排序方式: 共有95条查询结果,搜索用时 741 毫秒
51.
Improving the security of secure deterministic communication scheme based on quantum remote state preparation
下载免费PDF全文
![点击此处可从《中国物理 B》网站下载免费的PDF全文](/ch/ext_images/free.gif)
The security of the quantum secure deterministic communication
scheme [{\it Chin. Phys.} {\bf16} (2007) 2549] is reexamined. A
security loophole is pointed out. Taking advantage of this loophole,
an eavesdropper can steal all the secret messages without being
detected by an intercept-and-resend attack strategy. Furthermore, a
possible improvement on this protocol is presented. It makes the
modified protocol secure against this kind of attack. 相似文献
52.
JavaTM是开发Web网络应用的主要编程语言之一。由于Java语言自身的特点,它的字节码文件很容易被反编译,所以它的安全问题越来越受到重视。结合信息隐藏与加密技术,提出了一种保护Java字节码的新方法。该方法利用Shamir门限分存方案,将加密密钥打散,隐藏在加密的Java字节码文件中。能有效保护Java字节码文件抵抗反编译,并且很好地支持Java应用程序的升级,通过大量测试数据证明,该方法没有对原Java程序的运行效率产生很大影响。 相似文献
53.
一种高效的量子秘密共享方案 总被引:2,自引:1,他引:1
利用量子安全直接通信和量子密集编码的思想,本文提出一个新的基于GHZ三重态的高效量子秘密共享(QSS)方案.利用量子相干性和一个公开的比特串K,Alice直接让Bob和Charlie共享其秘密消息,而不是首先与Bob和Charlie建立共享的联合密钥,再用联合密钥传输消息.该方案中平均消耗一个GHZ态可以共享两比特的经典信息.我们分别给出了无噪声信道和有噪声信道情形的安全性分析,并重点就量子直接秘密共享和量子安全直接通信之间的区别说明了协议中使用公开的K的必要性. 相似文献
54.
55.
An efficient quantum key distribution (QKD) protocol with orthogonal
product states in the 3 \otimes 3 Hilbert space is presented. The
sender, Alice, disorders the orthogonal product state sequence and
sends it to Bob. After Alice has published the matching information
of the particle sequence, Bob recovers the correct correspondences
and makes an orthogonal measurement on the orthogonal product states
to obtain the information sent by Alice. Finally, security analysis
is also made. 相似文献
56.
This paper proposes a scheme for secure authentication of classical
messages with single photons and a hashed function. The security
analysis of this scheme is also given, which shows that anyone
cannot forge valid message authentication codes (MACs). In addition,
the lengths of the authentication key and the MACs are invariable
and shorter, in comparison with those presented authentication
schemes. Moreover, quantum data storage and entanglement are not
required in this scheme. Therefore, this scheme is more efficient
and economical. 相似文献
57.
58.
59.
The security of quantum secret sharing based on entanglement
swapping is revisited and a participant attack is presented. In this
attack two dishonest agents together can illegally recover the
secret quantum state without the help of any other controller, and
it will not be detected by any other users. Furthermore, by
modifying the distribution process of particles and adding a
detection step after each distribution process, we propose an
improved protocol which can resist this kind of attack. 相似文献
60.
Three-party quantum secret sharing of secure direct communication based on χ-type entangled states
下载免费PDF全文
![点击此处可从《中国物理 B》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Based on χ-type entangled states and the two-step protocol [Deng F G,Long G L and Liu X S 2003 Phys.Rev.A 68 042317],a quantum secret sharing protocol of secure direct communication based on χ-type entangled states |χ00 3214 is proposed.Using some interesting entanglement properties of this state,the agent entirety can directly obtain the secret message from the message sender only if they collaborate together.The security of the scheme is also discussed. 相似文献