共查询到20条相似文献,搜索用时 46 毫秒
1.
2.
3.
4.
5.
针对传统量子安全直接通信方案中需提前假设通信双方合法性的问题,提出一种带身份认证的基于GHZ态(一种涉及至少三个子系统或粒子纠缠的量子态)的量子安全直接通信方案.该方案将GHZ态粒子分成三部分,并分三次发送,每一次都加入窃听检测粒子检测信道是否安全,并在第二次发送的时候加入身份认证,用以验证接收方的身份,在第三次发送完粒子之后,接收方将所有检测粒子抽取出来,之后对GHZ态粒子做联合测量,并通过原先给定的编码规则恢复原始信息.本方案设计简单、高效,无需复杂的幺正变换即可实现通信.安全性分析证明,该方案能抵御常见的内部攻击和外部攻击,并且有较高的传输效率、量子比特利用率和编码容量,最大的优势在于发送方发送信息的时候不需要假设接收方的合法性,有较高的实际应用价值. 相似文献
6.
7.
目前的量子密钥分发(QKD)协议都是在通信双方均为合法的前提下提出的,为了防止窃听者(Eve)假冒任意一方进行通信、保证量子通信的安全胜,需要对QKD的通信双方(Alice和Bob)进行合法身份确认。 相似文献
8.
无认证中心的认证协议一般由通信双方相互认证.事先共享纠缠态或身份密钥,结构简单,但不适于扩展成通信网络.通过引入可信第三方认证中心,并利用三粒子W纠缠态的稳健性,提出了一个基于W态的身份认证协议,使得合法通信用户可以在认证中心的协助下进行安全身份认证,身份认证的同时即完成了纠缠粒子的分发.认证完成后,合法通信用户可安全共享EPR纠缠态并在第三方的控制下进行量子直传通信.针对窃听者常用攻击手段进行了安全性分析,结果表明在身份认证过程中可以有效的抵御伪装攻击,截取重发攻击与纠缠攻击等.基于第三方的通信结构具有可扩展性、实用性和受控性. 相似文献
9.
10.
11.
Economical multiparty simultaneous quantum identity authentication based on Greenberger--Horne--Zeilinger states 下载免费PDF全文
A multiparty simultaneous quantum identity authentication protocol
based on Greenberger--Horne--Zeilinger (GHZ) states is proposed. The
multi-user can be authenticated by a trusted third party (TTP)
simultaneously. Compared with the scheme proposed recently (Wang
et al 2006, Chin. Phys. Lett. 23(9) 2360), the
proposed scheme has the advantages of consuming fewer quantum and
classical resources and lessening the difficulty and intensity of
necessary operations. 相似文献
12.
An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication 下载免费PDF全文
A novel efficient deterministic secure quantum communication scheme
based on four-qubit cluster states and single-photon identity
authentication is proposed. In this scheme, the two authenticated
users can transmit two bits of classical information per cluster
state, and its efficiency of the quantum communication is 1/3, which
is approximately 1.67 times that of the previous protocol presented
by Wang et al [Chin. Phys. Lett. 23 (2006) 2658].
Security analysis shows the present scheme is secure against
intercept-resend attack and the impersonator's attack. Furthermore,
it is more economic with present-day techniques and easily processed
by a one-way quantum computer. 相似文献
13.
Two multiparty simultaneous quantum identity authentication (MSQIA) protocols based on secret sharing are presented. All the
users can be authenticated by a trusted third party (TTP) simultaneously. In the first protocol, the TTP shares a random key
K with all the users using quantum secret sharing. The ith share acts as the authentication key of the ith user. When it is necessary to perform MSQIA, the TTP generates a random number R secretly and sends a sequence of single photons encoded with K and R to all the users. According to his share, each user performs the corresponding unitary operations on the single photon sequence
sequentially. At last, the TTP can judge whether the impersonator exists. The second protocol is a modified version with a
circular structure. The two protocols can be efficiently used for MSQIA in a network. They are feasible with current technology.
Supported by the National Basic Research Program of China (973 Program) (Grant No. 2007CB311100), the National High Technology
Research and Development Program of China (Grant Nos. 2006AA01Z419 and 20060101Z4015), the Major Research Plan of the National
Natural Science Foundation of China (Grant No. 90604023), the Scientific Research Common Program of Beijing Municipal Commission
of Education (Grant No. KM200810005004), the Scientific Research Foundation for the Youth of Beijing University of Technology
(Grant No. 97007016200701), the National Research Foundation for the Doctoral Program of Higher Education of China (Grant
No. 20040013007), the National Laboratory for Modern Communications Science Foundation of China (Grant No. 9140C1101010601),
and the Doctor Scientific Research Activation Foundation of Beijing University of Technology (Grant No. 52007016200702) 相似文献
14.
提出了一种网络多用户量子认证和密钥分配理论方案.类似于现代密码学中的网络认证体系结构提出了一种基于网络中用户与所属的可信服务器之间共享Einstein-Podolsky-Rosen(EPR)纠缠对进行身份认证和密钥分配的分布式客户机/服务器体系结构.基于该体系结构实现网络中任意用户之间的身份认证和密钥分配.可信服务器只提供用户的身份认证以及 交换粒子之间的纠缠使得两个想要秘密通信的用户的粒子纠缠起来.密钥的生成由发起请求 的用户自己完成.网络中的用户只需和所属的可信服务器共享EPR纠缠对通过经典信道和量子 信道与服务器通信.用户不需要互相共享EPR纠缠对,这使得网络中的EPR对的数量由O(n2)减小到O(n).
