排序方式: 共有95条查询结果,搜索用时 31 毫秒
11.
Cryptanalysis of Multiparty Quantum Secret Sharing of Quantum State Using Entangled States
下载免费PDF全文
![点击此处可从《中国物理快报》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Security of a quantum secret sharing of quantum state protocol proposed by Guo et al. [Chin. Phys. Lett. 25 (2008) 16] is reexamined. It is shown that an eavesdropper can obtain some of the transmitted secret information by monitoring the classical channel or the entire secret by intercepting the quantum states, and moreover, the eavesdropper can even maliciously replace the secret message with an arbitrary message without being detected. Finally, the deep reasons why an eavesdropper can attack this protocol are discussed and the modified protocol is presented to amend the security loopholes. 相似文献
12.
利用两粒子纠缠态作为经典信息的载体,结合Hash函数和量子本地操作提出了一种可以实现双向认证功能的量子秘密共享方案,并且分析了它的安全性. 这种方案的安全性基于秘密共享双方的认证密钥和传输过程中粒子排列次序的保密. 若不考虑认证和窃听检测所消耗的粒子,平均1个Bell态共享2 bit经典信息.
关键词:
量子秘密共享
认证密钥
量子双向认证
两粒子量子纠缠 相似文献
13.
14.
15.
we present a robust and universal quantum secret sharing protocol with four-qubit decoherence-free (DF) states against collective noise. The transmission's safety is ensured by the nonorthogonality of the noiseless states traveling on the quantum channel. Although this scheme uses entangled states for encoding, only single-particle product measurements are required. 相似文献
16.
The quantum secure direct communication (QSDC) protocol with a random basis and order is analysed and an effective attack, i.e. teleportation attack, is presented. An eavesdropper can obtain half of the transmitted secret bits with the help of this special attack. It is shown that quantum teleportation can be employed to weaken the role of the order-rearrangement encryption at least in a certain circumstance. Meanwhile, a possible improvement on this protocol is proposed, which makes it secure against this kind of attack. 相似文献
17.
We propose a scheme to realize quantum cloning of an unknown M-qudit equatorial-like entangled state. The first stage of the protocol requires teleportation. After the teleportation is accomplished, the receiver can reestablish the original state. In the second stage of the protocol, with the assistance (through a single-particle projective measurement) of the preparer, the perfect copy of an original state can be produced at the site of the sender. Our scheme requires a single maximally entangled qudit pair as the quantum channel and three dits classical communication. The scheme is feasible at the expense of consuming local resources which include M - 1 ancillary qudits introduced by the receiver and additional bi-qudit operations. Moreover, we construct a sort of unitary transformations which ensure ancillary qudits are not necessarily introduced by the sender. Comparing to the previous protocols, the proposed protocol is economical due to that the cost of both quantum nonlocal resources and classical communication is lowest. 相似文献
18.
This paper proposes a scheme for teleporting a kind of essential three-particle
non-symmetric entangled state, which is much more valuable than a GHZ and W state
for some applications in quantum information processing. In comparison with previous
proposal of teleportation, the resources of entangled states as quantum channel and
the number of classical messages required by our scheme can be cut down. Moreover,
it is shown that there exists a class of transformations which ensure the success of
this scheme, because the two-particle transformation performed by the receiver in
the course of teleportation may be a generic two-particle operation instead of a
control-NOT (CNOT) operation. In addition, all kinds of transformations performed by
sender and receiver are given in detail. 相似文献
19.
In this paper an efficient quantum secure direct communication (QSDC) scheme with
authentication is presented, which is based on quantum entanglement and
polarized single photons. The present protocol uses Einstein--Podolsky--Rosen
(EPR) pairs and polarized
single photons in batches. A particle of the EPR pairs is retained
in the sender's station, and the other is transmitted forth and back
between the sender and the receiver, similar to the `ping--pong'
QSDC protocol. According to the shared information beforehand, these
two kinds of quantum states are mixed and then transmitted via a
quantum channel. The EPR pairs are used to transmit secret messages
and the polarized single photons used for authentication and
eavesdropping check. Consequently, because of the dual contributions
of the polarized single photons, no classical information is needed.
The intrinsic efficiency and total efficiency are both 1 in this
scheme as almost all of the instances are useful and each EPR pair
can be used to carry two bits of information. 相似文献
20.