共查询到20条相似文献,搜索用时 203 毫秒
1.
本文提出了量子信令交换机的模型, 该交换机由经典信息控制模块、交换控制模块和量子交换模块三部分组成. 经典控制模块负责将纠缠初态信息传送给纠缠测量及交换单元并更新路由信息. 交换控制模块实现通路选择, 为纠缠对的分发提供通路. 量子交换模块制备纠缠对, 进行Bell态的测量, 完成纠缠交换. 量子信令交换机可以实现多用户间的信令传输及局域网通信. 通过对交换机的性能分析与仿真, 结果表明该交换机结构简单、安全保密、便于扩展、时延小, 对于构建量子通信网有很好的支撑作用.
关键词:
量子通信
量子信令网
量子信令交换机
纠缠交换 相似文献
2.
提出一个无信息泄露的受控双向量子安全直接通信协议.协议中合法通信双方Alice和Bob在控制者Charlie的控制下实现彼此秘密信息的安全交换,利用3个Bell态纠缠交换后的测量相关性来克服信息泄露问题.由于该协议仅利用Bell态作为量子资源,而且仅需要进行Bell测量,所以方便实现.安全性分析表明,该协议不仅能检测到外部窃听者的主动攻击,而且还能检测到控制者Charlie的不诚实行为,因此,具备良好的安全性. 相似文献
3.
《物理学报》2020,(19)
多数传统的指定验证者签名方案无法抵抗量子计算机的攻击.本文给出一种具有强安全性的指定验证者量子签名方案.在方案中,参与方利用量子密钥分配协议和量子直接通信协议共享密钥.密钥生成中心制备Bell态序列并将其分配给签名者和指定验证者.签名者利用其密钥和受控量子态对消息进行签名.同时,指定的验证者可以利用对称的签名步骤对量子签名进行仿真.而验证者仿真的量子签名与签名者产生的量子签名完全一样.这使得量子签名具有不可传递的属性.本文所给出的签名方案可以抵抗伪造攻击,截获重放攻击和木马攻击.并且,其理论上的信息安全属性可以得到证明.同时,密钥生成中心无需完全可信.方案无需使用量子单向函数.当产生量子签名时,签名者无需制备纠缠态序列.当验证签名时,验证者无需执行量子态比较算法.方案的量子比特效率达到100%.因此,与类似方案相比,本文所给的方案具有较好的安全性和效率. 相似文献
4.
5.
6.
7.
利用两粒子纠缠态作为经典信息的载体,结合Hash函数和量子本地操作提出了一种可以实现双向认证功能的量子秘密共享方案,并且分析了它的安全性. 这种方案的安全性基于秘密共享双方的认证密钥和传输过程中粒子排列次序的保密. 若不考虑认证和窃听检测所消耗的粒子,平均1个Bell态共享2 bit经典信息.
关键词:
量子秘密共享
认证密钥
量子双向认证
两粒子量子纠缠 相似文献
8.
提出了一个利用六粒子最大纠缠态作为纠缠资源的双向量子控制隐形传态方案.该理论方案中,六粒子最大纠缠态作为量子通道来连系着合法的三方——通信双方和控制方,通信双方既是发送方同时也是接收方.传输过程中,Alice传输一个任意单粒子态a给Bob的同时Bob也传输一个任意的单粒子态b给Alice;由控制方Charlie来控制和协助通信双方完成最终的量子态的交换;Bob先对自己手中的粒子作一个幺正操作,用户双方再各自对自己手中的粒子执行Bell基测量,测量完成后通过经典信道将自己的测量结果公开宣布,用户双方根据对方所公布的测量结果做相应的幺正操作,从而成功地实现双向量子控制隐形传态. 相似文献
9.
双向隐形传态方案及安全性分析 总被引:1,自引:1,他引:0
提出了一种用Bell纠缠态作为量子信道,实现双向隐形传态的方案.通信双方Alice、Bob事先共享二对Bell纠缠态,通信开始后,Alice、Bob分别对自己拥有的部分粒子作Bell基联合测量,并将测量结果通过经典信道告诉对方.Alice、Bob根据对方提供的测量结果,做相应的幺正变换,即在己方的粒子上,再现对方要传的量子态信息,从而实现双向传态的目的.为了提高量子双向隐形传态的安全性,加入第三方控制,分析表明,通过增加控制方的粒子数可以增加系统的安全性,但增加到一定数量后,将无助于量子信道安全性的提高. 相似文献
10.
