期刊文献+
共找到100篇文章
< 1 2 5 >
每页显示 20 50 100
Quantum Entanglement and Cryptography for Automation and Control of Dynamic Systems
1
作者 Farbod KHOSHNOUD Ibrahim I.ESAT +1 位作者 Shayan JAVAHERIAN Behnam BAHR 《Instrumentation》 2019年第4期109-127,共19页
This paper addresses the application of quantum entanglement and cryptography for automation and control of dynamic systems.A dynamic system is a system where the rates of changes of its state variables are not neglig... This paper addresses the application of quantum entanglement and cryptography for automation and control of dynamic systems.A dynamic system is a system where the rates of changes of its state variables are not negligible.Quantum entanglement is realized by the Spontaneous Parametric Down-conversion process.Two entangled autonomous systems exhibit correlated behavior without any classical communication in between them due to the quantum entanglement phenomenon.Specifically,the behavior of a system,Bob,at a distance,is correlated with a corresponding system,Alice.In an automation scenario,the"Bob Robot"is entangled with the"Alice Robot"in performing autonomous tasks without any classical connection between them.Quantum cryptography is a capability that allows guaranteed security.Such capabilities can be implemented in control of autonomous mechanical systems where,for instance,an"Alice Autonomous System"can control a"Bob Autonomous System"for applications of automation and robotics.The applications of quantum technologies to mechanical systems,at a scale larger than the atomistic scale,for control and automation,is a novel contribution of this paper.Notably,the feedback control transfer function of an integrated classical dynamic system and a quantum state is proposed. 展开更多
关键词 quantum Entanglement quantum Multibody Dynamics quantum Cooperative Robotics quantum cryptography quantum Autonomy
原文传递
Security proof of counterfactual quantum cryptography against general intercept-resend attacks and its vulnerability 被引量:3
2
作者 张盛 王剑 唐朝京 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第6期33-40,共8页
Counterfactual quantum cryptography, recently proposed by Noh, is featured with no transmission of signal parti- cles. This exhibits evident security advantages, such as its immunity to the well-known photon-number-sp... Counterfactual quantum cryptography, recently proposed by Noh, is featured with no transmission of signal parti- cles. This exhibits evident security advantages, such as its immunity to the well-known photon-number-splitting attack. In this paper, the theoretical security of counterfactual quantum cryptography protocol against the general intercept- resend attacks is proved by bounding the information of an eavesdropper Eve more tightly than in Yin's proposal [Phys. Rev. A 82 042335 (2010)]. It is also shown that practical counterfactual quantum cryptography implementations may be vulnerable when equipped with imperfect apparatuses, by proving that a negative key rate can be achieved when Eve launches a time-shift attack based on imperfect detector efficiency. 展开更多
关键词 quantum cryptography quantum counterfactuality quantum information
原文传递
Anonymous voting for multi-dimensional CV quantum system 被引量:1
3
作者 施荣华 肖伊 +2 位作者 石金晶 郭迎 Moon-Ho Lee 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第6期78-84,共7页
We investigate the design of anonymous voting protocols,CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables(CV) in a multi-dimensional quantum cryptosystem to ensure the security... We investigate the design of anonymous voting protocols,CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables(CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy.The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission,which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states.It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security,especially in large-scale votes. 展开更多
关键词 quantum cryptography anonymous voting quantum entangled state continuous variable
原文传递
A quantum encryption scheme using d-level systems
4
作者 郭奋卓 高飞 +1 位作者 温巧燕 朱甫臣 《Chinese Physics B》 SCIE EI CAS CSCD 2006年第8期1690-1694,共5页
Using the generalized Bell states and quantum gates, we introduce a quantum encryption scheme of d-level states (qudits). The scheme can detect and correct arbitrary transmission errors using only local operations a... Using the generalized Bell states and quantum gates, we introduce a quantum encryption scheme of d-level states (qudits). The scheme can detect and correct arbitrary transmission errors using only local operations and classical communications between the communicators. In addition, the entanglement key used to encrypt can be recycled. The protocol is informationally secure, because the output state is a totally mixed one for every input state p. 展开更多
