共查询到20条相似文献,搜索用时 0 毫秒
1.
In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The correctness and security of our protocol are discussed.One party cannot learn the other's private information and the third party also cannot learn any information about the private information. 相似文献
2.
Tian-Yu Ye 《理论物理通讯》2016,66(3):280-290
Recently, Liu et al. proposed a two-party quantum private comparison (QPC) protocol using entanglement swapping of Bell entangled state (Commun. Theor. Phys. 57 (2012) 583). Subsequently, Liu et al. pointed out that in Liu et al.'s protocol, the TP can extract the two users' secret inputs without being detected by launching the Bell-basis measurement attack, and suggested the corresponding improvement to mend this loophole (Commun. Theor. Phys. 62 (2014) 210). In this paper, we first point out the information leakage problem toward TP existing in both of the above two protocols, and then suggest the corresponding improvement by using the one-way hash function to encrypt the two users' secret inputs. We further put forward the three-party QPC protocol also based on entanglement swapping of Bell entangled state, and then validate its output correctness and its security in detail. Finally, we generalize the three-party QPC protocol into the multi-party case, which can accomplish arbitrary pair's comparison of equality among K users within one execution. 相似文献
3.
A quantum secure direct communication scheme using dense coding is proposed. At first, the sender (Alice) prepares four-particle genuine entangled states and shares them with the receiver (Bob) by sending two particles in each entangled state to him. Secondly, Alice encodes secret information by performing the unitarytransformations on her particles and transmits them to Bob. Finally, Bob performs the joint measurements on his particles to decode the secret information. The two-step security test guarantees the security of communication. 相似文献
4.
A quantum secure direct communication scheme using dense coding is proposed. At first, the sender (Alice) prepares four-particle genuine entangled states and shares them with the receiver (Bob) by sending two particles in each entangled state to him. Secondly, Alice encodes secret information by performing the unitary transformations on her particles and transmits them to Bob. Finally, Bob performs the joint measurements on his particles to decode the secret information. The two-step security test guarantees the security of communication. 相似文献
5.
We propose two schemes for splitting single- and two-qubit states by using four-particle genuine entangled state as the quantum channel. After the sender performs Bell-basis (or three-partite GHZ- basis) measurements on her particles, and the cooperators operate single-particle measurements on their particles, the state receiver can reconstruct the original state of the sender by applying the appropriate unitary operation. In particular, in the scheme for splitting two-qubit state, the receiver needs to introduce an auxiliary particle and carries out a C-NOT operation. 相似文献
6.
We propose a potential scheme to generate a genuine six-atom entangled state [J. Phys. A 42 (2009) 415301] by using atoms in cavity QED system, where the atoms interact simultaneously with the highly detuned single-mode cavity and the strong classical driving field. Thus our approach is insensitive to both the cavity decay and thermal field. 相似文献
7.
We propose a potential scheme to generate a genuine six-atom entangled state [J. Phys. A 42 (2009) 415301] by using atoms in cavity QED system, where the atoms interact simultaneously with the highly detuned single-mode cavity and the strong classical driving field. Thus our approach is insensitive to both the cavity decay and thermal field. 相似文献
8.
Yan Chang Wen-Bo Zhang Shi-Bin Zhang Hai-Chun Wang Li-Li Yan Gui-Hua Han Zhi-Wei Sheng Yuan-Yuan Huang Wang Suo Jin-Xin Xiong 《理论物理通讯》2016,66(6):621-628
A protocol for quantum private comparison of equality (QPCE) is proposed based on five-particle cluster state with the help of a semi-honest third party (TP). In our protocol, TP is allowed to misbehave on its own but can not conspire with either of two parties. Compared with most two-user QPCE protocols, our protocol not only can compare two groups of private information (each group has two users) in one execution, but also compare just two private information. Compared with the multi-user QPCE protocol proposed, our protocol is safer with more reasonable assumptions of TP. The qubit efficiency is computed and analyzed. Our protocol can also be generalized to the case of 2N participants with one TP. The 2N-participant protocol can compare two groups (each group has N private information) in one execution or just N private information. 相似文献
9.
10.
