首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
远程认证协议能有效的保证远程用户和服务器在公共网络上的通信安全。提出一种匿名的安全身份认证方案,通过登录 的动态变化,提供用户登录的匿名性,通过用户和服务器相互验证建立共享的会话密钥,抵抗重放攻击和中间人攻击,实现用户安全和隐私,通过BAN逻辑分析证明改进方案的有效性,通过安全性证明和性能分析说明了新协议比同类型的方案具有更高的安全性、高效性。  相似文献   

2.
基于W态的跨中心量子网络身份认证方案   总被引:1,自引:1,他引:0  
利用量子隐形传态原理和量子纠缠交换技术,提出了基于W态的跨中心量子网络身份认证方案,实现了分布式量子通信网络中对客户的身份认证.该方案分为注册阶段和身份认证阶段,认证系统包括主服务器和客户端服务器.客户所有的操作都在客户端服务器上进行,不直接与主服务器进行通信.身份认证全部由服务器根据量子力学原理进行,保证了认证方案的安全性.最后,对该方案进行了安全性分析.  相似文献   

3.
李渊华  刘俊昌  聂义友 《光子学报》2014,39(9):1616-1620
利用量子隐形传态原理和量子纠缠交换技术,提出了基于W态的跨中心量子网络身份认证方案,实现了分布式量子通信网络中对客户的身份认证.该方案分为注册阶段和身份认证阶段,认证系统包括主服务器和客户端服务器.客户所有的操作都在客户端服务器上进行,不直接与主服务器进行通信.身份认证全部由服务器根据量子力学原理进行,保证了认证方案的安全性.最后,对该方案进行了安全性分析.  相似文献   

4.
无认证中心的认证协议一般由通信双方相互认证.事先共享纠缠态或身份密钥,结构简单,但不适于扩展成通信网络.通过引入可信第三方认证中心,并利用三粒子W纠缠态的稳健性,提出了一个基于W态的身份认证协议,使得合法通信用户可以在认证中心的协助下进行安全身份认证,身份认证的同时即完成了纠缠粒子的分发.认证完成后,合法通信用户可安全共享EPR纠缠态并在第三方的控制下进行量子直传通信.针对窃听者常用攻击手段进行了安全性分析,结果表明在身份认证过程中可以有效的抵御伪装攻击,截取重发攻击与纠缠攻击等.基于第三方的通信结构具有可扩展性、实用性和受控性.  相似文献   

5.
一种网络多用户量子认证和密钥分配理论方案   总被引:4,自引:0,他引:4       下载免费PDF全文
杨宇光  温巧燕  朱甫臣 《物理学报》2005,54(9):3995-3999
提出了一种网络多用户量子认证和密钥分配理论方案.类似于现代密码学中的网络认证体系结构提出了一种基于网络中用户与所属的可信服务器之间共享Einstein-Podolsky-Rosen(EPR)纠缠对进行身份认证和密钥分配的分布式客户机/服务器体系结构.基于该体系结构实现网络中任意用户之间的身份认证和密钥分配.可信服务器只提供用户的身份认证以及 交换粒子之间的纠缠使得两个想要秘密通信的用户的粒子纠缠起来.密钥的生成由发起请求 的用户自己完成.网络中的用户只需和所属的可信服务器共享EPR纠缠对通过经典信道和量子 信道与服务器通信.用户不需要互相共享EPR纠缠对,这使得网络中的EPR对的数量由O(n2)减小到O(n). 关键词: 量子认证 量子密钥分配 客户机/服务器 纠缠交换  相似文献   

6.
具有双向认证功能的量子秘密共享方案   总被引:3,自引:0,他引:3       下载免费PDF全文
利用两粒子纠缠态作为经典信息的载体,结合Hash函数和量子本地操作提出了一种可以实现双向认证功能的量子秘密共享方案,并且分析了它的安全性. 这种方案的安全性基于秘密共享双方的认证密钥和传输过程中粒子排列次序的保密. 若不考虑认证和窃听检测所消耗的粒子,平均1个Bell态共享2 bit经典信息. 关键词: 量子秘密共享 认证密钥 量子双向认证 两粒子量子纠缠  相似文献   

