首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In this paper, a multi-proxy blind signature scheme based on controlled quantum teleportation is proposed. Entangled four-qubit Cluster state functions as quantum channel, which needs less resource to complete the quantum multi-proxy blind signature. The scheme uses the physical characteristics of quantum mechanics to guarantee its blindness, unforgeability, and undeniability. The eavesdropping check is used to ensure the security. Our scheme has a foreseeable application to the E-business, E-governments, and etc.  相似文献   

2.
In this paper, a multi-proxy blind signature scheme based on controlled quantum teleportation is proposed.Entangled four-qubit Cluster state functions as quantum channel, which needs less resource to complete the quantum multi-proxy blind signature. The scheme uses the physical characteristics of quantum mechanics to guarantee its blindness, unforgeability, and undeniability. The eavesdropping check is used to ensure the security. Our scheme has a foreseeable application to the E-business, E-governments, and etc.  相似文献   

3.
In this paper, a quantum proxy blind signature scheme based on controlled quantum teleportation is proposed. This scheme uses a genuine five-qubit entangled state as quantum channel and adopts the classical Vernam algorithm to blind message. We use the physical characteristics of quantum mechanics to implement delegation, signature and verification. Security analysis shows that our scheme is valid and satisfy the properties of a proxy blind signature, such as blindness, verifiability, unforgeability, undeniability.  相似文献   

4.
In this paper, a very efficient and secure multi-proxy multi-blind-signature scheme is proposed which is based on controlled quantum teleportation. Genuine six-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to guarantee its unforgeability, undeniability, blindness and unconditional security.  相似文献   

5.
In this paper a very efficient and secure proxy signature scheme is proposed. It is based on controlled quantum teleportation. Genuine five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. Quantum key distribution and one-time pad are adopted in our scheme, which could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.  相似文献   

6.
A multi-proxy strong blind quantum signature scheme is proposed in this paper. An original signatory Alice delegates her signing authority to a group of proxy signatories by using a classical warrant. A blind factor is introduced by a sender U to blind a message, and the proxy signatories sign the message blindly via applying appropriate unitary operators. A receiver Bob verifies the generated signature with the help of an arbitrator Trent. The security of this scheme is based on a quantum key distribution protocol, a quantum one-time pad and other quantum properties. It is proved that our scheme has the properties of non-disavowal, non-counterfeit, multi-proxy, blindness, untraceability and can resist some common attacks.  相似文献   

7.

A novel quantum group proxy blind signature scheme based on five-qubit entangled state is proposed. The quantum key distribution, quantum encryption algorithm and some laws of quantum mechanics (such as quantum no-cloning theorem and Heisenberg uncertainty principle) are used to guarantee the unconditional security of this scheme. Analysis result shows that the signature can neither be forged nor disavowed by any malicious attackers and our scheme satisfies all the characteristics of group signature and proxy signature. This protocol can be applied in real life such as E-commerce transaction.

  相似文献   

8.
9.
我们提出了一个在三者之间利用四粒子纠缠态作为量子通道实现对任意单粒子态的信息分裂的方案.在我们的方案中,两个接收方之间有且只有在对方提供合作的情况下才能全部获得这个原始信息,而且接收方彼此之间都有同等权限去获得该原始信息,他们获得原始信息的概率是一样的,均为1.  相似文献   

10.
In this paper, we propose a scheme for quantum information splitting based on the non-maximally entangled four-qubit state in order to realize the splitting of the specific two-qubit state |ψ A B =x|00〉+y|11〉. The information splitter will safely share an state to the receiver with help of the controller. Through introducing an auxiliary system and applying several appropriate unitary transformations the information receiver can reconstruct the original state sent by the information splitter. Due to the non-maximally entangled four-qubit state, the total probability that the receiver obtains the original information is P. Furthermore, we discuss the relationship between the successful splitting probability and the concurrence of the entangled state and get a specific expression. In addition, the scheme is tested against external and internal attacks, and we define a function to characterise the security with the concurrence of the entanglement.  相似文献   

11.
International Journal of Theoretical Physics - We proposed a secure quantum voting scheme employing five-qubit cluster state as quantum channel. It is based on quantum group blind signature. With...  相似文献   

12.

Quantum proxy signature(QPS) is one of the most important topics in quantum signature. In this paper, we propose a new and general model of QPS based on genuine entangled Nj-qubit (3 ≤ Nj ≤ 6,NjN,j = 1,2,3,4.) states. In our model, only the teleportation of multiparty entangled states and quantum one-time pad(QOTP) encryption algorithm have been applied to ensure the security. We hope our results will be helpful to the research of quantum signature in future.

  相似文献   

13.
In this article, a scheme for quantum teleportation of a two-qubit entangled state using four-qubit cluster state is discussed by use of cavity quantum electrodynamics (QED) involving the interaction of the atoms with the cavity. In this protocol, by using a one-dimensional maximally four-qubit cluster state as quantum channel, quantum information of an unknown state of two two-level particles is faithfully transmitted from a sender (Alice) to a remote receiver (Bob). According to the results measured by the Bob, as it is shown, the unknown two-particle entangled state can be teleported perfectly, and the successful possibilities and fidelities of the scheme can reach 1.0.  相似文献   

14.
International Journal of Theoretical Physics - In this paper, we show a new quantum proxy blind signature scheme based on single particle superdense coding. We only need perform unitary operator on...  相似文献   

15.
16.
International Journal of Theoretical Physics - Motivated by the block encryption and quantum Fourier transfer, a quantum blind signature scheme is proposed. Alice encodes the original message into...  相似文献   

17.
A multiparty quantum blind signature scheme is proposed based on the principle of graph state, in which the unitary operations of graph state particles can be applied to generate the quantum blind signature and achieve verification. Different from the classical blind signature based on the mathematical difficulty, the scheme could guarantee not only the anonymity but also the unconditionally security. The analysis shows that the length of the signature generated in our scheme does not become longer as the number of signers increases, and it is easy to increase or decrease the number of signers.  相似文献   

18.
We present a weak blind signature scheme based on a genuinely entangled six qubits state. Different from classical blind signature schemes and current quantum signature schemes, our quantum weak blind signature scheme could guarantee not only the unconditionally security but also the anonymity of the message owner. To achieve that, quantum key distribution and one-time pad are adopted in our scheme. Our scheme has the characteristics of classical security and quantum security.  相似文献   

19.
Based on the genuine four-particle entangled state (Yeo and Chua in Phys. Rev. Lett. 96:060502, 2006) and the ping-pong protocol (Boström and Felbinger in Phys. Rev. Lett. 89:187902, 2002), an efficient quantum dialogue scheme is proposed. Since some subtle methods are employed, the information leakage doesn’t exist in this scheme. There are two security-check processes in this scheme, one is accomplished by using the four-particle entanglement pairs and the other by using the d particles.  相似文献   

20.
International Journal of Theoretical Physics - A new proxy blind signature scheme based on controlled quantum teleportation is presented in this paper. We present a scheme for teleporting an...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号