共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
Multipartite quantum secure direct communication (MQSDC) enables multiple message senders to simultaneously and independently transmit secret messages to a message receiver through quantum channels without sharing keys. Existing MQSDC protocols all assume that all the communication parties are legal, which is difficult to guarantee in practical applications. In this study, a single-photon based three-party QSDC protocol with identity authentication is proposed. In the protocol, the message receiver first authenticates the identity of two practical message senders. Only when the identity authentication is passed, the legal message senders can encode their messages by the hyper-encoding technology. In theory, two bits of messages can be transmitted to the message receiver in a communication round. The protocol can resist the external attack and internal attack, and guarantee the security of the transmitted messages and the identity codes of each legal message sender. The secret message capacity of the protocol is simulated with two-decoy-state method. The maximal communication distance between any two communication parties can reach 31.75 km with weak signal and decoy state pulses. The three-party QSDC protocol can be extended to a general MQSDC protocol and has important application in the further practical MQSDC field. 相似文献
4.
Multiparty Simultaneous Quantum Identity Authentication Based on Entanglement Swapping 总被引:1,自引:0,他引:1 下载免费PDF全文
We present a multiparty simultaneous quantum identity authentication protocol based on entanglement swapping. In our protocol, the multi-user can be authenticated by a trusted third party simultaneously. 相似文献
5.
Economical multiparty simultaneous quantum identity authentication based on Greenberger--Horne--Zeilinger states 下载免费PDF全文
A multiparty simultaneous quantum identity authentication protocol
based on Greenberger--Horne--Zeilinger (GHZ) states is proposed. The
multi-user can be authenticated by a trusted third party (TTP)
simultaneously. Compared with the scheme proposed recently (Wang
et al 2006, Chin. Phys. Lett. 23(9) 2360), the
proposed scheme has the advantages of consuming fewer quantum and
classical resources and lessening the difficulty and intensity of
necessary operations. 相似文献
6.
7.
Two multiparty simultaneous quantum identity authentication (MSQIA) protocols based on secret sharing are presented. All the
users can be authenticated by a trusted third party (TTP) simultaneously. In the first protocol, the TTP shares a random key
K with all the users using quantum secret sharing. The ith share acts as the authentication key of the ith user. When it is necessary to perform MSQIA, the TTP generates a random number R secretly and sends a sequence of single photons encoded with K and R to all the users. According to his share, each user performs the corresponding unitary operations on the single photon sequence
sequentially. At last, the TTP can judge whether the impersonator exists. The second protocol is a modified version with a
circular structure. The two protocols can be efficiently used for MSQIA in a network. They are feasible with current technology.
Supported by the National Basic Research Program of China (973 Program) (Grant No. 2007CB311100), the National High Technology
Research and Development Program of China (Grant Nos. 2006AA01Z419 and 20060101Z4015), the Major Research Plan of the National
Natural Science Foundation of China (Grant No. 90604023), the Scientific Research Common Program of Beijing Municipal Commission
of Education (Grant No. KM200810005004), the Scientific Research Foundation for the Youth of Beijing University of Technology
(Grant No. 97007016200701), the National Research Foundation for the Doctoral Program of Higher Education of China (Grant
No. 20040013007), the National Laboratory for Modern Communications Science Foundation of China (Grant No. 9140C1101010601),
and the Doctor Scientific Research Activation Foundation of Beijing University of Technology (Grant No. 52007016200702) 相似文献
8.
In this paper, a protocol for quantum millionaire problem with continuous variables is proposed. In the protocol, two participants can compare the values of their fortune with the assistance of a semi-trusted third party (STTP). Only EPR states are exploited in our protocol while most other protocols exploited d-dimensional Bell states. Two participants are just required to perform single particle operations, which makes our protocol more efficiently. Our protocol can ensure fairness, correctness, security and high efficiency as well. In our protocol, only the two participants can deduce the results of comparisons, others include STTP will learn no information. Our protocol can resist various kinds of attacks from both the outside eavesdroppers and the inside participants, even the STTP. 相似文献
9.
Recently, Gao et al.'s [Commun. Theor. Phys. 52 (2009) 421] multiparty quantum secret sharing (MQSS) protocol with two-photon three-dimensional Bell states was enhanced by Hwang et al. [Commun. Theor. Phys. 56 (2011) 79]. The improved protocol removes some unnecessary unitary operations, devices, and transmissions by the technique of decoy single photons and careful modification. However, in this paper, we investigate the security of the improved protocol and find it is insecure. The eavesdropper can steal all Alice's secret information. Furthermore, a feasible modification to remedy the security loophole is put forward. Our improved protocol provides a basic method to modify a kind of MQSS protocols which cannot resist the collusion attack. 相似文献
10.
Recently, Gao et al.'s [Commun. Theor. Phys. 52 (2009) 421] multiparty quantum secret sharing (MQSS) protocol with two-photon three-dimensional Bell states was enhanced by Hwang et al. [Commun. Theor. Phys. 56 (2011) 79]. The improved protocol removes some unnecessary unitary operations, devices, and transmissions by the technique of decoy single photons and careful modification. However, in this paper, we investigate the security of the improved protocol and find it is insecure. The eavesdropper can steal all Alice's secret information. Furthermore, a feasible modification to remedy the security loophole is put forward. Our improved protocol provides a basic method to modify a kind of MQSS protocols which cannot resist the collusion attack. 相似文献
11.
