共查询到20条相似文献,搜索用时 968 毫秒
1.
2.
3.
基于量子远程通信的原理, 本文借助双模压缩真空态和相干态, 提出一种连续变量量子确定性密钥分配协议. 在利用零差探测法的情况下协议的传输效率达到了100%. 从信息论的角度分析了协议的安全性, 结果表明该协议可以安全传送预先确定的密钥. 在密钥管理中, 量子确定性密钥分配协议具有量子随机性密钥分配协议不可替代的重要地位和作用. 与离散变量量子确定性密钥分配协议相比, 该协议分发密钥的速率和效率更高, 又协议中用到的连续变量量子态易于产生和操控、适于远距离传输, 因此该协议更具有实际意义. 相似文献
4.
分析了Shor和Preskill证明BB84量子密钥分配协议无条件安全性的方法,指出不能用ShorPreskill方法直接证明B92量子密钥分配协议的无条件安全性。同时借鉴ShorPreskill方法,引入一种将B92协议转化为BB84协议的变换,通过证明该变换过程不会泄漏密钥信息给窃听者,以此证明B92协议的无条件安全性.也解决了Lo等人提出的关于用ShorPreskill方法证明B92协议的困难
关键词:
B92协议
CSS码
量子密钥分配
量子信息 相似文献
5.
密钥协商是量子密钥分发(QKD)中的重要组成部分.Cascade协议是实际中使用最广泛的量子密钥协商协议.本文基于[6]的工作提出一种对Cascade协议的改进方案.计算机仿真显示我们的方案比原始Cascade和一些其它改进方案有更高的效率. 相似文献
6.
目前,量子行走已广泛应用于量子计算和量子模拟中,并可应用于量子隐形传态中。提出了一种基于量子行走的电子支付协议。在协议中,买家基于可信第三方平台,将部分购物信息通过量子行走传送给银行和商家,完成一次网络购物。此协议将量子行走与电子支付相结合,使参与方仅需制备单光子便可以得到所需的纠缠资源,便于量子态的制备和实现。同时,协议不仅满足购物清单对银行保密,还实现了购买者的部分私人信息对商家保密,提高了隐私保护能力。最后的安全性分析表明,该协议可以抵御内部和外部攻击,对于当前技术是安全可行的。 相似文献
7.
分析经典选择重传自动请求重传(automatic repeat-request,ARQ)协议之后,利用量子力学中纠缠态的非定域关联性,提出了数据链路层的选择重传ARQ量子同步通信协议.该协议把链路分为准备阶段和发送阶段.在线路准备阶段完成EPR(Einstein-Podolsky-Rosen)关联对的分发,建立量子信道;在发送阶段完成数据帧和量子确认帧的传送.从吞吐量和信道利用率等方面比较分析了几种常见的数据链路层通信协议的性能.研究表明,该协议可以有效地提高数据链路层的最大吞吐量和信道利用率,改善选择重传ARQ协议的性能,在受时间瓶颈限制的通信中有着重要的应用价值. 相似文献
8.
分析经典选择重传自动请求重传(automatic repeat-request,ARQ)协议之后,利用量子力学中纠缠态的非定域关联性,提出了数据链路层的选择重传ARQ量子同步通信协议.该协议把链路分为准备阶段和发送阶段.在线路准备阶段完成EPR (Einstein-Podolsky-Rosen)关联对的分发,建立量子信道;在发送阶段完成数据帧和量子确认帧的传送.从吞吐量和信道利用率等方面比较分析了几种常见的数据链路层通信协议的性能.研究表明,该协议可以有效地提高数据链路层的最大吞吐量和信道利用率,改善选择重传ARQ协议的性能,在受时间瓶颈限制的通信中有着重要的应用价值. 相似文献
9.
安全传送明文的量子直传实验方案设计 总被引:5,自引:0,他引:5
乒乓直传协议是一种新颖的量子直传通信协议。基于量子纠缠特性,乒乓协议允许绝对安全地进行明文直接通信和渐进地进行密钥安全分发。是一种绝对安全的即时通信协议。该量子直传协议将来有望成为安全稳定的光量子通信的主流方式。然而,目前还没有该协议的物理实现方案。分析了乒乓直传协议的工作原理.给出了该协议的流程图,进而分析了协议的物理实现机制,结合纠缠光子源、自由空间单光子路由控制和单光子检测技术,提出了在自由空间中实现乒乓直传协议的实验技术方案,并设计出了乒乓直传协议的实验装置。此实验技术方案为从实验角度进一步研究乒乓协议,以及未来此协议的商业化应用提供了参考。 相似文献
10.
量子纠缠交换能够建立可靠的量子远程传输信道, 实现量子态的远程传输. 然而, 基于纠缠交换的量子信道要求网络高度稳定, 否则会浪费大量纠缠资源. 为节省纠缠资源, 本文根据隐形传态理论, 提出了一种基于分组交换的量子通信网络传输协议, 建立了发送量子态所需的纠缠数目与所经过的路由器数、链路错误率的定量关系, 并与纠缠交换传输协议进行了比较. 仿真结果表明, 在链路错误率为0.1% 时, 分组传输协议所使用的纠缠数目少于纠缠交换的数目, 另外, 随着错误率的升高, 分组传输协议所需的纠缠数比纠缠交换协议明显减少. 由此可见, 基于分组交换的量子通信网络传输协议在网络不稳定时, 能够节省大量纠缠资源, 适用于链路不稳定的量子通信网络. 相似文献
11.
