共查询到19条相似文献,搜索用时 156 毫秒
1.
提出了一种网络多用户量子认证和密钥分配理论方案.类似于现代密码学中的网络认证体系结构提出了一种基于网络中用户与所属的可信服务器之间共享Einstein-Podolsky-Rosen(EPR)纠缠对进行身份认证和密钥分配的分布式客户机/服务器体系结构.基于该体系结构实现网络中任意用户之间的身份认证和密钥分配.可信服务器只提供用户的身份认证以及 交换粒子之间的纠缠使得两个想要秘密通信的用户的粒子纠缠起来.密钥的生成由发起请求 的用户自己完成.网络中的用户只需和所属的可信服务器共享EPR纠缠对通过经典信道和量子 信道与服务器通信.用户不需要互相共享EPR纠缠对,这使得网络中的EPR对的数量由O(n2)减小到O(n).
关键词:
量子认证
量子密钥分配
客户机/服务器
纠缠交换 相似文献
2.
3.
4.
量子保密通信包括量子密钥分发、量子安全直接通信和量子秘密共享等主要形式.在量子密钥分发和秘密共享中,传输的是随机数而不是信息,要再经过一次经典通信才能完成信息的传输.在量子信道直接传输信息的量子通信形式是量子安全直接通信.基于量子隐形传态的量子通信(简称量子隐形传态通信)是否属于量子安全直接通信尚需解释.构造了一个量子隐形传态通信方案,给出了具体的操作步骤.与一般的量子隐形传态不同,量子隐形传态通信所传输的量子态是计算基矢态,大大简化了贝尔基测量和单粒子操作.分析结果表明,量子隐形传态通信等价于包含了全用型量子密钥分发和经典通信的复合过程,不是量子安全直接通信,其传输受到中间介质和距离的影响,所以不比量子密钥分发更有优势.将该方案与量子密钥分发、量子安全直接通信和经典一次性便笺密码方案进行对比,通过几个通信参数的比较给出各个方案的特点,还特别讨论了各方案在空间量子通信方面的特点. 相似文献
5.
无认证中心的认证协议一般由通信双方相互认证.事先共享纠缠态或身份密钥,结构简单,但不适于扩展成通信网络.通过引入可信第三方认证中心,并利用三粒子W纠缠态的稳健性,提出了一个基于W态的身份认证协议,使得合法通信用户可以在认证中心的协助下进行安全身份认证,身份认证的同时即完成了纠缠粒子的分发.认证完成后,合法通信用户可安全共享EPR纠缠态并在第三方的控制下进行量子直传通信.针对窃听者常用攻击手段进行了安全性分析,结果表明在身份认证过程中可以有效的抵御伪装攻击,截取重发攻击与纠缠攻击等.基于第三方的通信结构具有可扩展性、实用性和受控性. 相似文献
6.
基于通信双方预先共享d维二粒子最大纠缠态非定域相关性,信息发送方Bob只需要向信息接收者Alice传送一个粒子,就可以传送logd22比特经典信息,为保护信息的安全,方案采用诱骗光子技术,安全性等价于改进后的原始量子密钥分配方案(Bennett-Brassard 1984,BB84).本文讨论了基于高维纯纠缠态超密编码方案.即通过引入一个附加量子比特,信息接收方对手中的纠缠粒子和附加粒子在执行相应的幺正演化,可以获取dαk2logd2+logd2(αk=minαj,j∈0,L,d-1)比特经典信息.通信双方采用诱骗光子技术确保量子信道的安全建立.与其他方案相比,该方案具有通信效率较高、实用性较强的优点. 相似文献
7.
针对量子安全直接通信中身份认证的需要,提出一种带双向身份认证的基于单光子和Bell态混合的量子安全直接通信方案.通信开始前通信双方共享一串秘密信息,先利用单光子来验证接收方的合法性,再利用Bell态粒子验证发送方的合法性,之后将Bell态粒子与单光子混合作为载体发送.每一次发送量子态时都加入窃听检测粒子,而一旦窃听者截获发送粒子,由于得到的是不完整的粒子,窃听者无法恢复原始信息,并且窃听行为会立刻被发现,从而终止通信.本方案中单光子和Bell态充得到分利用,且混合之后的通信能有效提高传输效率和编码容量以及量子比特利用率.安全性分析证明,本方案能抵御常见的外部攻击和内部攻击. 相似文献
8.
双向隐形传态方案及安全性分析 总被引:1,自引:1,他引:0
提出了一种用Bell纠缠态作为量子信道,实现双向隐形传态的方案.通信双方Alice、Bob事先共享二对Bell纠缠态,通信开始后,Alice、Bob分别对自己拥有的部分粒子作Bell基联合测量,并将测量结果通过经典信道告诉对方.Alice、Bob根据对方提供的测量结果,做相应的幺正变换,即在己方的粒子上,再现对方要传的量子态信息,从而实现双向传态的目的.为了提高量子双向隐形传态的安全性,加入第三方控制,分析表明,通过增加控制方的粒子数可以增加系统的安全性,但增加到一定数量后,将无助于量子信道安全性的提高. 相似文献
9.
10.
11.
