party quantum secret sharing protocol. In this paper, we study the security of the improved three-party quantum secret sharing protocol and find that it is still not secure. Finally, a further improved three-party quantum secret sharing protocol is proposed.  相似文献   

7.
Recently, Wang et al. introduced a novel (2, n) scalable secret image sharing (SSIS) scheme, which can gradually reconstruct a secret image in a scalable manner in which the amount of secret information is proportional to the number of participants. However, Wang et al.’s scheme is only a simple 2-out-of-n case. In this paper, we consider (k, n)-SSIS schemes where a qualified set of participants consists of any k participants. We provide two approaches for a general construction for any k, 2 ? k ? n. For the special case k = 2, Approach 1 has the lesser shadow size than Wang et al.’s (2, n)-SSIS scheme, and Approach 2 is reduced to Wang et al.’s (2, n)-SSIS scheme. Although the authors claim that Wang et al.’s (2, n)-SSIS scheme can be easily extended to a general (k, n)-SISS scheme, actually the extension is not that easy as they claimed. For the completeness of describing the constructions and properties of a general (k, n)-SSIS scheme, both approaches are introduced in this paper.  相似文献   

8.
In this paper [Commun. Theor. Phys. 53(2010) 648], Zhan et al. proposed a quantum dialogue protocol by using non-symmetric quantum channel. We study the security of the protocol and find that it has the drawback of information leakage. That is, Zhan et al.'s protocol is proved to be insecure by us.  相似文献   

9.
Zairong Xi  Guangsheng Jin 《Physica A》2008,387(4):1056-1062
Brańczyk et al. pointed out that the quantum control scheme is superior to the classical control scheme for a simple quantum system using simulation [A.M. Brańczyk, P.E.M.F. Mendonca, A. Gilchrist, A.C. Doherty, S.D. Barlett, Quantum control theory of a single qubit, Physical Review A 75 (2007) 012329 or arXiv e-print quant-ph/0608037]. Here we rigorously prove the result. Furthermore we will show that any quantum operation does not universally “correct” the dephasing noise.  相似文献   

10.
Recently, Shi et al. proposed a multiparty quantum secret sharing (QSS) using Bell states and Bell measurements. This study shows that their scheme has a pitfall that could be mounted to a collusion attack if precaution has not been taken in implementation. That is, two dishonest agents can collude to reveal the secret without the help of the others. A possible solution is also presented to avoid the attack.  相似文献   

11.
This study points out that a malicious gateway in Hong et al.'s multi-user quantum key distribution protocol [Optics Communication 283 (2010) 2644] may be able to reveal the secret key of the protocol without being detected. An improvement is suggested to avoid the weakness.  相似文献   

12.
Bit commitment protocols, whose security is based on the laws of quantum mechanics alone, are generally held to be impossible on the basis of a concealment–bindingness tradeoff (Lo and Chau, 1997 [1], Mayers, 1997 [2]). A strengthened and explicit impossibility proof has been given in D?Ariano et al. (2007) [3] in the Heisenberg picture and in a C?C?-algebraic framework, considering all conceivable protocols in which both classical and quantum information is exchanged. In the present Letter we provide a new impossibility proof in the Schrödinger picture, greatly simplifying the classification of protocols and strategies using the mathematical formulation in terms of quantum combs (Chiribella et al., 2008 [4]), with each single-party strategy represented by a conditioned comb. We prove that assuming a stronger notion of concealment—for each classical communication history, not in average—allows Alice?s cheat to pass also the worst-case Bob?s test. The present approach allows us to restate the concealment–bindingness tradeoff in terms of the continuity of dilations of probabilistic quantum combs with the metric given by the comb discriminability-distance.  相似文献   

13.
Most of the existing Quantum Private Queries (QPQ) protocols provide only single-bit queries service, thus have to be repeated several times when more bits are retrieved. Wei et al.'s scheme for block queries requires a high-dimension quantum key distribution system to sustain, which is still restricted in the laboratory. Here, based on Markus Jakobi et al.'s single-bit QPQ protocol, we propose a multi-bit quantum private query protocol, in which the user can get access to several bits within one single query. We also extend the proposed protocol to block queries, using a binary matrix to guard database security. Analysis in this paper shows that our protocol has better communication complexity, implementability and can achieve a considerable level of security.  相似文献   

14.
Most of the existing Quantum Private Queries(QPQ) protocols provide only single-bit queries service,thus have to be repeated several times when more bits are retrieved. Wei et al.'s scheme for block queries requires a high-dimension quantum key distribution system to sustain, which is still restricted in the laboratory. Here, based on Markus Jakobi et al.'s single-bit QPQ protocol, we propose a multi-bit quantum private query protocol, in which the user can get access to several bits within one single query. We also extend the proposed protocol to block queries, using a binary matrix to guard database security. Analysis in this paper shows that our protocol has better communication complexity, implementability and can achieve a considerable level of security.  相似文献   

