排序方式: 共有26条查询结果,搜索用时 0 毫秒
21.
提出了一种网络多用户量子认证和密钥分配理论方案.类似于现代密码学中的网络认证体系结构提出了一种基于网络中用户与所属的可信服务器之间共享Einstein-Podolsky-Rosen(EPR)纠缠对进行身份认证和密钥分配的分布式客户机/服务器体系结构.基于该体系结构实现网络中任意用户之间的身份认证和密钥分配.可信服务器只提供用户的身份认证以及 交换粒子之间的纠缠使得两个想要秘密通信的用户的粒子纠缠起来.密钥的生成由发起请求 的用户自己完成.网络中的用户只需和所属的可信服务器共享EPR纠缠对通过经典信道和量子 信道与服务器通信.用户不需要互相共享EPR纠缠对,这使得网络中的EPR对的数量由O(n2)减小到O(n).
关键词:
量子认证
量子密钥分配
客户机/服务器
纠缠交换 相似文献
22.
23.
如何提高实际量子密钥分发系统的安全码率和最远传输距离是量子密码学领域重要的研究课题. 本文采用量子无噪线性光放大器放大量子信号, 以改进连续变量量子密钥分发系统实际性能. 经仔细研究, 本文发现增益系数为g的线性无噪放大器可将连续变量量子密钥分发系统的最远安全传输距离提高20 log10(g)/a km (a=0.2 dB/km为光纤信道的损耗系数), 并改善系统的安全码率和噪声抗性.
关键词:
量子密钥分发
连续变量
最远传输距离
线性无噪放大器 相似文献
24.
A quantum secure direct communication protocol over a collective rotating channel is proposed. The protocol encodes logical bits in noiseless subspaces, and so it can function over a quantum channel subjected to an arbitrary degree of collective rotating noise. Although entangled states are used, both the sender and receiver are only required to perform single-particle product measurement or Pauli operations. The protocol is feasible with present-day technique. 相似文献
25.
An efficient two-step quantum key distribution (QKD) protocol with
orthogonal product states in the n\otimes n(n\geq3)Hilbert space
is presented. In this protocol, the particles in the orthogonal
product states form two particle sequences. The sender, Alice, first
sends one sequence to the receiver, Bob. After Bob receives the first
particle sequence, Alice and Bob check eavesdropping by measuring a
fraction of particles randomly chosen. After ensuring the security of
the quantum channel, Alice sends the other particle sequence to Bob.
By making an orthogonal measurement on the two particle sequences,
Bob can obtain the information of the orthogonal product states sent
by Alice. This protocol has many distinct features such as great
capacity, high efficiency in that it uses all orthogonal product
states in distributing the key except those chosen for checking
eavesdroppers. 相似文献
26.
In a recent paper[J. Korean. Phys. Soc. 49 (2006) 459], two GHZ-state-based quantum secure direct communication protocols were presented. Here we point out that an eavesdropper can utilize a special property of GHZ states, i.e. "correlation-elicitable" to obtain half information of the transmitted secrets without being detected in both protocols. The particular attack strategy is demonstrated in detail. Furthermore, a possible improvement is proposed, which makes the protocols secure against this kind of attack. 相似文献