首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 11 毫秒
1.
Recently, Liu et al. [Commun. Theor. Phys. 57 (2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants' information with the help of a semi-honest third party (TP). However, the present study points out there is a fatal loophole in Liu et al.'s protocol, and TP can make Bell-basis measurement to know all the participants' secret inputs without being detected. To fix the problem, a simple solution, which uses one-time eavesdropper checking with decoy photons instead of twice eavesdropper checking with Bell states, is demonstrated. Compared with the original protocol, it not only reduces the Bell states consumption but also simplifies the protocol steps.  相似文献   

2.
Recently, Liu et al. proposed a two-party quantum private comparison (QPC) protocol using entanglement swapping of Bell entangled state (Commun. Theor. Phys. 57 (2012) 583). Subsequently, Liu et al. pointed out that in Liu et al.'s protocol, the TP can extract the two users' secret inputs without being detected by launching the Bell-basis measurement attack, and suggested the corresponding improvement to mend this loophole (Commun. Theor. Phys. 62 (2014) 210). In this paper, we first point out the information leakage problem toward TP existing in both of the above two protocols, and then suggest the corresponding improvement by using the one-way hash function to encrypt the two users' secret inputs. We further put forward the three-party QPC protocol also based on entanglement swapping of Bell entangled state, and then validate its output correctness and its security in detail. Finally, we generalize the three-party QPC protocol into the multi-party case, which can accomplish arbitrary pair's comparison of equality among K users within one execution.  相似文献   

3.
In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The correctness and security of our protocol are discussed.One party cannot learn the other's private information and the third party also cannot learn any information about the private information.  相似文献   

4.
Entangled quantum states are an important component of quantum computing techniques such as quantum error-correction, dense coding, and quantum teleportation. We describe how to generate fully entangled states in the Hilbert space C N C N starting from a unitary matrix and show that they form an orthonormal basis in this space.  相似文献   

5.
叶天语 《光子学报》2014,43(5):502701
提出一个无信息泄露的受控双向量子安全直接通信协议.协议中合法通信双方Alice和Bob在控制者Charlie的控制下实现彼此秘密信息的安全交换,利用3个Bell态纠缠交换后的测量相关性来克服信息泄露问题.由于该协议仅利用Bell态作为量子资源,而且仅需要进行Bell测量,所以方便实现.安全性分析表明,该协议不仅能检测到外部窃听者的主动攻击,而且还能检测到控制者Charlie的不诚实行为,因此,具备良好的安全性.  相似文献   

6.
Using the highly entangled six-qubit genuine state we present a quantum private comparison (QPC) protocol, which enables two users to compare the equality of two bits of their secrets in every round comparison with the assistance of a semi-honest third party (TP). The proposed protocol needs neither unitary operations nor quantum entanglement swapping technology, both of which may consume expensive quantum devices. Single particle measurements and Bell-basis measurements, which are easy to implement with current technologies, are employed by two users and TP in the proposed protocol, respectively. The proposed protocol can withstand all kinds of outside attacks and participant attacks. Moreover, none of information about the two users’ private secrets and the comparison result is leaked out to TP.  相似文献   

7.
At present, the anti-noise property and the information leakage resistant property are two great concerns for quantum dialogue(QD). In this paper, two anti-noise QD protocols without information leakage are presented by using the entanglement swapping technology for two logical Bell states. One works well over a collective-dephasing noise channel, while the other takes effect over a collective-rotation noise channel. The negative influence of noise is erased by using logical Bell states as the traveling quantum states. The problem of information leakage is avoided by swapping entanglement between two logical Bell states. In addition, only Bell state measurements are used for decoding, rather than four-qubit joint measurements.  相似文献   

8.
GAO Gan 《理论物理通讯》2009,51(5):820-822
Based on entanglement swapping, a quantum key distribution (QKD) scheme is proposed. In this scheme, the secret keys are formed by comparing initial Bell states and outcomes of entanglement swapping. Moreover, all initial Bell states prepared by Alice and Bob are completely arbitrary. As the classical information exchanged between two parties is very little, this QKD scheme has a high efficiency. In addition, in order to prevent eavesdropping, decoy particles are used.  相似文献   