7.
基于网络的量子身份认证方案   总被引:1,自引:0,他引:1  
根据通信网络规模的大小,提出了两个身份认证方案,一种是直接认证,一种是基于认证服务器的认证.方案的实施过程中采用一种动态方式,即合法通信者之间每次可动态获得一个新的认证密钥.所提方案易于实现,具有可证明安全性,安全性由量子不可克隆性和方案本身的动态特性保证.  相似文献   

8.
何文奇  彭翔  孟祥锋  刘晓利 《物理学报》2013,62(6):64205-064205
提出一种基于双光束干涉的分级身份认证方法. 本方法通过同时验证用户的"口令"和"相位钥"以实现对用户身份的双重安全认证. 它不仅可以判断某个用户是否合法, 还能鉴别出其相应的身份级别, 从而确定并授予其相应的系统访问权限. 认证过程的核心功能组件是一个基于干涉的光学装置, 用户"口令" 控制的"相位锁" 和用户携带的"相位钥" 被分别加载至此装置中的两个空间光调制器(spatial light modulator, SLM), 两束相干光分别经过这两个SLMs的调制后, 在输出面得到一幅干涉图, 它被传送至计算机并与系统数据库中的"认证图像" 进行匹配, 以完成身份的鉴别. 系统的设计则是一个逆向的迭代求解问题, 本文根据事先给定的某个用户的身份级别(对应着某个认证图像)和随机给定的 "相位锁", 利用一种修正的相位恢复算法确定出其对应的"相位钥". 理论分析和仿真实验都证明了此方案是可行而有效的. 关键词: 干涉 傅里叶光学 相位恢复 身份认证  相似文献   

9.
基于扩展混沌映射的认证密钥协商协议   总被引:2,自引:0,他引:2       下载免费PDF全文
舒剑 《物理学报》2014,63(5):50507-050507
近年来,基于混沌映射和智能卡的认证密钥协商协议被相继提出.然而,防篡改读卡器使得这类协议的实现成本较高并且很难在实际中广泛应用.另外,基于混沌映射的数字签名方案需要很高的计算资源,这使得依赖签名方案的公钥发布存在安全问题.据此,本文基于扩展混沌映射提出一种新的无智能卡的认证密钥协商协议.新协议消除了公钥发布过程.安全和性能分析表明,新协议能抵抗各类攻击并且计算复杂度较低.因此,新协议更适合在实际环境中应用.  相似文献   

10.
针对量子安全直接通信中身份认证的需要,提出一种带双向身份认证的基于单光子和Bell态混合的量子安全直接通信方案.通信开始前通信双方共享一串秘密信息,先利用单光子来验证接收方的合法性,再利用Bell态粒子验证发送方的合法性,之后将Bell态粒子与单光子混合作为载体发送.每一次发送量子态时都加入窃听检测粒子,而一旦窃听者截获发送粒子,由于得到的是不完整的粒子,窃听者无法恢复原始信息,并且窃听行为会立刻被发现,从而终止通信.本方案中单光子和Bell态充得到分利用,且混合之后的通信能有效提高传输效率和编码容量以及量子比特利用率.安全性分析证明,本方案能抵御常见的外部攻击和内部攻击.  相似文献   

11.
International Journal of Theoretical Physics - Identity authentication is an important method to realize information protection in communication. This paper proposes a semi-quantum mutual identity...  相似文献   

12.
By using GHZ-like states and entanglement swapping, Kang et al. [Chin. Phys. B 24(2015) 090306]proposed a controlled mutual quantum entity authentication protocol. We find that the proposed protocol is not secure,that is, the center, Charlie can eavesdrop the secret keys shared between Alice and Bob without being detected.  相似文献   

13.