XIA Yan SONG Jie SONG He-Shan HUANG Xiao-Li HUANG Xiao-Li 《理论物理通讯》2008,49(6):1468-1472
We propose a new multiparty quantum secret sharing protocol via introducing auxiliary particles using a non-maximally entangled (pure) two-particle state without a Bell measurement. The communication parties utilize decoy particles tO check eavesdropping. After ensuring the security of the quantum channel, the sender encodes the secret message and transmits it to the receiver by using controlled-NOT operation and von Neumann measurement. If and only if all the agents agree to collaborate, they can read out the secret message. 相似文献
12.
In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication. The authentication key expansion method is introduced to improve the life of the keys with security. In the first scheme, the third party, called Trent is introduced to authenticate the users that participate in the communication. He sends the polarized photons in blocks toauthenticate communication parties Alice and Bob using the authentication keys. In the communication process, polarized single photons are used to serve as the carriers, which transmit the secret messages directly. The second QSDC process with authentication between two parties is also discussed. 相似文献
13.
In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication. The authentication key expansion method is introduced to improve the life of the keys with security. In the first scheme, the third party, called Trent is introduced to authenticate the users that participate in the communication. He sends the polarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys. In the communication process, polarized single photons are used to serve as the carriers, which transmit the secret messages directly. The second QSDC process with authentication between two parties is also discussed. 相似文献
14.
WANG Zhang-Yin YUAN Hao GAO Gan Shou-Hua 《理论物理通讯》2006,46(4):607-609
We present a robust (n, n)-threshold scheme for multiparty quantum secret sharing of key over two collectivenoise channels (i.e., the collective dephasing channel and the collective rotating channel) via three-photon mixed states, In our scheme, only if all the sharers collaborate together can they establish a joint key with the message sender and extract the secret message from the sender's encrypted message. This scheme can be implemented using only a Bell singlet, a one-qubit state and polarization identification of single photon, so it is completely feasible according to the present-day technique. 相似文献
15.
A multiparty quantum secret sharing (MQSS) protocol with two-photon three-dimensional Bell states was proposed by Gao [Commun. Theor. Phys.52 (2009) 421] recently. This study points out that the performance of Gao's protocol can be much improved by using the technique of decoy single photons
and carefully modifying the protocol to remove some unnecessary unitary operations, devices, and transmissions. 相似文献
16.
Quantum secure direct communication with Greenberger-Horne-Zeilinger-type state (GHZ state) over noisy channels 下载免费PDF全文
We propose a quantum error-rejection scheme for direct communication
with three-qubit quantum codes based on the direct communication of
secret messages without any secret key shared in advance. Given the
symmetric and independent errors of the transmitted qubits, our
scheme can tolerate a bit of error rate up to 33.1%, thus the
protocol is deterministically secure against any eavesdropping
attack even in a noisy channel. 相似文献
17.
Jun Liu Yi-Min Liu Zhan-Jun Zhang 《International Journal of Theoretical Physics》2008,47(9):2353-2362
We present a three-party quantum single-qutrit-state sharing scheme with a non-maximally entangled three-qutrit state as the
quantum channel. In the scheme, the sender’s secret quantum information (i.e., the single-qutrit state) is split in such a
way that it can be probabilistically reconstructed through introducing an auxiliary qutrit and performing appropriate operations
provided that the receivers both collaborate together. We work out the success probability and reveal the relation between
the probability and the parameters characterizing the quantum channel. After this, we then briefly introduce the generalization
of the three-party scheme to a more-party one. 相似文献
18.
YUAN Hao LIU Yi-Min HAN Lian-Fang ZHANG Zhan-Jun 《理论物理通讯》2008,49(5):1191-1194
A tripartite scheme for securely sharing an arbitrary unknown two-qutrit state is proposed, where two generalized Greenberger-Horne-Zeilinger (GHZ) states serve as the quantum channel linking the three legitimate parties. The quantum information (i.e., the arbitrary unknown two-qutrit state) from the sender can be split in such a way that it can be reconstructed deterministically by any agent via a proper unitary operation provided that both agents collaborates together. Moreover, the generalization of the tripartite scheme to more-party case is also outlined. 相似文献
19.
A quantum steganography communication scheme via Greenberger-Horne-Zeilinger GHZ 4 state is constructed to investigate the possibility of remotely transferred hidden information.Moreover,the multipartite entangled states are become a hectic topic due to its important applications and deep effects on aspects of quantum information.Then,the scheme consists of sharing the correlation of four particle GHZ4 states between the legitimate users.After insuring the security of the quantum channel,they begin to hide the secret information in the cover of message.Comparing the scheme with the previous quantum steganographies,capacity and imperceptibility of hidden message are good.The security of the present scheme against many attacks is also discussed. 相似文献
20.
We present a two-photon three-dimensional multiparty quantum secret sharing scheme. The secret messages are encoded by performing local operations. This is different from those quantum secret sharing protocols that all sharers must make a state measurement. The merit of our protocol is the high capacity. 相似文献