通过介绍六粒子纠缠态的新应用研究,提出了一个二粒子任意态的信息分离方案.在这个方案中,发送者Alice、控制者Charlie和接受者Bob共享一个六粒子纠缠态,发送者先执行两次Bell基测量|然后控制者执行一次Bell基测量|最后接受者根据发送者和控制者的测量结果,对自己拥有的粒子做适当的幺正变换,从而能够重建要发送的二粒子任意态.这个信息分离方案是决定性的,即成功概率为100%.与使用相同的量子信道进行二粒子任意态的信息分离方案相比,本文提出的方案只需要进行Bell基测量而不需要执行多粒子的联合测量,从而使得这个方案更简单、更容易,并且在目前的实验室技术条件下是能够实现的. 相似文献
11.
Ai-Xia Shao Jian-Zhong Zhang Shu-Cui Xie 《International Journal of Theoretical Physics》2016,55(12):5216-5224
In this paper, a very efficient and secure multi-proxy multi-blind-signature scheme is proposed which is based on controlled quantum teleportation. Genuine six-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to guarantee its unforgeability, undeniability, blindness and unconditional security. 相似文献
12.
13.
As a multi-particle entangled state, the Greenberger–Horne–Zeilinger (GHZ) state plays an important role in quantum theory and applications. In this study, we propose a flexible multi-user measurement-device-independent quantum key distribution (MDI-QKD) scheme based on a GHZ entangled state. Our scheme can distribute quantum keys among multiple users while being resistant to detection attacks. Our simulation results show that the secure distance between each user and the measurement device can reach more than 280 km while reducing the complexity of the quantum network. Additionally, we propose a method to expand our scheme to a multi-node with multi-user network, which can further enhance the communication distance between the users at different nodes. 相似文献
14.
Recently, Liu et al. [Commun. Theor. Phys. 57(2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants' information with the help of a semi-honest third party(TP). However, the present study points out there is a fatal loophole in Liu et al.'s protocol, and TP can make Bell-basis measurement to know all the participants' secret inputs without being detected. To fix the problem, a simple solution, which uses one-time eavesdropper checking with decoy photons instead of twice eavesdropper checking with Bell states, is demonstrated. Compared with the original protocol,it not only reduces the Bell states consumption but also simplifies the protocol steps. 相似文献
15.
Recently, Liu et al. [Commun. Theor. Phys. 57 (2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants' information with the help of a semi-honest third party (TP). However, the present study points out there is a fatal loophole in Liu et al.'s protocol, and TP can make Bell-basis measurement to know all the participants' secret inputs without being detected. To fix the problem, a simple solution, which uses one-time eavesdropper checking with decoy photons instead of twice eavesdropper checking with Bell states, is demonstrated. Compared with the original protocol, it not only reduces the Bell states consumption but also simplifies the protocol steps. 相似文献
16.
利用非Bell基测量实现两粒子纠缠态的隐形传输 总被引:1,自引:1,他引:1
研究无Bell基测量的未知两粒子纠缠态的隐形传态方案。Alice需传送未知两原子纠缠态给Bob,以她和Bob的原子组成的最大纠缠GHZ态作为量子信道,通过两原子同时在一个强经典驱动场驱动下和一个单模腔场发生相互作用,产生态的演化,从而实现隐形传态。本方案可忽略腔场热作用和腔延迟作用的影响,传送成功的总几率为1。 相似文献
17.
We propose a protocol where one can realize quantum cloning of an unknown two-particle entangled state and its orthogonal-complement
state with assistance offered by a state preparer. The first stage of the protocol requires usual teleportation using a (or
two) four-particle entangled state(s) as quantum channel(s). In the second stage of the protocol, with the assistance (through
a two-particle projective measurement) of the preparer, the perfect copies and complement copies of an unknown state can be
produced. 相似文献
18.
Recently Wei-Bo Gao et al. [Phys. Rev. Lett. 104 (2010) 020501]; reported on the creation of a 4-photon 6-qubit cluster state. It is shown this states can be utilized for perfect teleportation of arbitrary three qubit systems and controlled teleportation of an arbitrary two-qubit state. Therefore, the six-qubit cluster state as quantum channels is equivalent to that of maximally six-qubit entangled state. 相似文献
19.
There are practical motivations to construct genuine tripartite entangled states based on the collective use of two bipartite entangled states. Here, the case that the states are two‐qubit Werner states is considered. The intervals of parameters of two‐qubit Werner states are revealed such that the tripartite state is genuinely entangled. Furthermore, we also investigate the lower bound of genuine multipartite entanglement concurrence for tripartite qudit states. Several examples are given to show the effectiveness of the lower bound. 相似文献