排序方式: 共有37条查询结果,搜索用时 437 毫秒
11.
一个求最大公因数和倒数的新算法及应用 总被引:1,自引:0,他引:1
提出了一个求最大公因数和倒数的迭代算法,该算法可求得任意两个正整数a,m的最大公因数,如果(a,m)=1,可求得a关于模m的倒数。具体计算时对模数m是奇数偶数分别考虑。主要特点是避免了长整数除法和幂运算。以RSA中密钥的计算说明算法的应用。 相似文献
12.
一种实用的令牌位格式捕获电路的设计与实现 总被引:1,自引:0,他引:1
本文基于文献[1],介绍了一种具有一位延迟的令牌位格式捕获电路,阐述了令牌网络中基于该电路以实现优先级访问机制的原理,此外,文中还就一位延迟电路的不足给出了改进方案。 相似文献
13.
14.
为了避免如WiMax, WLAN和X频段卫星系统等窄带通信系统对超宽带通信系统的影响,该文提出一种具有可控三陷波特性的超宽带天线。该天线通过在辐射贴片和接地板上开槽,并在基板背面增加环形寄生单元的方法实现三陷波特性。天线在3.1~10.6 GHz的超宽带频段内能够有效地工作并抑制3种不同的窄带通信系统的干扰。同时在环形寄生单元处增加开关设置,使天线能够实现双/三陷波的功能切换,并增强陷波性能。实测和仿真结果吻合,该天线实现了良好的陷波功能,在工作频段内有良好的辐射方向特性。 相似文献
15.
量子游走已经被提出可以用于瞬时地传输量子比特或多维量子态。根据量子游走的隐形传输模型,该文提出一种无需提前准备纠缠源的基于正则图上量子游走的仲裁量子签名算法。在初始化阶段,密钥是由量子密钥分发系统制备;在签名阶段,基于正则图上的量子游走隐形传输模型被用于转移信息副本密文从发送者到接收者。具体地,发送者编码要签名信息的密文在硬币态上,通过两步正则图上的量子游走,可以自动地产生用于量子隐形传输必须的纠缠态。发送者和接收者对制备的纠缠态的测量为签名生成和签名验证的凭据。在验证阶段,在仲裁的辅助下,验证者依照发送者的经典结果核实签名的有效性。此外,随机数和认证的公共板被引进阻止接收方在接收真正信息序列之前的存在性伪造攻击和否认攻击。安全性分析表明设计的算法满足签名者和接收者的不可抵赖以及任何人的不可伪造。讨论表明方案不能抗击发送者的抵赖攻击,相应的建议被给出。由于实验上已经证明量子游走可以在多个不同的物理系统上实现,因此该签名方案未来是可实现的。 相似文献
16.
基于量子游走的量子隐形传输模型,提出了一种仲裁量子签名方案.发送者编码要签名的信息在硬币态上,并应用硬币态和位置态之间的条件相移算符产生用于量子隐形传输必需的纠缠态.对生成的纠缠态测量可作为签名设计和信息恢复依据.然后,接收者依据来自发送者的测量结果测量其量子态,进而验证签名的有效性和信息的真实性、完整性.由于量子游走的应用,本签名方案的初始化阶段不需要提前制备必须的纠缠态.安全性分析表明方案满足不可抵赖、不可伪造和不可否认特性,讨论和比较展示了键控链式受控非加密算法和随机数的使用可以抵抗已有方案中的抵赖和存在性伪造攻击.此外,量子游走已经被证明可以在多种不同的物理系统中和实验上实现,因此本签名方案未来也许是可实现的. 相似文献
17.
A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations(corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed.An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. 相似文献
18.
19.
We propose an arbitrated quantum signature(AQS) scheme with continuous variable(CV) squeezed vacuum states,which requires three parties, i.e., the signer Alice, the verifier Bob and the arbitrator Charlie trusted by Alice and Bob, and three phases consisting of the initial phase, the signature phase and the verification phase. We evaluate and compare the original state and the teleported state by using the fidelity and the beam splitter(BS) strategy. The security is ensured by the CV-based quantum key distribution(CV-QKD) and quantum teleportation of squeezed states. Security analyses show that the generated signature can be neither disavowed by the signer and the receiver nor counterfeited by anyone with the shared keys. Furthermore, the scheme can also detect other manners of potential attack although they may be successful.Also, the integrality and authenticity of the transmitted messages can be guaranteed. Compared to the signature scheme of CV-based coherent states, our scheme has better encoding efficiency and performance. It is a potential high-speed quantum signature scheme with high repetition rate and detection efficiency which can be achieved by using the standard off-the-shelf components when compared to the discrete-variable(DV) quantum signature scheme. 相似文献
20.
本文基于单向函数针对信息保密系统提出了一种双重认证的存取控制方案。该方案与已有类似方案相比要更安全一些,因为在该方案中,用户保密密钥不仅用来计算对所需访问文件的存取权,也用于认证需访问保密文件的请求用户的合法性。该方案能够在动态环境中执行像改变存取权和插入/删除用户或文件这样的存取控制操作,而不影响任何用户的保密密钥。此外,该方案还具有建立简单的特点。 相似文献