共查询到20条相似文献,搜索用时 15 毫秒
1.
WANG Zhang-Yin 《理论物理通讯》2010,54(6):997-1002
I present a new protocol for three-party quantum secure direct communication (QSDC) with a set of ordered M Einstein-Podolsky-Rosen (EPR) pairs. In the scheme, by performing two unitary operations and Bell state measurements, it is shown that the three legitimate parties can exchange their respectivesecret message simultaneously. Then I modify it for an experimentally feasible and secure quantum sealed-bid auction (QSBD) protocol. Furthermore, I also analyze the security of the protocol, and the scheme is proven to be secure against the intercept-and-resend attack, the disturbance attack and the entangled-and-measure attack. 相似文献
2.
I present a new protocol for three-party quantum secure direct communication (QSDC) with a set of ordered M Einstein-Podolsky-Rosen (EPR) pairs. In the scheme, by performing two unitary operations and Bell state measurements, it is shown that the three legitimate parties can exchange their respective secret message simultaneously. Then I modify it for an experimentally feasible and secure quantum sealed-bid auction (QSBD) protocol. Furthermore, I also analyze th~ecurity of the protocol, and the scheme is proven to be secure against the intercept-and-resend attack, the disturbancb attack and the entangled-and-measure attack. 相似文献
3.
This paper proposes a protocol for lottery and a protocol for auction on quantum Blockchain. Our protocol of lottery satisfies randomness, unpredictability, unforgeability, verifiability, decentralization and unconditional security. Our protocol of auction satisfies bid privacy, posterior privacy, bids’ binding, decentralization and unconditional security. Except quantum Blockchain, the main technique involved in both protocols is quantum bit commitment. 相似文献
4.
GAO Ting YAN FengLi & LI YouCheng College of Mathematics Information Science Hebei Normal University Shijiazhuang China College of Physics Information Engineering Hebei Advanced Thin Films Laboratory 《中国科学G辑(英文版)》2009,(8)
A quantum secret sharing scheme between an m-party group and an n-party group is proposed using three conjugate bases.A sequence of single photons,each of which is prepared in one of the six states,is used directly to encode classical information in the quantum secret sharing process.In this scheme,each of all m members in group 1 chooses randomly his/her own secret key individually and independently,and directly encodes his/her respective secret information on the states of single photons via unitary opera... 相似文献
5.
HE Guang-Qiang ZENG Gui-Hua 《理论物理通讯》2006,46(7)
A quantum encryption protocol based on Gaussian-modulated continuous variable EPR correlations is proposed. The security is guaranteed by continuous variable EPR entanglement correlations produced by nondegenerate optical parametric amplifier (NOPA). For general beam splitter eavesdropping strategy, the mutual information Ⅰ(α, ε)between Alice and Eve is calculated by employing Shannon information theory. Finally the security analysis is presented. 相似文献
6.
A two-step quantum secure direct dialogue protocol using Einstein-Podolsky-Rosen(EPR)pair block is proposed.In the protocol,the dialogue messages are encoded on series of qubits and sent through a quantum channel directly.The security of the protocol is assured by its connection to the two-step quantum secure direct communication protocol,which has been proved secure.This protocol has several advantages.It is a direct communication protocol that does not require a separate classical communication for the ciphertext.It has high capacity as two bits of secret messages can be transmitted by an EPR pair.As a dialogue protocol,the two parties can speak to each other either simultaneously or sequentially. 相似文献
7.
8.
A quantum secret sharing scheme between an m-party group and an n-party group is proposed using three conjugate bases. A sequence of single photons, each of which is prepared in one of the
six states, is used directly to encode classical information in the quantum secret sharing process. In this scheme, each of
all m members in group 1 chooses randomly his/her own secret key individually and independently, and directly encodes his/her respective
secret information on the states of single photons via unitary operations, then the last one sends 1/n of the resulting qubits to each member of group 2. By measuring their respective qubits, all members in group 2 share the
secret information shared by all members in group 1. It renders impossible a Trojan horse attack with a multi-photon signal,
a fake-signal attack with EPR pairs, an attack with single photons, and an attack with invisible photons. We give the upper
bounds on the average success probabilities for dishonest agent eavesdropping encryption using the fake-signal attack with
any two-particle entangled states.
Supported by the National Natural Science Foundation of China (Grant No. 10671054), the Key Project of Science and Technology
Research of Education Ministry of China (Grant No. 207011) and the Natural Science Foundation of Hebei Province, China (Grant
Nos. 07M006 and F2009000311) 相似文献
9.
Recently, Liu et al. [Commun. Theor. Phys. 57(2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants' information with the help of a semi-honest third party(TP). However, the present study points out there is a fatal loophole in Liu et al.'s protocol, and TP can make Bell-basis measurement to know all the participants' secret inputs without being detected. To fix the problem, a simple solution, which uses one-time eavesdropper checking with decoy photons instead of twice eavesdropper checking with Bell states, is demonstrated. Compared with the original protocol,it not only reduces the Bell states consumption but also simplifies the protocol steps. 相似文献
10.
SHI Shi-Wei YANG Qun YI You-Min 《理论物理通讯》2006,46(1):58-60
A deterministic teleportation scheme for an arbitrary two-particle state is proposed in cavity QED. The success probability can reach 1.0. In addition, the scheme is insensitive to both the cavity decay and the thermal field. 相似文献
11.