关键词 quantum encryption d-level quantum cryptography quantum information
原文传递
A Novel Basis Splitting Eavesdropping Scheme in Quantum Cryptography Based on the BB84 Protocol
5
作者 赵楠 朱畅华 权东晓 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期22-26,共5页
We propose a novel strategy numed basis-splitting scheme to split the intercepted quanta into several portions based on different bases, for eavesdropping in the process of quantum cryptography. Compared with intercep... We propose a novel strategy numed basis-splitting scheme to split the intercepted quanta into several portions based on different bases, for eavesdropping in the process of quantum cryptography. Compared with intercept- resend strategy, our simulation results of the basis-splitting scheme under the non-ideal condition show a greater performance, especially with the increase of the length of shifted bits. Consequently our scheme can aid eaves- dropper to gather much more useful information. 展开更多
关键词 A Novel Basis Splitting Eavesdropping Scheme in quantum cryptography Based on the BB84 Protocol BB
原文传递
A chaos-based quantum group signature scheme in quantum cryptosystem
6
作者 娄小平 陈志刚 Moon Ho Lee 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第7期2604-2611,共8页
A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum comp... A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum computation network in three phases, i.e. initializing phase, signing phase and verifying phase. In the scheme, a member of the group signs the message on behalf of the group while the receiver verifies the signature's validity with the aid of the trusty group manager who plays a crucial role when a possible dispute arises. Analysis result shows that the signature can neither be forged nor disavowed by any malicious attackers. 展开更多
关键词 group signature chaotic encryption quantum entanglement quantum cryptography
在线阅读 下载PDF
On Security of Quantum Cryptography by Probabilistic Analysis
7
作者 Jianzhong Zhao 《Journal of Quantum Information Science》 CAS 2022年第4期91-98,共8页
The existing quantum cryptography is a classical cryptography in nature and basically insecure because of its classical (conventional) bits, classical encryption algorithm and classical (public) channel. A novel topic... The existing quantum cryptography is a classical cryptography in nature and basically insecure because of its classical (conventional) bits, classical encryption algorithm and classical (public) channel. A novel topic about successful communication between the legitimate users, Alice and Bob, is discussed with probability of solution uniqueness of Bob’s decryption equation. We find, by probabilistic analysis, that success of communication between Alice and Bob is probabilistic with a probability bigger than 1/2. It is also novel to define insecurity of the quantum cryptography by probability of solution uniqueness of the search equation of Eve, the eavesdropper. The probability of Eve’s success to find the plain-text of Alice (and Bob) is greater than 1/2, and so the quantum cryptography is seriously insecure. 展开更多
关键词 quantum cryptography Classical cryptography Fundamental Equations Unique Solution PROBABILITY Insecure
在线阅读 下载PDF
Quantum Cryptography-A Theoretical Overview
8
作者 Pratik Roy Saptarshi Sahoo +1 位作者 Amit Kumar Mandal Indranil Basu 《Journal of Quantum Computing》 2021年第4期151-160,共10页
Quantum Key Distribution seems very promising as it offers unconditional security,that’s why it is being implemented by the tech giants of the networking industry and government.Having quantum phenomenon as a backbon... Quantum Key Distribution seems very promising as it offers unconditional security,that’s why it is being implemented by the tech giants of the networking industry and government.Having quantum phenomenon as a backbone,QKD protocols become indecipherable.Here we have focused on the complexities of quantum key distribution and how this technology has contributed to secure key communication.This article gives an updated overview of this technology and can serve as a guide to get familiar with the current trends of quantum cryptography. 展开更多
关键词 quantum information quantum cryptography quantum entanglement
在线阅读 下载PDF