15.
《Physics letters. A》2014,378(11-12):863-868
Two-way Quantum Key Distribution (QKD) schemes commonly make use of a set of unitaries corresponding to binary encodings which can in principle be distinguished perfectly. In this paper, inline with the proposal in Chiribella et al. (2008) [13], we introduce a non-entangled two-way QKD scheme with two sets of unitaries of which the elements in one set can be viewed as ‘nonorthogonal’ to elements in the other with the aim of naturally suppressing an eavesdropper's information to provide for a higher security threshold. Security analysis is done in the context of individual attack strategies for a quick comparison with the conventional two-way QKD scheme. Given the richer structure of the improvement, future direction is also discussed.  相似文献   

16.
Color constancy (Toet and Franken, 2003 [2]; Toet, 2003 [7]) and color contrast (Scribner et al., 2000 [21]; Lee et al., 2005 [23]) are two important topics for color image fusion. The paper focuses on the low color contrast problem of linear fusion algorithms with color transfer method. Color transfer technology is popular in infrared (IR) and visible image fusion to give the fused image a natural day-time color appearance (Toet, 2003 [7]; Wang et al., 2007 [8]; Zheng and Essock, 2008 [9]). However, in the color transfer step, all three channels of the color space are processed with the same linear mapping without color enhancement, resulting in low color contrast between the target and the background (Wang et al., 2007 [8]). Based on the characteristics of the IR image, we introduce a ratio of local to global divergence of the IR image to improve the color contrast. The enhancement ratios for both hot and cold targets are larger than one, while it tends to one for the background. As a result, the proposed method pops out both hot and cold targets in color, where hot targets will appear intense red, and cold targets will appear cyan. Subjective results show visible color contrast enhancement effects. Target detection experiments through hue and saturation components of the fused image show an improvement in the hit rate for target detection, owing to larger color distance between the target and the background.  相似文献   

17.
The crucial issue of quantum communication protocol is its security. In this paper, we show that in secure quantum telephone protocol proposed by Wen et al. [X. Wen et al., Opt. Commun. 275 (2007) 278-282] the dishonest server can obtain full information of the communication with zero risk of being detected.  相似文献   

18.
The goal of this paper is to generalize the well-balanced approach for non-equilibrium flow studied by Wang et al. (2009) [29] to a class of low dissipative high-order shock-capturing filter schemes and to explore more advantages of well-balanced schemes in reacting flows. More general 1D and 2D reacting flow models and new examples of shock turbulence interactions are provided to demonstrate the advantage of well-balanced schemes. The class of filter schemes developed by Yee et al. (1999) [33], Sjögreen and Yee (2004) [27] and Yee and Sjögreen (2007) [38] consist of two steps, a full time step of spatially high-order non-dissipative base scheme and an adaptive non-linear filter containing shock-capturing dissipation. A good property of the filter scheme is that the base scheme and the filter are stand-alone modules in designing. Therefore, the idea of designing a well-balanced filter scheme is straightforward, i.e. choosing a well-balanced base scheme with a well-balanced filter (both with high-order accuracy). A typical class of these schemes shown in this paper is the high-order central difference schemes/predictor–corrector (PC) schemes with a high-order well-balanced WENO filter. The new filter scheme with the well-balanced property will gather the features of both filter methods and well-balanced properties: it can preserve certain steady-state solutions exactly; it is able to capture small perturbations, e.g. turbulence fluctuations; and it adaptively controls numerical dissipation. Thus it shows high accuracy, efficiency and stability in shock/turbulence interactions. Numerical examples containing 1D and 2D smooth problems, 1D stationary contact discontinuity problem and 1D turbulence/shock interactions are included to verify the improved accuracy, in addition to the well-balanced behavior.  相似文献   

19.
A novel efficient deterministic secure quantum communication scheme based on four-qubit cluster states and single-photon identity authentication is proposed. In this scheme, the two authenticated users can transmit two bits of classical information per cluster state, and its efficiency of the quantum communication is 1/3, which is approximately 1.67 times that of the previous protocol presented by Wang et al [Chin. Phys. Lett. 23 (2006) 2658]. Security analysis shows the present scheme is secure against intercept-resend attack and the impersonator's attack. Furthermore, it is more economic with present-day techniques and easily processed by a one-way quantum computer.  相似文献   

20.
《中国物理 B》2021,30(10):100303-100303
Recently, measurement-device-independent quantum secure direct communication schemes were proposed by Niu et al. [Sci. Bull. 63 1345(2018)] and Zhou et al. [Sci. China-Phys. Mech. Astron. 63 230362(2020)]. Inspired by their ideas,in this paper, a measurement-device-independent quantum dialogue protocol based on entanglement is designed and proven to be secure. The advantage of this scheme is that it can not only allow two communicators to transmit secret messages between each other, making the application scenarios more extensive, but can also eliminate all the security loopholes related to the measurement device and information leakage. In terms of experimental implementation, the scheme mainly involves the preparation of entangled states, the preparation of single photons, quantum storage, Bell measurement and other technologies, all of which are mature at present, therefore, the scheme is feasible by using current technologies.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号