SHI Shi-Wei YANG Qun YI You-Min 《理论物理通讯》2006,46(7)
A deterministic teleportation scheme for an arbitrary two-particle state is proposed in cavity QED. The success probability can reach 1.0. In addition, the scheme is insensitive to both the cavity decay and the thermal field. 相似文献
12.
Recently, Liu et al. [Commun. Theor. Phys. 57 (2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants' information with the help of a semi-honest third party (TP). However, the present study points out there is a fatal loophole in Liu et al.'s protocol, and TP can make Bell-basis measurement to know all the participants' secret inputs without being detected. To fix the problem, a simple solution, which uses one-time eavesdropper checking with decoy photons instead of twice eavesdropper checking with Bell states, is demonstrated. Compared with the original protocol, it not only reduces the Bell states consumption but also simplifies the protocol steps. 相似文献
13.
Two Avowable Quantum Communication Schemes 总被引:1,自引:0,他引:1
YAN Feng-Li DING Dong 《理论物理通讯》2008,50(11):1109-1112
Two avowable quantum communication schemes are proposed. One is an avowable teleportation protocol based on the quantum cryptography. In this protocol one teleports a set of one-particle states based on the availability of an honest arbitrator, the keys and the Einstein Podolsky-Rosen pairs shared by the communication parties and the arbitrator. The key point is that the fact of the teleportation can neither be disavowed by the sender nor be denied by the receiver. Another is an avowable quantum secure direct communication scheme. A one-way Hash function chosen by the communication parties helps the receiver to validate the truth of the information and to avoid disavowing for the sender. 相似文献
14.
Recently, Gao et al.'s [Commun. Theor. Phys. 52 (2009) 421] multiparty quantum secret sharing (MQSS) protocol with two-photon three-dimensional Bell states was enhanced by Hwang et al. [Commun. Theor. Phys. 56 (2011) 79]. The improved protocol removes some unnecessary unitary operations, devices, and transmissions by the technique of decoy single photons and careful modification. However, in this paper, we investigate the security of the improved protocol and find it is insecure. The eavesdropper can steal all Alice's secret information. Furthermore, a feasible modification to remedy the security loophole is put forward. Our improved protocol provides a basic method to modify a kind of MQSS protocols which cannot resist the collusion attack. 相似文献
15.
本文在87 Rb冷原子系综中通过自发拉曼散射过程进行了量子关联光子对产生的实验研究,测量了关联光子对的产生率和二阶关联函数g(2)随写光激发率、读光功率以及写光失谐等实验参数的关系曲线。结果表明:随着写光激发率的增加,光子对产生率线性增加,g(2)则不断减小;在小的读光功率处,光子对产生率和g(2)随着读光功率增加而增大,当读光功率超过30 mW后,产生率和g(2)随着读光功率增加反而有所下降;写光频率失谐为-5 MHz时光子对产生率和g(2)均达到最低,增大或减小写光失谐产生率和g(2)均逐渐增加。通过选取合适的实验参数,光子对产生率达到18对/秒,同时g(2)为106。本文的研究结果为产生高质量的纠缠源提供了实验基础。 相似文献
16.
光纤中基于三阶(克尔)非线性效应的自发四波混频是制备量子关联光子对的有效方法之一。若采用商售高非线性光纤作为产生光子对的非线性介质,则有利于减小所需光纤的长度,从而缩小实验装置体积并降低对于抽运源的要求。利用脉冲光抽运20m的高非线性光纤产生通讯波段的频率近简并关联光子对,研究了光纤的弱双折射特性对于光子对产生的影响。当抽运光沿高非线性光纤的偏振轴入射时,具有最大的光子对产生效率,且光子对绝大部分与抽运光偏振平行;抽运光沿与光纤偏振轴45°入射时,光子对的产生效率最小,约为最大值的80%。 相似文献
17.
二粒子纠缠态(EPR对)的量子隐形传送 总被引:1,自引:1,他引:1
采用三粒子最大纠缠态作辅助量子信道,定义出能被Alice作联合测量的四个特殊的"GHZ"态,Bob实施简单操作,两粒子纠缠态(EPR对)的量子隐形传递顺利达成. 相似文献
18.
The teleportation of an arbitrary n-particle state (n ≥ 1) is proposed if n pairs of identical EPR states are utilized as quantum channels. Independent Bell state measurements are performed for joint measurement. By using a special Latin square of order 2n(n ≥ 1), explicit expressions of outcomes after the Bell state measurements by Alice (sender) and the corresponding unitary transformations by Bob (receiver) can be derived. It is shown that the teleportation of n-particle state can be implemented by a series of single-qubit teleportation. 相似文献
19.
A protocol of quantum secret sharing between multiparty and multiparty with four states was presented. It was shown that this
protocol can nullify the Trojan horse attack with a multi-photon signal, the fake-signal attack with Einstein-Podolsky-Rosen
pairs, the attack with single photons, and the attack with invisible photons. In addition, the upper bounds of the average
success probabilities were given for dishonest agent eavesdropping encryption using the fake-signal attack with any two-particle
entangled states.
Supported by the National Natural Science Foundation of China (Grant No. 10671054), the Key Project of Science and Technology
Research of Education Ministry of China (Grant No. 207011) and the Natural Science Foundation of Hebei Province, China (Grant
Nos. A2005000140 and 07M006) 相似文献
20.
A scheme of teleportation of an arbitrary three-particle
state is presented when three
pairs of entangled particles are used as quantum channels.
After the Bell state
measurements are operated by the sender, the original state with deterministic
probability can be reconstructed by the receiver when a corresponding unitary
transformation is followed. 相似文献