共查询到20条相似文献,搜索用时 996 毫秒
1.
利用两粒子纠缠态作为经典信息的载体,结合Hash函数和量子本地操作提出了一种可以实现双向认证功能的量子秘密共享方案,并且分析了它的安全性. 这种方案的安全性基于秘密共享双方的认证密钥和传输过程中粒子排列次序的保密. 若不考虑认证和窃听检测所消耗的粒子,平均1个Bell态共享2 bit经典信息.
关键词:
量子秘密共享
认证密钥
量子双向认证
两粒子量子纠缠 相似文献
2.
针对现有量子信息直传协议在有噪音量子信道下传输效率低及可靠性差的问题,提出了一种有效利用纠缠资源的量子安全直传通信方案.通过收发双方共享纠缠粒子作为辅助比特,采用纠缠辅助量子低密度校验码对量子态信息进行前向纠错保护,以提高系统在噪音环境下的传输可靠性.同时采用自动请求重传策略对量子态信息进行检错编码保护,当因窃听或强噪... 相似文献
3.
4.
可控量子秘密共享协议窃听检测虚警概率分析 总被引:2,自引:2,他引:0
对孙莹等提出的利用Greenberger-Horne-Zeilinger态实现的可控量子秘密共享协议Alice-Bob信道和Alice-Charlie信道窃听检测的虚警概率进行分析,指出该协议窃听检测虚警概率不为0的原因在于窃听检测测量基选择的随机性.然后,提出一种改进的利用Greenberger-HorneZeilinger态实现的可控量子秘密共享协议,以确定性的方式选择窃听检测的测量基.理论分析表明,改进的利用Greenberger-Horne-Zeilinger态实现的可控量子秘密共享协议不仅能够以原协议2倍的概率发现任何一个内部不可信方,从而具有更高的安全性,而且窃听检测虚警概率达到0. 相似文献
5.
针对现有量子信息直传协议在有噪音量子信道下传输效率低及可靠性差的问题,提出了一种有效利用纠缠资源的量子安全直传通信方案.通过收发双方共享纠缠粒子作为辅助比特,采用纠缠辅助量子低密度校验码对量子态信息进行前向纠错保护,以提高系统在噪音环境下的传输可靠性.同时采用自动请求重传策略对量子态信息进行检错编码保护,当因窃听或强噪音导致译码获得的信息不正确时,则请求发端对该组信息进行编码重传操作.文中对所选用纠缠辅助量子低密度校验码在量子退极化噪音信道下的迭代译码性能进行了仿真,最后对方案的安全性进行了分析论证. 相似文献
6.
利用N粒子纠缠态的量子秘密共享 总被引:2,自引:1,他引:1
为了高效实现多方之间的量子秘密共享,引入了一种纠缠度较高的N粒子纠缠态,并提出了利用该N粒子纠缠态在一方与(N-1)方之间形成共享秘密位串的方案.该方案在建立秘密位串的过程中,Alice对发送的粒子随机选择么正操作I和σx,并选择一部分粒子用于检测信道的安全;之后Alice根据(N-1)方选择的操作又选择了一部分粒子用于对参与者诚实度检测及信道安全检测.通过多次对窃听者的检测,很好地保证了信道的安全性及产生的秘密位串的可用性.最终在Alice及另外(N-1)方之间可形成n[1-(N-1)/2N-1]/6个共享秘密位. 相似文献
7.
针对量子安全直接通信中身份认证的需要,提出一种带双向身份认证的基于单光子和Bell态混合的量子安全直接通信方案.通信开始前通信双方共享一串秘密信息,先利用单光子来验证接收方的合法性,再利用Bell态粒子验证发送方的合法性,之后将Bell态粒子与单光子混合作为载体发送.每一次发送量子态时都加入窃听检测粒子,而一旦窃听者截获发送粒子,由于得到的是不完整的粒子,窃听者无法恢复原始信息,并且窃听行为会立刻被发现,从而终止通信.本方案中单光子和Bell态充得到分利用,且混合之后的通信能有效提高传输效率和编码容量以及量子比特利用率.安全性分析证明,本方案能抵御常见的外部攻击和内部攻击. 相似文献
8.
9.
为了高效实现多方之间的量子秘密共享,引入了一种纠缠度较高的N粒子纠缠态,并提出了利用该N粒子纠缠态在一方与(N-1)方之间形成共享秘密位串的方案.该方案在建立秘密位串的过程中,Alice对发送的粒子随机选择么正操作I和σx,并选择一部分粒子用于检测信道的安全|之后Alice根据(N-1)方选择的操作又选择了一部分粒子用于对参与者诚实度检测及信道安全检测.通过多次对窃听者的检测,很好地保证了信道的安全性及产生的秘密位串的可用性.最终在Alice及另外(N-1)方之间可形成n[1-(N-1)/2 N-1]/6个共享秘密位. 相似文献
10.