关键词:
量子认证
量子密钥分配
客户机/服务器
纠缠交换 相似文献
15.
Blind quantum computation (BQC) allows a client with relatively few quantum resources or poor quantum technologies to delegate his computational problem to a quantum server such that the client's input, output, and algorithm are kept private. However, all existing BQC protocols focus on correctness verification of quantum computation but neglect authentication of participants' identity which probably leads to man-in-the-middle attacks or denial-of-service attacks. In this work, we use quantum identification to overcome such two kinds of attack for BQC, which will be called QI-BQC. We propose two QI-BQC protocols based on a typical single-server BQC protocol and a double-server BQC protocol. The two protocols can ensure both data integrity and mutual identification between participants with the help of a third trusted party (TTP). In addition, an unjammable public channel between a client and a server which is indispensable in previous BQC protocols is unnecessary, although it is required between TTP and each participant at some instant. Furthermore, the method to achieve identity verification in the presented protocols is general and it can be applied to other similar BQC protocols. 相似文献
16.
In this paper an efficient quantum secure direct communication (QSDC) scheme with
authentication is presented, which is based on quantum entanglement and
polarized single photons. The present protocol uses Einstein--Podolsky--Rosen
(EPR) pairs and polarized
single photons in batches. A particle of the EPR pairs is retained
in the sender's station, and the other is transmitted forth and back
between the sender and the receiver, similar to the `ping--pong'
QSDC protocol. According to the shared information beforehand, these
two kinds of quantum states are mixed and then transmitted via a
quantum channel. The EPR pairs are used to transmit secret messages
and the polarized single photons used for authentication and
eavesdropping check. Consequently, because of the dual contributions
of the polarized single photons, no classical information is needed.
The intrinsic efficiency and total efficiency are both 1 in this
scheme as almost all of the instances are useful and each EPR pair
can be used to carry two bits of information. 相似文献
17.
Ahmed Farouk J. Batle M. Elhoseny Mosayeb Naseri Muzaffar Lone Alex Fedorov Majid Alkhambashi Syed Hassan Ahmed M. Abdel-Aty 《Frontiers of Physics》2018,13(2):130306
Quantum communication provides an enormous advantage over its classical counterpart: security of communications based on the very principles of quantum mechanics. Researchers have proposed several approaches for user identity authentication via entanglement. Unfortunately, these protocols fail because an attacker can capture some of the particles in a transmitted sequence and send what is left to the receiver through a quantum channel. Subsequently, the attacker can restore some of the confidential messages, giving rise to the possibility of information leakage. Here we present a new robust General Nuser authentication protocol based on N-particle Greenberger–Horne–Zeilinger (GHZ) states, which makes eavesdropping detection more effective and secure, as compared to some current authentication protocols. The security analysis of our protocol for various kinds of attacks verifies that it is unconditionally secure, and that an attacker will not obtain any information about the transmitted key. Moreover, as the number of transferred key bits N becomes larger, while the number of users for transmitting the information is increased, the probability of effectively obtaining the transmitted authentication keys is reduced to zero. 相似文献
18.
设计了一组新的量子远程态制备步骤,在发送方对手中的粒子完成测量后,接收方采用该步骤可以有效降低远程态制备的经典通信消耗-给出一种利用部分纠缠的三粒子Greenberger-Horne-Zeilinger(GHZ)态和部分纠缠的二粒子态作信道,远程制备一个三粒子GHZ态的方案,以此方案为例具体说明上述方法的运用步骤并给出了该方法的适用范围-结果表明,运用该方法后只需消耗1bit经典信息即可远程制备一个三粒子GHZ态-
关键词:
远程态制备
经典通信消耗
三粒子Greenberger-Horne-Zeilinger态
量子信道 相似文献
19.
It is a simple introduction to quantum entanglement and quantum operations. The authors focus on some applications of quantum
entanglement and relations between two-qubit entangled states and unitary operations. It includes remote state preparation
by using any pure entangled states, nonlocal operation implementation using entangled states, entanglement capacity of two-qubit
gates and two-qubit gates construction.
Supported by the National Fundamental Research Program of China (Grant No. 2001CB309306), the National Natural Science Foundation
of China (Grant Nos. 60621064 and 10674127) and the Innovation Funds from Chinese Academy of Sciences 相似文献
20.
Cryptanalysis of quantum broadcast communication and authentication protocol with a one-time pad 下载免费PDF全文
Chang et al.[Chin.Phys.623 010305(2014)]have proposed a quantum broadcast communication and authentication protocol.However,we find that an intercept-resend attack can be preformed successfully by a potential eavesdropper,who will be able to destroy the authentication function.Afterwards,he or she can acquire the secret transmitted message or even modify it while escaping detection,by implementing an efficient man-in-the-middle attack.Furthermore,we show a simple scheme to defend this attack,that is,applying non-reusable identity strings. 相似文献