Cryptanalysis and improvement to the quantum private query protocol for enhancing database privacy
9
作者 Zhengda Shen Wenzhu Shao +4 位作者 Zhigang Li Xiaoyu Peng Nankun Mu Mahabubur Rahman Miraj Bin Liu 《Communications in Theoretical Physics》 2025年第6期122-128,共7页
In order to protect the privacy of the query user and database,some QKD-based quantum private query(QPQ)protocols were proposed.One example is the protocol proposed by Zhou et al,in which the user makes initial quantu... In order to protect the privacy of the query user and database,some QKD-based quantum private query(QPQ)protocols were proposed.One example is the protocol proposed by Zhou et al,in which the user makes initial quantum states and derives the key bit by comparing the initial quantum state and the outcome state returned from the database by ctrl or shift mode,instead of announcing two non-orthogonal qubits as others which may leak part secret information.To some extent,the security of the database and the privacy of the user are strengthened.Unfortunately,we find that in this protocol,the dishonest user could be obtained,utilizing unambiguous state discrimination,much more database information than that is analyzed in Zhou et al's original research.To strengthen the database security,we improved the mentioned protocol by modifying the information returned by the database in various ways.The analysis indicates that the security of the improved protocols is greatly enhanced. 展开更多
关键词 quantum private query quantum key distribution quantum cryptography
原文传递
Fault tolerant quantum secure direct communication with quantum encryption against collective noise 被引量:9
10
作者 黄伟 温巧燕 +2 位作者 贾恒越 秦素娟 高飞 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第10期101-109,共9页
We present two novel quantum secure direct communication(QSDC) protocols over different collective-noise channels.Different from the previous QSDC schemes over collective-noise channels,which are all source-encrypti... We present two novel quantum secure direct communication(QSDC) protocols over different collective-noise channels.Different from the previous QSDC schemes over collective-noise channels,which are all source-encrypting protocols,our two protocols are based on channel-encryption.In both schemes,two authorized users first share a sequence of EPR pairs as their reusable quantum key.Then they use their quantum key to encrypt and decrypt the secret message carried by the decoherence-free states over the collective-noise channel.In theory,the intrinsic efficiencies of both protocols are high since there is no need to consume any entangled states including both the quantum key and the information carriers except the ones used for eavesdropping checks.For checking eavesdropping,the two parties only need to perform two-particle measurements on the decoy states during each round.Finally,we make a security analysis of our two protocols and demonstrate that they are secure. 展开更多
关键词 quantum cryptography quantum secure direct communication quantum encryption collective noise
原文传递
Improvement on Quantum Secure Direct Communication with W State in Noisy Channel 被引量:4
11
作者 DONG Li XIU Xiao-Ming GAO Ya-Jun CHI Feng 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第2期232-234,共3页
An improvement (Y-protocol) [Commun. Theor. Phys. 49 (2008) 103] on the quantum secure direct communication with W state (C-protocol) [Chin. Phys. Lett. 23 (2006) 290] is proposed by Yuan et al. The quantum bi... An improvement (Y-protocol) [Commun. Theor. Phys. 49 (2008) 103] on the quantum secure direct communication with W state (C-protocol) [Chin. Phys. Lett. 23 (2006) 290] is proposed by Yuan et al. The quantum bit error rate induced by eavesdropper is 4.17% in C-protocol and 6.25% in Y-protocoL In this paper, another improvement on C-protocol is given. The quantum bit error rate of the eavesdropping will increase to 8.75%, which is 1.1 times larger than that in C-protocol and 0.4 times larger than that in Y-protocol. 展开更多
关键词 quantum cryptography quantum secure direct communication W state
在线阅读 下载PDF
The queueing model for quantum key distribution network 被引量:3
12
作者 温浩 韩正甫 +1 位作者 郭光灿 洪佩琳 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第1期46-50,共5页