11.
An arbitrated quantum signature scheme based on entanglement swapping with signer anonymity 下载免费PDF全文
<正>In this paper an arbitrated quantum signature scheme based on entanglement swapping is proposed.In this scheme a message to be signed is coded with unitary operators.Combining quantum measurement with quantum encryption, the signer can generate the signature for a given message.Combining the entangled states generated by the TTP’s Bell measurement with the signature information,the verifier can verify the authentication of a signature through a single quantum state measurement.Compared with previous schemes,our scheme is more efficient and less complex, furthermore,our scheme can ensure the anonymity of the signer. 相似文献
12.
A protocol for quantum dialogue is proposed to exchange directly the communicator's secret messages by using a three-dimensional Bell state and a two-dimensional Bell state as quantum channel with quantum superdence coding, local collective unitary operations, and entanglement swapping. In this protocol, during the process of trans- mission of particles, the transmitted particles do not carry any secret messages and are transmitted only one time. The protocol has higher source capacity than protocols using symmetric two-dimensional states. The security is ensured by the unitary operations randomly performed on all checking groups before the particle sequence is transmitted and the application of entanglement swapping. 相似文献
13.
A quantum secure direct intercommunication scheme is
proposed to exchange directly the communicators' secret messages by
making use of swapping entanglement of Bell states. It has great
capacity to distribute the secret messages since these messages have
been imposed on high-dimensional Bell states via the local unitary
operations with superdense coding. The security is ensured by the
secure transmission of the travel sequences and the application of
entanglement swapping. 相似文献
14.
A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations(corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed.An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. 相似文献
15.
A protocol for quantum secure direct communication by using entangled qutrits and swapping quantum entanglement is proposed. In this protocol, a set of ordered two-qutrit entangled states is used as quantum information channels for sending secret messages directly. During the process of transmission of particles, the transmitted particles do not carry any secret messages and are transmitted only one time. The protocol has higher source capacity than protocols using usual two-dimensional Bell-basis states as quantum channel. The security is ensured by the unitary operations randomly performed on all checking groups before the particle sequence is transmitted and the application of entanglement swapping. 相似文献
16.
Based on entanglement swapping, a quantum key distribution (QKD) scheme is proposed. In this scheme, the secret keys are formed by comparing initial Bell states and outcomes of entanglement swapping. Moreover, all initial Bell states prepared by Alice and Bob are completely arbitrary. As the classical information exchanged between two parties is very little, this QKD scheme has a high efficiency. In addition, in order to prevent eavesdropping, decoy particles are used. 相似文献
17.
18.
In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. 相似文献
19.
YE Tian-Yu 《理论物理通讯》2015,63(4):431-438
At present, the anti-noise property and the information leakage resistant property are two great concerns for quantum dialogue(QD). In this paper, two anti-noise QD protocols without information leakage are presented by using the entanglement swapping technology for two logical Bell states. One works well over a collective-dephasing noise channel, while the other takes effect over a collective-rotation noise channel. The negative influence of noise is erased by using logical Bell states as the traveling quantum states. The problem of information leakage is avoided by swapping entanglement between two logical Bell states. In addition, only Bell state measurements are used for decoding, rather than four-qubit joint measurements. 相似文献
20.
Multiparty Quantum Secret Sharing of Classical Message using Cavity Quantum Electrodynamic System 下载免费PDF全文
An experimental feasible scheme of multiparty secret sharing of classical messages is proposed, based on a cavity quantum electrodynamic system. The secret messages are imposed on atomic Bell states initially in the sender's possession by local unitary operations. By swapping quantum entanglement of atomic Bell states, the secret messages are split into several parts and each part is distributed to a separate party. In this case, any subset of the entire party group can not read out the secret message but the entirety via mutual cooperations. In this scheme, to discriminate atomic Bell states, additional classical fields are employed besides the same highlydetuned single-mode cavities used to prepare atomic Bell states. This scheme is insensitive to the cavity decay and the thermal field, and usual joint Bell-state measurements are unnecessary. 相似文献