首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   39篇
  免费   2篇
力学   1篇
数学   2篇
物理学   38篇
  2020年   1篇
  2019年   3篇
  2018年   3篇
  2017年   1篇
  2016年   3篇
  2015年   2篇
  2014年   5篇
  2013年   6篇
  2012年   3篇
  2011年   10篇
  2010年   3篇
  1992年   1篇
排序方式: 共有41条查询结果,搜索用时 15 毫秒
21.
Lin et al. proposed a mediated semi-quantum key distribution protocol in 2019. This study shows that Lin et al.'s protocol has a security loophole that could mount to the collective attack to reveal some information about the secret key without being detected. To overcome this problem, an improved protocol is proposed and its security is proven.  相似文献   
22.
23.
This paper is based on previous quantum encryption proposed by researchers developing a scheme for cryptography using symmetric keys.This study has pointed out that the scheme consists of a pitfall that could lead to a controlled-NOT(CNOT)extraction attack.A malicious user can obtain the secret message of a sender without being detected by using a sequence of single photons and a controlled-NOT gate.  相似文献   
24.
Recently, Hsueh and Chen [in Proceedings of the 14th Information Security Conference, National Taiwan University of Science and Technology, Taipei, pp. 236–242, 2004] proposed a quantum key agreement (QKA) protocol with maximally entangled states. Their protocol allows two users to negotiate a secret key in such a way that no one can predetermine the shared key alone. This study points out two security flaws in their protocol: (1) a legitimate but malicious user can fully control the shared key alone; (2) an eavesdropper can obtain the shared key without being detected. A possible solution is presented to avoid these attacks and also Tsai et al.’s CNOT attack [in Proceedings of the 20th Cryptology and Information Security Conference, National Chiao Tung University, Hsinchu, pp. 210–213, 2010] on Hsueh and Chen protocol to obtain the shared key without being detected.  相似文献   
25.
26.
We investigate two special classes of matrices over GF(2) with certain interesting properties. These properties can be applied to construct nonsingular matrix pairs efficiently and thus provide a solution to the long-key problems of McEIiece's public-key cryptosystem.  相似文献   
27.
This study proposes a pioneering protocol for teleporting an arbitrary single particle state and simultaneously performing a rotation operation on that particle. There are protocols for either only teleporting particles or only remotely controlling quantum particles. If one has to remotely control a teleported quantum, then he/she has to first do the quantum teleportation and then perform the remote control on the teleported quantum. Both operations were done separately on two sets of entanglements. However, this intuitive solution is inefficient because many resources are wasted. Therefore, the study attempts to complete both operations using only one Greenberger-Horne-Zeilinger (GHZ) state.  相似文献   
28.
This paper presents a simple and novel quantum secret sharing schemeusing GHZ-like state. The characteristics of the GHZ-like state areused to develop the quantum secret sharing scheme. In contrast withthe other GHZ-based QSS protocols with the same assumptions, the proposed protocol provides the best quantum bit efficiency.  相似文献   
29.
This paper proposes a new semi‐quantum key distribution protocol, allowing two “classical” participants without sophisticated quantum capability to establish a shared secret key under an untrusted third party (a quantum server). The proposed protocol is free from several well‐known attacks. Furthermore, the efficiency is better than the existing three‐party SQKD protocol in which the classical participants must have the quantum measurement capability.  相似文献   
30.

In 2014, Zhang et al. (Int J Theor Phys:53:933–941, 2014) proposed a secure multi-party quantum summation protocol based on single photons in both polarization and spatial-mode degrees of freedom. They claimed that the proposed protocol can efficiently help the involved participants to sum their secrets, and at the same time, each participant’s secret can be kept from being known by others. However, this study shows that Zhang et al.’s protocol suffers from the intercept-resend attack. To solve this problem, a modification is proposed here.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号