首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
In a recent study (Yang et al. in Int. J. Theor. Phys. 50:395–400, 2011), Yang et al. pointed out that the controller’s role in the quantum secure direct communication protocol (Zhang et al. in Int. J. Theor. Phys. 48:2971–2976, 2009) could be excluded unknowingly, the receiver can directly obtain the sender’s message without the permission of the controller, and then they presented an improved protocol. However, in this paper, we show that the dishonest controller in the improved protocol can steal the sender’s secret message without being detected. Meanwhile, we show that the controller’s role still can be excluded unknowingly in the improved protocol. An improvement is proposed to avoid these two flaws.  相似文献   

2.
We present a controlled quantum secure direct communication protocol by using cluster states via swapping quantum entanglement and local unitary operation. In the present scheme, the sender transmit the secret message to the receiver directly and the secret message can only be recovered by the receiver under the permission of the controller.  相似文献   

3.
A controlled quantum secure direct communication protocol (Zhang et al. in Int. J. Theor. Phys. 48:2971–2976, 2009) by using four particle cluster states was proposed recently. Yang et al. presented an attack with fake entangled particles (FEP attack) and gave an improvement (Yang et al. in Int. J. Theor. Phys. 50:395–400, 2010). In this paper, we reexamine the protocol’s security and discover that, Bob can also take a different attack, disentanglement attack, to obtain Alice’s secret message without controller’s permission. Moreover, our attack strategy also works for Yang’s improvement.  相似文献   

4.
提出了一个利用五粒子团簇态实现的可控量子安全直接通信方案.在这一方案中,首先信息发送者Alice、信息接收者Bob和控制者Charlie共享由Alice制备的一有序序列团簇态作为量子信道;在确定量子信道的安全性以后,Alice制备编码量子态(Bell态)序列,然后通过对自己手中的粒子进行Bell基测量,接着Charlie对自己手中的粒子进行单粒子的测量,就能把信息传送给接收者Bob;最后,Bob测量自己手中的粒子,并通过分析三人的测量结果,从而获得Alice要传送的信息.在我们提出的方案中,携带信息的粒子不需要在公共信道上传输.该文中,我们给出了方案的安全性分析,证明了我们的方案是决定性的和安全的.在未来,我们的方案在以目前的实验技术为基础条件下很可能得到实现.  相似文献   

5.
A new attack strategy, the so-called intercept-selectively-measure-resend attack is put forward. It shows that there are some security issues in the controlled quantum secure direct communication (CQSDC) and authentication protocol based on five-particle cluster states and quantum one-time pad. Firstly, an eavesdropper (Eve) can use this attack to eavesdrop on 0.656 bit of every bit of the identity string of the receiver and 1.406 bits of every couple of the corresponding bits of the secret message without being detected. Also, she can eavesdrop on 0.311 bit of every bit of the identity string of the controller. Secondly, the receiver can also take this attack to obtain 1.311 bits of every couple of the corresponding bits of the secret message without the permission of the controller, which is not allowed in the CQSDC protocols. In fact, there is another security issue in this protocol, that is, one half of the information about the secret is leaked out unconsciously. In addition, an alternative attack strategy which is called as the selective-CNOT-operation attack strategy to attack this protocol is discussed.  相似文献   

6.
7.
A controlled quantum secure direct communication protocol (Zhang et al. Int. J. Theor. Phys. 48:2971–2976, 2009) by using four particle cluster states was proposed recently. The aim of Zhang et al. was that the successful realization of communication between Alice and Bob needed the cooperation of a controller, Charlie. However, we show that the controller Charlie’s role could be excluded unknowingly. Using fake entangled particles and Bell measurement, the dishonest Bob who generates the initial signals can elicit Alice’s secret message without the permission of Charlie. A possible improvement of the protocol is proposed.  相似文献   

