共查询到20条相似文献,搜索用时 15 毫秒
2.
International Journal of Theoretical Physics - In this paper, inspired by Wang et al.’s deterministic secure quantum communication (DSQC) scheme (Commun. Theor. Phys. 60 (2013)... 相似文献
3.
At present, the anti-noise property and the information leakage resistant property are two great concerns for quantum dialogue(QD). In this paper, two anti-noise QD protocols without information leakage are presented by using the entanglement swapping technology for two logical Bell states. One works well over a collective-dephasing noise channel, while the other takes effect over a collective-rotation noise channel. The negative influence of noise is erased by using logical Bell states as the traveling quantum states. The problem of information leakage is avoided by swapping entanglement between two logical Bell states. In addition, only Bell state measurements are used for decoding, rather than four-qubit joint measurements. 相似文献
5.
Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem ( QPKC) based on the Bell states. By Holevo’ s theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack ( CPA). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme. 相似文献
6.
In this paper, we proposed two semi-quantum direct communication protocols based on Bell states. By pre-sharing two secret keys between two communicants, Alice with the advanced quantum ability can transmit secret messages to the classical Bob who can only perform the limited classical operations. At the same time, both sides of the communication can comfirm the legitimacy of each other’s identity. Security and qubit efficency analysis have been given. The analysis results show that the two protocols can resistant to several well-known attacks and their qubit efficency is higher than some current protocols. 相似文献
8.
Hwang et al. (Phys. Scr. 83:045004, 2011) proposed a high efficient multiparty quantum secret sharing by using Greenberger-Horne-Zeilinger (GHZ) states. But Liu et al. (Phys. Scr. 84:045015, 2011) analyzed the security of Hwang et al.’s protocol and found that it was insecure for Charlie who might obtain half of information about the dealer’s secret directly. They put forward an improved protocol by adding operation on photons in sequence S 3. However, we point out Liu et al.’s protocol is not secure too if a dishonest participant Charlie carries out intercept-resend attack. And a further improved quantum secret sharing protocol is proposed based on Bell states in this paper. Our newly proposed protocol can stand against participant attack, provide a higher efficiency in transmission and reduce the complexity of implementation. 相似文献
9.
In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The correctness and security of our protocol are discussed.One party cannot learn the other's private information and the third party also cannot learn any information about the private information. 相似文献
10.
Entanglement is the main resource in quantum communication. The main aims of the arbitrated quantum signature (AQS) scheme are to present an application of the entanglement in cryptology and to prove the possibility of the quantum signature. More specifically, the main function of quantum entangled states in the existing AQS schemes is to assist the signatory to transfer quantum states to the receiver. However, teleportation and the Leung quantum one-time pad (L-QOTP) algorithm are not enough to design a secure AQS scheme. For example, Pauli operations commute or anticommute with each other, which makes the implementation of attacks easily from the aspects of forgery and disavowal. To conquer this shortcoming, we construct an improved AQS scheme using a new QOTP algorithm. This scheme has three advantages: it randomly uses the Hadamard operation in the new QOTP to resist attacks by using the anticommutativity of nontrivial Pauli operators and it preserves almost all merits in the existing AQS schemes; even in the process of handling disputes, no party has chance to change the message and its signature without being discovered; the receiver can verify the integrity of the signature and discover the disavow of the signatory even in the last step of verification. 相似文献
11.
Information leakage in quantum dialogue (QD) or bidirectional quantum secure direct communication (BQSDC) was found ten years ago, but enough attention was not paid and even wrong conclusions were drawn. It is indeed necessary to emphasize the importance. Here, we find information leakage exists in the QD protocol based on entanglement swapping between any two Bell states and the shared secret Bell state. To be specific, half of the interchanged information is leaked out unconsciously. This is not allowed in a truly secure QD protocol. Afterward, this QD protocol is improved to the one without information leakage. Compared with the original one, there are some obvious advantages in the improved version. 相似文献
12.
Transmitting quantum states by channels of analogous Bell states is studied in this paper. We analyze the transmitting process. constructed the probabilitic unitary operator, and gain the largest successful transfer quantum state probability. 相似文献
13.
In this paper, a controlled quantum dialogue protocol is designed based on five-qubit entangled states. One five-qubit entangled state can be used to exchange one communicant’s two private bits with the other communicant’s two private bits under the control of an honest supervisor. Security analysis turns out that it can overcome the information leakage problem and can resist the active attacks from an outside attacker. The designed protocol only needs single-particle measurements and Bell state measurements, both of which can be realized with current technologies. 相似文献
14.
International Journal of Theoretical Physics - Identity authentication is an important method to realize information protection in communication. This paper proposes a semi-quantum mutual identity... 相似文献
15.
International Journal of Theoretical Physics - In this paper, by using entanglement swapping of Bell states, an efficient quantum private comparison(QPC) protocol with a semi-honest party is... 相似文献
16.
In 2014, Liu et al. (In. J. Thero. phys. 53(5); 1569–1579. 2014) proposed an arbitrated quantum signature scheme (Liu’14) with Bell states by utilizing a new quantum one-time pad algorithm. It claimed that it can resist the receiver’s existential forgery attack and no party has chances to change the message and its signature without being discovered. Recently, Xu and Zou (In. J. Thero. phys. 55; 4142-4156. 2016) analyzed above scheme and demonstrated that it can’t resist the signer’s disavowal and the receiver’s existential forgery. But, the authors didn’t give a method to solve it. In this paper, we will give an improved arbitrated quantum signature scheme to make up the loopholes in Liu’14. 相似文献
17.
A multiparty quantum secret sharing with Bell states and Bell measurement has been proposed by Shi et al., but it is not secure for two dishonest agents. In this paper, an improved scheme is proposed in order to prevent this attack and its security is also analyzed. 相似文献
18.
A quantum dialogue protocol is proposed based on triple particle W states. Each particle is transferred only once in the entire communication, which reduces the risk of eavesdropping and improves the security of the protocol. The protocol can resist various attacks. The efficiency of this protocol can be up to 80 % without information leakage. 相似文献
19.
提出一个无信息泄露的受控双向量子安全直接通信协议.协议中合法通信双方Alice和Bob在控制者Charlie的控制下实现彼此秘密信息的安全交换,利用3个Bell态纠缠交换后的测量相关性来克服信息泄露问题.由于该协议仅利用Bell态作为量子资源,而且仅需要进行Bell测量,所以方便实现.安全性分析表明,该协议不仅能检测到外部窃听者的主动攻击,而且还能检测到控制者Charlie的不诚实行为,因此,具备良好的安全性. 相似文献
20.
Controller-independent quantum dialogue (CIQD) is a significant topic in the research of quantum secure direct communication (QSDC). In this paper, we propose a new CIQD protocol with a special kind of four-particle entangled states. From our security analysis, it can be seen that the information leakage which is a serious problem in many CIQD protocols will be prevented in our protocol. Moreover, the presented protocol can resist many existing attacks, including intercept-and-resend attack, entangle-and-measure attack, fake entangled particles attack. 相似文献
|