This paper develops a QKD (quantum key distribution)-based queueing model to investigate the data delay on QKD link and network, especially that based on trusted relays. It shows the mean packet delay performance of... This paper develops a QKD (quantum key distribution)-based queueing model to investigate the data delay on QKD link and network, especially that based on trusted relays. It shows the mean packet delay performance of the QKD system. Furthermore, it proposes a key buffering policy which could effectively improve the delay performance in practice. The results will be helpful for quality of service in practical QKD systems. 展开更多
关键词 quantum key distribution quantum cryptography quantum network queueing model
原文传递
Improved Multipartite Quantum Secret Sharing Protocol Using Preshared Greenberger-Horne-Zeilinger States 被引量:3
13
作者 谢灯 叶明勇 李兴华 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第12期1027-1030,共4页
Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHo... Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHorne -Zeilinger(GHZ) states.This protocol is robust against eavesdropping and could be used for the circumstance of many parties. 展开更多
关键词 secret sharing Greenberger-Horne-Zeilinger state quantum cryptography
在线阅读 下载PDF
Quantum Secret Sharing Using GHZ-Like State 被引量:3
14
作者 谢朝任 蔡家纬 黄宗立 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第12期1019-1022,共4页
This paper presents a simple and novel quantum secret sharing scheme using GHZ-like state. The characteristics of the GHZ-like state are used to develop the quantum secret sharing scheme. In contrast with the other GH... This paper presents a simple and novel quantum secret sharing scheme using GHZ-like state. The characteristics of the GHZ-like state are used to develop the quantum secret sharing scheme. In contrast with the other GHZ-based QSS protocols with the same assumptions, the proposed protocol provides the best quantum bit efficiency. 展开更多
关键词 quantum cryptography quantum secret sharing GHZ-like state
在线阅读 下载PDF
Analysis and Improvement of an Efficient Controlled Quantum Secure Direct Communication and Authentication Protocol 被引量:3
15
作者 Jifeng Zhong Zhihao Liu Juan Xu 《Computers, Materials & Continua》 SCIE EI 2018年第12期621-633,共13页
The controlled quantum secure direct communication(CQSDC)with authentication protocol based on four particle cluster states via quantum one-time pad and local unitary operations is cryptanalyzed.It is found that there... The controlled quantum secure direct communication(CQSDC)with authentication protocol based on four particle cluster states via quantum one-time pad and local unitary operations is cryptanalyzed.It is found that there are some serious security issues in this protocol.An eavesdropper(Eve)can eavesdrop on some information of the identity strings of the receiver and the controller without being detected by the selective-CNOT-operation(SCNO)attack.By the same attack,Eve can also steal some information of the secret message that the sender transmits.In addition,the receiver can take the same kind of attack to eavesdrop on some information of the secret message out of the control of the controller.This means that the requirements of CQSDC are not satisfied.At last,we improve the original CQSDC protocol to a secure one. 展开更多
关键词 quantum cryptography controlled quantum secure direct communication selective-CNOT-operation attack
在线阅读 下载PDF
Controlled mutual quantum entity authentication using entanglement swapping 被引量:2
16
作者 Min-Sung Kang Chang-Ho Hong +2 位作者 Jino Heo Jong-In Lim Hyung-Jin Yang 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第9期116-124,共9页
In this paper, we suggest a controlled mutual quantum entity authentication protocol by which two users mutually certify each other on a quantum network using a sequence of Greenberger–Horne–Zeilinger(GHZ)-like st... In this paper, we suggest a controlled mutual quantum entity authentication protocol by which two users mutually certify each other on a quantum network using a sequence of Greenberger–Horne–Zeilinger(GHZ)-like states. Unlike existing unidirectional quantum entity authentication, our protocol enables mutual quantum entity authentication utilizing entanglement swapping; moreover, it allows the managing trusted center(TC) or trusted third party(TTP) to effectively control the certification of two users using the nature of the GHZ-like state. We will also analyze the security of the protocol and quantum channel. 展开更多
关键词 quantum authentication quantum cryptography quantum communication GHZ-like state
原文传递
Multi-user quantum key distribution with collective eavesdropping detection over collective-noise channels 被引量:2
17
作者 黄伟 温巧燕 +1 位作者 刘斌 高飞 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第7期114-124,共11页