In this paper, we propose a new theoretical scheme for quantum secure direct communication (QSDC) with user authentication. Different from the previous QSDC protocols, the present protocol uses only one orthogonal basis of single-qubit states to encode the secret message. Moreover, this is a one-time and one-way communication protocol, which uses qubits prepared in a randomly chosen arbitrary basis, to transmit the secret message. We discuss the security of the proposed protocol against some common attacks and show that no eavesdropper can get any information from the quantum and classical channels. We have also studied the performance of this protocol under realistic device noise. We have executed the protocol in IBMQ Armonk device and proposed a repetition code based protection scheme that requires minimal overhead.

  相似文献   

14.

In this paper, we proposed two semi-quantum direct communication protocols based on Bell states. By pre-sharing two secret keys between two communicants, Alice with the advanced quantum ability can transmit secret messages to the classical Bob who can only perform the limited classical operations. At the same time, both sides of the communication can comfirm the legitimacy of each other’s identity. Security and qubit efficency analysis have been given. The analysis results show that the two protocols can resistant to several well-known attacks and their qubit efficency is higher than some current protocols.

  相似文献   

15.

In this paper, we propose a scheme of quantum operation teleportation (QOT) utilizing local operations and five-qubit entangled state to achieve mutual authentication and key agreement for two clients in different realms. On the one hand, the scheme not only has the characteristics of the arbitrariness of the relevant operation, the certainty of sharing success and the constancy of entangled resources, but also realizes the mutual authentication among the four parties, ensuring the reliability and security of the task. On the other hand, considering the complexity of the operation, we complete the current QOT task as a whole, so the operation difficulty is low and relatively simple. In summary, our analysis is completely feasible under the existing technical conditions and this proposed scheme has practical significance.

  相似文献   

16.
Magnetic nanowires (MNWs) have been shown to be promising candidates for nanobarcoding and biolabeling over decades. However, surprisingly, they have never been realized successfully for these applications due to the lack of a reliable encoding strategy that allows reliable decoding of readout signatures. Here, a novel encoding/decoding approach is reported by tailoring the MNWs remanence spectrum that makes decoding the magnetic nanobarcodes feasible even though there is no prior knowledge regarding the readout remanence spectrum. The remanence spectra of several MNWs is tuned by varying their composition, dimensions, and arrangements to generate several distinct nanobarcodes. Furthermore, a simple automated decoding algorithm is illustrated to identify and verify the type and number of MNWs in unknown remanence spectra. The experimental and analytical approaches show that the remanence spectrum is a strong probe for reliable encoding/decoding because it employs three authentication factors that significantly enhance their security performance in nanobarcoding and biolabeling.  相似文献   

17.
We study a generalized double Jaynes–Cummings (JC) model where two entangled pairs of two-level atoms interact indirectly. We show that there exist initial states of the qubit system so that two entangled pairs are available at all times. In particular, the minimum entanglement in the pairs as a function of the initial state is studied. Finally, we extend our findings to a model consisting of multi-mode atom–cavity interactions. We use a non-Markovian quantum state diffusion (QSD) equation to obtain the steady-state density matrix for the qubits. We show that the multi-mode model also displays dynamical preservation of entanglement.  相似文献   

18.
Kondratyev  B. P.  Kornoukhov  V. S. 《Technical Physics》2019,64(10):1395-1399
Technical Physics - A problem of mutual potential energy of two elliptical gravitating (or electrostatically charged) Gaussian rings is formulated and solved. The rings are coplanar, and their...  相似文献   

19.
A simpler approach to the characterization of vanishing conditional mutual information is presented. Some remarks are given as well. More specifically, relating the conditional mutual information to a commutator is a very promising approach towards the approximate version of SSA. That is, it is conjectured that small conditional mutual information implies small perturbation of quantum Markov chain.  相似文献   

20.
Radiophysics and Quantum Electronics -  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号