Quantum dual-signature means that two signed quantum messages are combined and expected to be sent to two different recipients. A quantum signature requires the cooperation of two verifiers to complete the whole verification process. As an important quantum signature aspect, the trusted third party is introduced to the current protocols, which affects the practicability of the quantum signature protocols. In this paper, we propose a quantum dual-signature protocol without arbitrator and entanglement for the first time. In the proposed protocol, two independent verifiers are introduced, here they may be dishonest but not collaborate. Furthermore, strongly nonlocal orthogonal product states are used to preserve the protocol security, i.e., no one can deny or forge a valid signature, even though some of them conspired. Compared with existing quantum signature protocols, this protocol does not require a trusted third party and entanglement resources. 相似文献
12.
Quantum candies (qandies) represent a type of pedagogical simple model that describes many concepts from quantum information processing (QIP) intuitively without the need to understand or make use of superpositions and without the need of using complex algebra. One of the topics in quantum cryptography that has gained research attention in recent years is quantum digital signatures (QDS), which involve protocols to securely sign classical bits using quantum methods. In this paper, we show how the “qandy model” can be used to describe three QDS protocols in order to provide an important and potentially practical example of the power of “superpositionless” quantum information processing for individuals without background knowledge in the field. 相似文献
13.
Long Zhang Hong-Wei Sun Ke-Jia Zhang Qing-Le Wang Xiao-Qiu Cai 《International Journal of Theoretical Physics》2017,56(8):2433-2444
With the development of quantum signature, two improved arbitrated quantum signature(AQS) protocols have been presented with different quantum encryptions. In this paper, some security loopholes during the two AQS protocols are proposed. In the enhanced arbitrated quantum signature(EAQS) protocol, though the signer is not able to deny his signature, the receiver can still forge some valid signatures. In the chaos-based arbitrated quantum signature(CAQS) protocol, the receiver can forge a valid signature without being caught, and the signer can also deny her signature after the signing phase. Finally, some potential improved ideas are discussed. 相似文献
14.
A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations(corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed.An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. 相似文献
15.
John P. S. Peterson Roberto S. Sarthour Alexandre M. Souza Ivan S. Oliveira Frederico Brito Fernando de Melo 《Annalen der Physik》2018,530(7)
A banged‐digital‐analog simulation of a quantum annealing protocol is performed in a two‐qubit nuclear magnetic resonance (NMR) quantum computer. The experimental simulation employs up to 235 Trotter steps, with more than 2000 gates (pulses), and a protocol success above 80% is obtained. Given the exquisite control of the NMR quantum computer, the simulation is also performed with different noise levels. Thus, the reliability of the quantum annealing process is is analyzed, and it is related to the level of entanglement produced during the protocol. Although the presence of entanglement is not a sufficient signature for a better‐than‐classical simulation, the level of entanglement achieved relates to the fidelity of the protocol. 相似文献
16.
An arbitrated quantum signature scheme based on entanglement swapping with signer anonymity 下载免费PDF全文
<正>In this paper an arbitrated quantum signature scheme based on entanglement swapping is proposed.In this scheme a message to be signed is coded with unitary operators.Combining quantum measurement with quantum encryption, the signer can generate the signature for a given message.Combining the entangled states generated by the TTP’s Bell measurement with the signature information,the verifier can verify the authentication of a signature through a single quantum state measurement.Compared with previous schemes,our scheme is more efficient and less complex, furthermore,our scheme can ensure the anonymity of the signer. 相似文献
17.
18.
Long Gui-lu Deng Fu-guo Wang Chuan Li Xi-han Wen Kai Wang Wan-ying 《Frontiers of Physics in China》2007,2(3):251-272
In this review article, we review the recent development of quantum secure direct communication (QSDC) and deterministic secure
quantum communication (DSQC) which both are used to transmit secret message, including the criteria for QSDC, some interesting
QSDC protocols, the DSQC protocols and QSDC network, etc. The difference between these two branches of quantum communication
is that DSQC requires the two parties exchange at least one bit of classical information for reading out the message in each
qubit, and QSDC does not. They are attractive because they are deterministic, in particular, the QSDC protocol is fully quantum
mechanical. With sophisticated quantum technology in the future, the QSDC may become more and more popular. For ensuring the
safety of QSDC with single photons and quantum information sharing of single qubit in a noisy channel, a quantum privacy amplification
protocol has been proposed. It involves very simple CHC operations and reduces the information leakage to a negligible small
level. Moreover, with the one-party quantum error correction, a relation has been established between classical linear codes
and quantum one-party codes, hence it is convenient to transfer many good classical error correction codes to the quantum
world. The one-party quantum error correction codes are especially designed for quantum dense coding and related QSDC protocols
based on dense coding.
相似文献
19.
As an important application of the quantum network communication,quantum multiparty conference has made multiparty secret communication possible.Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology.However,the topology of the quantum network significantly affects the communication efficiency,e.g.,parallel transmission in a channel with limited bandwidth.We have proposed two distinctive protocols,which work in two basic network topologies with efficiency higher than the existing ones.We first present a protocol which works in the reticulate network using Greeberger-Horne-Zeilinger states and entanglement swapping.Another protocol,based on quantum multicasting with quantum data compression,which can improve the efficiency of the network,works in the star-like network.The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption.In general,the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. 相似文献
20.
Huijuan Zuo 《International Journal of Theoretical Physics》2013,52(1):322-329
In this paper, we study the cryptanalysis of two quantum blind signature schemes and one quantum proxy blind signature protocol. We show that in these protocols the verifier can forge the signature under known message attack. The attack strategies are described in detail respectively. This kind of problem deserves more research attention in the following related study. We further point out that the arbitrator should be involved in the procedure of any dispute and some discussions of these protocols are given. 相似文献