共查询到20条相似文献,搜索用时 15 毫秒
1.
In this paper, we propose a multi-proxy blind signature scheme based on controlled teleportation. Genuine four-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. The security analysis shows the scheme satisfies the security features of multi-proxy signature, unforgeability, undeniability, blindness and unconditional security. 相似文献
2.
In this paper a very efficient and secure proxy signature scheme is proposed. It is based on controlled quantum teleportation. Genuine five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. Quantum key distribution and one-time pad are adopted in our scheme, which could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner. 相似文献
3.
In this paper, a quantum proxy blind signature scheme based on controlled quantum teleportation is proposed. This scheme uses a genuine five-qubit entangled state as quantum channel and adopts the classical Vernam algorithm to blind message. We use the physical characteristics of quantum mechanics to implement delegation, signature and verification. Security analysis shows that our scheme is valid and satisfy the properties of a proxy blind signature, such as blindness, verifiability, unforgeability, undeniability. 相似文献
5.
Recently, a genuine six-qubit entangled state has been proposed by Tapiador et al. (J. Phys. A 42: 415301, 2009). In this paper, we present a deterministic scheme for generating such a state in cavity QED system, where the atoms interact simultaneously with the highly detuned single-mode cavity and the strong classical driving field. Thus our scheme is not sensitive to both the cavity decay and thermal field. 相似文献
6.
A new application of six-qubit entangled state introduced by Chen et al. (Phys. Rev. A 74, 032324, 2006) is studied for the bidirectional quantum controlled teleportation. In our scheme, a six-qubit entangled state is shared by Alice, Bob and Charlie, Alice and Bob can transmit simultaneously an arbitrary single-qubit state to each other under the control of the supervisor Charlie. 相似文献
7.
Since the first quantum key agreement protocol based on Bell state was presented by Zhou et al., much attention has focused on it, which is based on entangled states and product states. In this paper, we propose a multi-party quantum key agreement protocol, in which the genuinely maximally entangled six-qubit states are used. The presented protocol allows participants to share a secret key and preserves the following advantages. First, the outcome of the protocol is influenced by all parties; Second, the presented protocol is fairness, i.e., no one can determine the shared key alone; Third, outside eavesdroppers cannot gain the generated key without introducing any error. The security analysis shows that our protocol can resist both outside attacks and inside attacks. 相似文献
8.
Based on the genuine four-particle entangled state (Yeo and Chua in Phys. Rev. Lett. 96:060502, 2006) and the ping-pong protocol (Boström and Felbinger in Phys. Rev. Lett. 89:187902, 2002), an efficient quantum dialogue scheme is proposed. Since some subtle methods are employed, the information leakage doesn’t exist in this scheme. There are two security-check processes in this scheme, one is accomplished by using the four-particle entanglement pairs and the other by using the d particles. 相似文献
9.
In this paper, a multi-proxy blind signature scheme based on controlled quantum teleportation is proposed.Entangled four-qubit Cluster state functions as quantum channel, which needs less resource to complete the quantum multi-proxy blind signature. The scheme uses the physical characteristics of quantum mechanics to guarantee its blindness, unforgeability, and undeniability. The eavesdropping check is used to ensure the security. Our scheme has a foreseeable application to the E-business, E-governments, and etc. 相似文献
10.
International Journal of Theoretical Physics - A three-party scheme for sharing an arbitrary single-qubit operation on a distant target qubit is proposed by utilizing a six-qubit absolutely... 相似文献
11.
A novel quantum group proxy blind signature scheme based on five-qubit entangled state is proposed. The quantum key distribution, quantum encryption algorithm and some laws of quantum mechanics (such as quantum no-cloning theorem and Heisenberg uncertainty principle) are used to guarantee the unconditional security of this scheme. Analysis result shows that the signature can neither be forged nor disavowed by any malicious attackers and our scheme satisfies all the characteristics of group signature and proxy signature. This protocol can be applied in real life such as E-commerce transaction. 相似文献
12.
A scheme of circular controlled quantum teleportation, which is a novel version of bidirectional controlled quantum teleportation, is proposed using a specific genuine seven-qubit entangled state as quantum channel, and then it is generalized to the scene with a general genuine seven-qubit entangled state as channel. This means that with the control of the supervisor Daniel while Alice teleportates an unknown qubit state to Bob, Bob can also teleportate an unknown qubit state to Charlie and Charlie can also teleportate an unknown qubit state to Alice circularly, simultaneously. Compared with the BCQT schemes proposed before, the intrinsic efficiency of our scheme is optimal. 相似文献
13.
In a recent paper Long et al. (J. Phys. A: Math. Theor. 45: 195303, 2012), a quantum secret sharing protocol was presented, in which the genuinely maximally entangled six-qubit states were used. According to the protocol, Alice could share three bits among three agents, which showed that it was more efficient than previous protocols. Here, we analyze it and point out that the information about the transmitted secret will be partly leaked out unknowingly. Through the classical public channel, 2/3 of Alice’s secret messages is leaked out to Bob 1 and Bob 2, and 1/3 secret messages is leaked out to Bob 3, respectively. This phenomenon should be strictly forbidden in a quantum secret sharing protocol. 相似文献
16.
We propose a scheme for the generation of a genuine five-atom entangled state in cavity QED. In our scheme, the atoms interact simultaneously with a highly detuned cavity mode with the assistance of a strong classical driving field. Thus the scheme is insensitive to both the cavity decay and the thermal field, which is of importance from the experimental point of view. 相似文献
17.
By swapping the entanglement of genuine four-particle entangled states, we propose a bidirectional quantum secure communication protocol. The biggest merit of this protocol is that the information leakage does not exist. In addition, the ideas of the "two-step" transmission and the block transmission are employed in this protocol. In order to analyze the security of the second sequence transmission, decoy states are used. 相似文献
18.
我们提出了一个在三者之间利用四粒子纠缠态作为量子通道实现对任意单粒子态的信息分裂的方案.在我们的方案中,两个接收方之间有且只有在对方提供合作的情况下才能全部获得这个原始信息,而且接收方彼此之间都有同等权限去获得该原始信息,他们获得原始信息的概率是一样的,均为1. 相似文献
19.
International Journal of Theoretical Physics - In this paper, a controlled bidirectional quantum secure direct communication (CBQSDC) protocol is proposed by using six-qubit entangled states. It... 相似文献
20.
Quantum proxy signature(QPS) is one of the most important topics in quantum signature. In this paper, we propose a new and general model of QPS based on genuine entangled Nj-qubit (3 ≤ Nj ≤ 6,Nj ∈ N∗,j = 1,2,3,4.) states. In our model, only the teleportation of multiparty entangled states and quantum one-time pad(QOTP) encryption algorithm have been applied to ensure the security. We hope our results will be helpful to the research of quantum signature in future. 相似文献
|