In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication. The authentication key expansion method is introduced to improve the life of the keys with security. In the first scheme, the third party, called Trent is introduced to authenticate the users that participate in the communication. He sends the polarized photons in blocks toauthenticate communication parties Alice and Bob using the authentication keys. In the communication process, polarized single photons are used to serve as the carriers, which transmit the secret messages directly. The second QSDC process with authentication between two parties is also discussed. 相似文献
12.
In this paper an efficient quantum secure direct communication (QSDC) scheme with
authentication is presented, which is based on quantum entanglement and
polarized single photons. The present protocol uses Einstein--Podolsky--Rosen
(EPR) pairs and polarized
single photons in batches. A particle of the EPR pairs is retained
in the sender's station, and the other is transmitted forth and back
between the sender and the receiver, similar to the `ping--pong'
QSDC protocol. According to the shared information beforehand, these
two kinds of quantum states are mixed and then transmitted via a
quantum channel. The EPR pairs are used to transmit secret messages
and the polarized single photons used for authentication and
eavesdropping check. Consequently, because of the dual contributions
of the polarized single photons, no classical information is needed.
The intrinsic efficiency and total efficiency are both 1 in this
scheme as almost all of the instances are useful and each EPR pair
can be used to carry two bits of information. 相似文献
13.
Broadcast encryption allows the sender to securely distribute his/her
secret to a dynamically changing group of users over a broadcast
channel. In this paper, we just take account of a simple broadcast
communication task in quantum scenario, in which the central party
broadcasts his secret to multi-receiver via quantum channel. We
present three quantum broadcast communication schemes. The first
scheme utilizes entanglement swapping and
Greenberger--Horne--Zeilinger state to fulfil a task that the central
party broadcasts the secret to a group of receivers who share a group
key with him. In the second scheme, based on dense coding, the
central party broadcasts the secret to multi-receiver, each of which
shares an authentication key with him. The third scheme is a quantum
broadcast communication scheme with quantum encryption, in which the
central party can broadcast the secret to any subset of the legal
receivers. 相似文献
14.
Cryptanalysis of quantum broadcast communication and authentication protocol with a one-time pad 下载免费PDF全文
Chang et al.[Chin.Phys.623 010305(2014)]have proposed a quantum broadcast communication and authentication protocol.However,we find that an intercept-resend attack can be preformed successfully by a potential eavesdropper,who will be able to destroy the authentication function.Afterwards,he or she can acquire the secret transmitted message or even modify it while escaping detection,by implementing an efficient man-in-the-middle attack.Furthermore,we show a simple scheme to defend this attack,that is,applying non-reusable identity strings. 相似文献
15.
Recently, Yang et al. proposed a kind of quantum cryptographic schemes based on secret sharing. The main idea is drawn from the case, where any n participants who share a secret K can co-operate as K does. This process can be applied to encryption, authentication, signature and so on. Unfortunately, since there is no identity authentication of the share’s holder, these schemes inherit the limitation of secret sharing in practice. If some participants do not follow the protocol, the protocol would be a failu... 相似文献
16.
Economical multiparty simultaneous quantum identity authentication based on Greenberger--Horne--Zeilinger states 下载免费PDF全文
A multiparty simultaneous quantum identity authentication protocol
based on Greenberger--Horne--Zeilinger (GHZ) states is proposed. The
multi-user can be authenticated by a trusted third party (TTP)
simultaneously. Compared with the scheme proposed recently (Wang
et al 2006, Chin. Phys. Lett. 23(9) 2360), the
proposed scheme has the advantages of consuming fewer quantum and
classical resources and lessening the difficulty and intensity of
necessary operations. 相似文献
17.
A multiple multi-qubit quantum states sharing scheme is proposed,in which the dealer can share multiple multi-qubit quantum states among the participants through only one distribution and one recovery.The dealer encodes the secret quantum states into a special entangled state,and then distributes the particles of the entangled state to the participants.The participants perform the single-particle measurements on their particles,and can cooperate to recover the multiple multi-qubit quantum states.Compared to the existing schemes,our scheme is more efficient and more flexible in practice. 相似文献
18.
19.
Ahmed Farouk J. Batle M. Elhoseny Mosayeb Naseri Muzaffar Lone Alex Fedorov Majid Alkhambashi Syed Hassan Ahmed M. Abdel-Aty 《Frontiers of Physics》2018,13(2):130306
Quantum communication provides an enormous advantage over its classical counterpart: security of communications based on the very principles of quantum mechanics. Researchers have proposed several approaches for user identity authentication via entanglement. Unfortunately, these protocols fail because an attacker can capture some of the particles in a transmitted sequence and send what is left to the receiver through a quantum channel. Subsequently, the attacker can restore some of the confidential messages, giving rise to the possibility of information leakage. Here we present a new robust General Nuser authentication protocol based on N-particle Greenberger–Horne–Zeilinger (GHZ) states, which makes eavesdropping detection more effective and secure, as compared to some current authentication protocols. The security analysis of our protocol for various kinds of attacks verifies that it is unconditionally secure, and that an attacker will not obtain any information about the transmitted key. Moreover, as the number of transferred key bits N becomes larger, while the number of users for transmitting the information is increased, the probability of effectively obtaining the transmitted authentication keys is reduced to zero. 相似文献