排序方式: 共有46条查询结果,搜索用时 15 毫秒
21.
Utilizing a three-particle W state, we come up with a protocol for the teleportation of an unknown two-particle entangled state. It is shown that the teleportation can be deterministically and exactly realized. Moreover, two-particle entanglement teleportation is generalized to a system consisting of many particles via a three-particle W state and a multi-particle W state, respectively. All unitary transformations performed by the receiver are given in a concise formula. 相似文献
22.
Two simple quantum broadcast communication schemes are proposed.A central party can broadcast his secret message to all the legitimate receivers simultaneously.Compared with the three schemes proposed recently (Wang et al.2007 Chin.Phys.16 1868),the proposed schemes have the advantages of consuming fewer quantum and classical resources,lessening the difficulty and intensity of necessary operations,and having higher efficiency. 相似文献
23.
研究了量子纠错码的等价性和保距同构,推广了Bogart等人的一些概念,并给出若干基本定理,这些定理对进一步研究量子码的等价性和保距同构是非常有用的.在此基础上构造出一个反例,证明了在量子情形下,MacWmiams的一个重要定理不成立. 相似文献
24.
Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collaboratively send a message to the verifier and convince the verifier that the message is actually transmitted by them. In this paper, we give a scalable arbitrated signature protocol of classical proved to be secure even with a compromised arbitrator. messages with multi-signers. Its security is analyzed and proved to be secure even with a compromised arbitrator. 相似文献
25.
提出了一种单个N维量子系统的量子秘密共享方案.在该方案中,利用对Bennett和Brassard协议(BB84协议)中使用的两基四态扩展到多基多态,分发者对要共享的秘密采用多基多态编码,将被编码的单个N维量子系统发送给他的两个代理人之一,该代理人利用一个N维克隆机对接收到的粒子做幺正操作,然后把粒子发送给另一代理人.在得知最后一个代理人接收到该粒子之后,分发者告知两个代理人他所用的制备基,然后两个代理人分别对自己的系统进行测量并在合作之后获知分发者所发送的粒子的量子态.该方案的安全性基于量子不可克隆定理.
关键词:
量子秘密共享
多基多态编码
N维克隆机
量子不可克隆定理 相似文献
26.
27.
Improving the security of secure deterministic communication scheme based on quantum remote state preparation 下载免费PDF全文
The security of the quantum secure deterministic communication
scheme [{\it Chin. Phys.} {\bf16} (2007) 2549] is reexamined. A
security loophole is pointed out. Taking advantage of this loophole,
an eavesdropper can steal all the secret messages without being
detected by an intercept-and-resend attack strategy. Furthermore, a
possible improvement on this protocol is presented. It makes the
modified protocol secure against this kind of attack. 相似文献
28.
An efficient quantum key distribution (QKD) protocol with orthogonal
product states in the 3 \otimes 3 Hilbert space is presented. The
sender, Alice, disorders the orthogonal product state sequence and
sends it to Bob. After Alice has published the matching information
of the particle sequence, Bob recovers the correct correspondences
and makes an orthogonal measurement on the orthogonal product states
to obtain the information sent by Alice. Finally, security analysis
is also made. 相似文献
29.
This paper proposes a scheme for secure authentication of classical
messages with single photons and a hashed function. The security
analysis of this scheme is also given, which shows that anyone
cannot forge valid message authentication codes (MACs). In addition,
the lengths of the authentication key and the MACs are invariable
and shorter, in comparison with those presented authentication
schemes. Moreover, quantum data storage and entanglement are not
required in this scheme. Therefore, this scheme is more efficient
and economical. 相似文献
30.
The security of quantum secret sharing based on entanglement
swapping is revisited and a participant attack is presented. In this
attack two dishonest agents together can illegally recover the
secret quantum state without the help of any other controller, and
it will not be detected by any other users. Furthermore, by
modifying the distribution process of particles and adding a
detection step after each distribution process, we propose an
improved protocol which can resist this kind of attack. 相似文献