9.
In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states.  相似文献   

10.
Quantum private comparison (QPC) aims to accomplish the equality comparison of secret inputs from two users on the basis of not leaking their contents out. Recently, Chen et al. proposed the QPC protocol based on triplet GHZ state and single-particle measurement (Optics Communications 283, 1561–1565 (2010)). In this paper, they suggested the standard model of a semi-honest third party (TP) for the first time, and declared that their protocol is secure. Subsequently, Lin et al. pointed out that in Chen et al.’s protocol, one user can extract the other user’s secret without being discovered by performing the intercept-resend attack, and suggested two corresponding improvements (Optics Communications 284, 2412–2414 (2011)). However, Yang et al. first pointed out that the model of TP adopted by both Chen et al.’s protocol and Lin et al.’s improved protocols is unreasonable, and thought that a practical TP may also try any possible means to steal the users’ secrets except being corrupted by the adversary including the dishonest user (Quantum Inf Process 12, 877–885 (2013). In this paper, after taking the possible attacks from TP into account, we propose the eavesdropping strategy of TP toward Lin et al.’s improved protocols and suggest two feasible solutions accordingly.  相似文献   

11.
Based on two atoms and two cavities initially in two pairs of atom-photon nonmaximally entangled states, we propose a relatively simple scheme to create maximally entangled photon-photon and atom-photon states via entanglement swapping using techniques of cavity QED inspired by the scheme proposed in [Phys. Rev. A 71 (2005)044302] and [Phys. Rev. A 71 (2005) 034312]. Our scheme does not involve the measurement in Bell basis, we only require detecting the states of atoms.  相似文献   

12.
Based on two atoms and two cavities initially in two pairs of atom-photon nonmaximally entangled states, we propose a relatively simple scheme to create maximally entangled photon-photon and atom-photon states via entanglement swapping using techniques of cavity QED inspired by the scheme proposed in [Phys. Rev. A 71 (2005) 044302] and [Phys. Rev. A 71 (2005) 034312]. Our scheme does not involve the measurement in Bell basis, we only require detecting the states of atoms.  相似文献   

13.
14.
By using the partial transpose and realignment method, we study the time evolution of the bound entanglement under the bilinear-biquadratie Hamiltonian. For the initial Horodecki's bound entangled state, it keeps bound entangled for some time, while for the initial bound entangled states constructed from the unextendable product basis, they become free once the time evolution begins. The time evolution provides a new way to construct bound entangled states, and also gives a method to free bound entanglement.  相似文献   

15.
Bell inequality is violated by the quantum mechanical predictions made from an entangled state of the composite system. In this paper we examine this inequality and entanglement measures in the construction of the coherent states for two-qubit pure and mixed states. we find a link to some entanglement measures through some new parameters (amplitudes of coherent states). Conditions for maximal entanglement and separability are then established for both pure and mixed states. Finally, we analyze and compare the violation of Bell inequality for a class of mixed states with the degree of
entanglement by applying the formalism of Horodecki et al.  相似文献   

16.
International Journal of Theoretical Physics - In this paper, inspired by Wang et al.’s deterministic secure quantum communication (DSQC) scheme (Commun. Theor. Phys. 60 (2013)...  相似文献   

17.
Quantum Key Distribution Scheme Based on Dense Encoding in Entangled States   总被引:1,自引:0,他引:1  
A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the four one-qubit unitary operations implemented by Alice and the Bell states measurement implemented by Bob in stead of direct measuring the previously shared Einstein-Podolsky-Rosen pairs by both of the distant parties, Alice and Bob. Considering the practical application we can get the conclusion that our protocol has some advantages. It not only simplifies the measurement which may induce potential errors, but also improves the effectively transmitted rate of the generated qubits by the raw key. Here we also discuss eavesdropping attacks against the scheme and the channel loss.  相似文献   

18.
<正>In this paper an arbitrated quantum signature scheme based on entanglement swapping is proposed.In this scheme a message to be signed is coded with unitary operators.Combining quantum measurement with quantum encryption, the signer can generate the signature for a given message.Combining the entangled states generated by the TTP’s Bell measurement with the signature information,the verifier can verify the authentication of a signature through a single quantum state measurement.Compared with previous schemes,our scheme is more efficient and less complex, furthermore,our scheme can ensure the anonymity of the signer.  相似文献   

19.
International Journal of Theoretical Physics - In this paper, a multi-party quantum private comparison (MQPC) scheme is suggested based on entanglement swapping of Bell entangled states within...  相似文献   

20.
We present a new quantum private comparison protocol based on the three-particle GHZ states. In this protocol, we prepare two types of GHZ states and use their entanglement properties to encode and compare the private information of X and Y. We also discuss that our protocol can withstand all various kinds of outside attacks and participant attacks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号