8.
Two protocols of quantum direct communication with authentication [Phys. Rev. A 73 (2006) 042305] were recently indicated to be insecure against the authenticator Trent attacks [Phys. Rev. A 75 (2007) 026301]. We present two efficient protocols by using four Panli operations, which are secure against inner Trent attacks as well as outer Eve attacks. Finally, we generalize them to multiparty quantum direction communication.  相似文献   

9.
A quantum secure direct communication protocol with authentication using only two nonorthogonal states is presented. In the protocol, a one-way hash function is utilized for two-way authentication and two one-particle unitary operations are used for encoding. Moreover, it has been shown that this protocol is secure against some common attacks.  相似文献   

10.
We propose a quantum secure communication protocol by using three-particle GHZ states. In this protocol, we utilize the ideas of the rearranging orders and the sequence transmission. The sender of messages, Alice, first disturbs the particle orders in an initial sequence, and then sends the sequence of the disturbed orders to the receiver of messages, Bob. Under Alice's introduction, Bob rearranges the sequence back to the initial sequence. By making a GHZ state measurement on each of the three particles in turn, Bob can attain Alice's secret messages. In addition, we still calculate the efficiency of our three-particle GHZ protocol and generalize it to the case using multi-particle GHZ state.  相似文献   

11.
We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Brown state, where a coalition of any two of the three controllers is required to retrieve the complete message. We argue both protocols to be unconditionally secure and analyze the efficiency of the protocols to show it to outperform the existing schemes while maintaining the same security specifications.  相似文献   

12.
13.
We revisited the quantum secure direct communication (QSDC) by using a notation (Li et al. in Phys. Lett. A 297:121, 2002; Li et al. in Int. J. Theor. Phys. 46(7):1815, 2007) and generalized QSDC to arbitrary finite dimensions, we also figured out the decoding formula for QSDC of arbitrary finite dimensions. In order to overcome the channel noisy, we present a scheme through introduce n auxilians by using quantum swapping.  相似文献   

14.
In a quantum secure direct communication protocol, two remote parties can transmit the secret message directly without first generating a key to encrypt them. A quantum secure direct communication protocol using two-photon four-qubit cluster states is presented. The presented scheme can achieve a higher efficiency in transmission and source capacity compared with the proposed quantum secure direct communication protocols with cluster states, and the security of the protocol is also discussed.  相似文献   

15.
A novel quantum secure direct communication scheme based on four-qubit cluster states is proposed. In this scheme, the quantum channel between the sender Alice and the receiver Bob consists of an ordered sequence of cluster states which are prepared by Alice. After ensuring the security of quantum channel, Alice prepares the encoded Bell-state sequence, and performs Bell-basis measurements on the qubits at hand. Then Alice tells the measured results to Bob, and Bob also performs Bell-basis measurements on his own qubits. Finally Bob can get the secret information through the analysis of their measured results. In our scheme, the qubits carrying the secret message do not need to be transmitted in public channel. We show this scheme is determinate and secure.  相似文献   

16.
International Journal of Theoretical Physics - The proposed quantum secret sharing protocol in this article conveys n bit secret messages from the sender to the n receivers making use of a secure...  相似文献   

17.
我们利用Greenberger-Horne-Zeilinger(GHZ)态,提出了一个控制量子安全直接通讯方案.在方案中,我们不仅分析了这个方案的安全性,而且指出了这个方案可以有效地抵御截取再发送袭击和干扰袭击.  相似文献   

18.
19.
杨静  王川  张茹 《理论物理通讯》2010,(11):829-834
In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication. The authentication key expansion method is introduced to improve the life of the keys with security. In the first scheme, the third party, called Trent is introduced to authenticate the users that participate in the communication. He sends the polarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys. In the communication process, polarized single photons are used to serve as the carriers, which transmit the secret messages directly. The second QSDC process with authentication between two parties is also discussed.  相似文献   

20.
International Journal of Theoretical Physics - In this paper, a controlled bidirectional quantum secure direct communication (CBQSDC) protocol is proposed by using six-qubit entangled states. It...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号