11.
Proof of the insecurity of quantum secret sharing based on the Smolin bound entangled states 下载免费PDF全文
This paper reconsiders carefully the possibility of using the
Smolin bound entangled states as the carrier for sharing quantum
secret. It finds that the process of quantum secret sharing based on
Smolin states has insecurity though the Smolin state was reported to
violate maximally the two-setting Bell-inequality. The general proof
is given. 相似文献
12.
提出基于腔QED技术的多用户间的多原子W态和GHZ态量子信道的建立方案.在量子网络的空闲时段,各个用户和量子交换机共享EPR对.量子交换机通过原子和腔场的相互作用将两个EPR对制备成W态,再与另一个EPR对进行纠缠交换,经过直接测量后为用户建立三原子W态量子信道;同时讨论了四用户间的W态量子信道的建立方案.量子交换机对三个EPR对进行纠缠交换,将三个原子同时与腔场作用,经过直接测量后为用户建立三原子GHZ态量子信道;并将此方法推广到N个用户间的GHZ态量子信道的建立.
关键词:
腔QED
量子信道
量子交换机
纠缠交换 相似文献
13.
A class of unlockable bound entangled states and their applications are presented. They can be considered as quasi generalized Smolin states [Phys. Rev. A 63 (2001) 032306], which are the states of N + N qubits. No pure entanglement can be distilled from this class of states by local quantum operations and classical communications. However, if certain parties group together, they become distillable. Although they are bound entangled states, they could be used to achieve some non-trivial tasks, such as quantum secret sharing shown in the study. 相似文献
14.
15.
A quantum steganography communication scheme via Greenberger-Horne-Zeilinger GHZ 4 state is constructed to investigate the possibility of remotely transferred hidden information.Moreover,the multipartite entangled states are become a hectic topic due to its important applications and deep effects on aspects of quantum information.Then,the scheme consists of sharing the correlation of four particle GHZ4 states between the legitimate users.After insuring the security of the quantum channel,they begin to hide the secret information in the cover of message.Comparing the scheme with the previous quantum steganographies,capacity and imperceptibility of hidden message are good.The security of the present scheme against many attacks is also discussed. 相似文献
16.
We analyse a process of remote information concentration achieved by the W state. The result turns out to be neither as good as performed by the GHZ state nor as by the Smolin bound entangled state. Based on this particular phenomenon, the properties of the three entangled states are realized. 相似文献
17.
18.
在量子通讯的实验中,由于外界环境的影响,我们很难得到最大的纠缠纯态.量子信道可能以混合纠缠态的形式出现.而固体材料中的热平衡态就是一种重要的混合纠缠态.本文利用了两个独立的外加不均匀磁场的一维海森堡链的热纠缠态作为量子信道,实现了两粒子纠缠态的远程传送,分析了外界温度和磁场对纠缠和传输保真度的影响.为了突出传输效果,我们对平均保真度做了研究,结果发现当温度很低,外加反方向的磁场B1和B2时,平均保真度大于经典通道的传输极限值2/3. 相似文献
19.
YU Chang-Shui WANG Ya-Hong SONG He-Shan 《理论物理通讯》2007,47(6):1041-1044
In this paper, we propose a protocol to deterministically teleport an unknown mixed state of qubit by utilizing a maximally bipartite entangled state of qubits as quantum channel. Ira non-maximally entangled bipartite pure state is employed as quantum channel, the unknown mixed quantum state of qubit can be teleported with 1 -√ 1- C^2 probability, where C is the concurrence of the quantum channel. The protocol can also be generalized to teleport a mixed state of qudit or a multipartite mixed state. More important purpose is that, on the basis of the protocol, the teleportation of an arbitrary multipartite (pure or mixed) quantum state can be decomposed into the teleportation of each subsystem by employing separate entangled states as quantum channels. In the case of deterministic teleportation, Bob only needs to perform unitary transformations on his single particles in order to recover the initial teleported multipartite quantum state. 相似文献
20.
To realize practical wide-area quantum communication,a satellite-to-ground network with partially entangled states is developed in this paper.For efficiency and security reasons,the existing method of quantum communication in distributed wireless quantum networks with partially entangled states cannot be applied directly to the proposed quantum network.Based on this point,an efficient and secure quantum communication scheme with partially entangled states is presented.In our scheme,the source node performs teleportation only after an end-to-end entangled state has been established by entanglement swapping with partially entangled states.Thus,the security of quantum communication is guaranteed.The destination node recovers the transmitted quantum bit with the help of an auxiliary quantum bit and specially defined unitary matrices.Detailed calculations and simulation analyses show that the probability of successfully transferring a quantum bit in the presented scheme is high.In addition,the auxiliary quantum bit provides a heralded mechanism for successful communication.Based on the critical components that are presented in this article an efficient,secure,and practical wide-area quantum communication can be achieved. 相似文献