排序方式: 共有95条查询结果,搜索用时 62 毫秒
31.
32.
33.
The security of the multiparty quantum secret sharing protocol proposed by Gao [G. Gao, Commun. Theor. Phys. 52 (2009) 421] is analyzed. It is shown that this protocol is vulnerable since the agents' imperfect encryption scheme can be attacked by a powerful participant. We introduce a attack strategy called participant forcible manipulation and analyze the information leakage in this protocol under this attack. At last, we give an improved version of the original protocol. The improved protocol is robust and has the same efficiency as the original one. 相似文献
34.
Utilizing a three-particle W state, we come up with a protocol for the teleportation of an unknown two-particle entangled state. It is shown that the teleportation can be deterministically and exactly realized. Moreover, two-particle entanglement teleportation is generalized to a system consisting of many particles via a three-particle W state and a multi-particle W state, respectively. All unitary transformations performed by the receiver are given in a concise formula. 相似文献
35.
该文首次提出了联合k-错2-adic复杂度的概念,并与联合k-错2-adic复杂度一齐作为衡量多重周期序列联合2-adic复杂度稳定性的指标。随后分别研究了两种联合错2-adic复杂度意义下的序列计数问题以及满足2N-1=p,p1p2的周期为N的m重序列联合错2-adic复杂度数学期望的下界并说明了不存在2N-1=pe(e1),的情况。该文的结果对于研究多重周期序列联合2-adic复杂度的稳定性有重要意义。 相似文献
36.
Two simple quantum broadcast communication schemes are proposed.A central party can broadcast his secret message to all the legitimate receivers simultaneously.Compared with the three schemes proposed recently (Wang et al.2007 Chin.Phys.16 1868),the proposed schemes have the advantages of consuming fewer quantum and classical resources,lessening the difficulty and intensity of necessary operations,and having higher efficiency. 相似文献
37.
布尔函数的非线性度是衡量及其密码学意义的重要标志,而非线性度和其它密码学强度指标,如代数次数,扩散性,相关免疫性等存在着制约关系,本文研究了高非线性度布尔函数的构造,讨论非线性度和其它密码学准则之间的折关系,给出高非线性度,高代数次数,高非线性平衡相关免疫以及具有较好扩散性的高非线性度布尔函数的几种构造方法。 相似文献
38.
39.
40.
为了满足在司法行政、电子政务等领域的应用需求,提出了无证书强指定验证者多重签名的概念和敌手模型,利用双线性对构造了第一个无证书强指定验证者多重签名方案,在计算双线性Diffie-Hellman问题和计算Diffie-Hellman问题假设下证明了该方案是存在性不可伪造的,而且该方案满足强指定验证者签名和多重签名应具备的性质。方案执行效率高,生成的指定验证者多重签名长度仅为160 bit,签名验证时需要的双线性对运算个数是固定的,仅需一个双线性对。所以,即使在计算资源与网络带宽受限的无线网络中方案也非常实用。 相似文献