A multi-user quantum key distribution protocol is proposed with single particles and the collective eavesdropping detection strategy on a star network. By utilizing this protocol, any two users of the network can acco... A multi-user quantum key distribution protocol is proposed with single particles and the collective eavesdropping detection strategy on a star network. By utilizing this protocol, any two users of the network can accomplish quantum key distribution with the help of a serving center. Due to the utilization of the collective eavesdropping detection strategy, the users of the protocol just need to have the ability of performing certain unitary operations. Furthermore, we present three fault-tolerant versions of the proposed protocol, which can combat with the errors over different collective-noise channels.The security of all the proposed protocols is guaranteed by the theorems on quantum operation discrimination. 展开更多
关键词 quantum cryptography quantum key distribution collective eavesdropping detection collective noise
原文传递
Asymmetrical Quantum Encryption Protocol Based on Quantum Search Algorithm 被引量:2
18
作者 LUO Wenjun LIU Guanli 《China Communications》 SCIE CSCD 2014年第9期104-111,共8页
Quantum cryptography and quantum search algorithm are considered as two important research topics in quantum information science.An asymmetrical quantum encryption protocol based on the properties of quantum one-way f... Quantum cryptography and quantum search algorithm are considered as two important research topics in quantum information science.An asymmetrical quantum encryption protocol based on the properties of quantum one-way function and quantum search algorithm is proposed.Depending on the no-cloning theorem and trapdoor one-way functions of the publickey,the eavesdropper cannot extract any private-information from the public-keys and the ciphertext.Introducing key-generation randomized logarithm to improve security of our proposed protocol,i.e.,one privatekey corresponds to an exponential number of public-keys.Using unitary operations and the single photon measurement,secret messages can be directly sent from the sender to the receiver.The security of the proposed protocol is proved that it is informationtheoretically secure.Furthermore,compared the symmetrical Quantum key distribution,the proposed protocol is not only efficient to reduce additional communication,but also easier to carry out in practice,because no entangled photons and complex operations are required. 展开更多
关键词 quantum cryptography asymmetrical encryption information-theoreticalsecurity quantum search algorithms
在线阅读 下载PDF
New semi-quantum key agreement protocol based on high-dimensional single-particle states 被引量:2
19
作者 Huan-Huan Li Li-Hua Gong Nan-Run Zhou 《Chinese Physics B》 SCIE EI CAS CSCD 2020年第11期189-196,共8页
A new efficient two-party semi-quantum key agreement protocol is proposed with high-dimensional single-particle states.Different from the previous semi-quantum key agreement protocols based on the two-level quantum sy... A new efficient two-party semi-quantum key agreement protocol is proposed with high-dimensional single-particle states.Different from the previous semi-quantum key agreement protocols based on the two-level quantum system,the propounded protocol makes use of the advantage of the high-dimensional quantum system,which possesses higher efficiency and better robustness against eavesdropping.Besides,the protocol allows the classical participant to encode the secret key with qudit shifting operations without involving any quantum measurement abilities.The designed semi-quantum key agreement protocol could resist both participant attacks and outsider attacks.Meanwhile,the conjoint analysis of security and efficiency provides an appropriate choice for reference on the dimension of single-particle states and the number of decoy states. 展开更多
关键词 semi-quantum key agreement protocol high-dimensional quantum state quantum cryptography quantum communication
原文传递
A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States 被引量:2
20
作者 张盛 王剑 +1 位作者 唐朝京 张权 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第8期268-272,共5页
It is established that a single quantum cryptography protocol usually cooperates with other cryptographicsystems,such as an authentication system,in the real world.However,few protocols have been proposed on how tocom... It is established that a single quantum cryptography protocol usually cooperates with other cryptographicsystems,such as an authentication system,in the real world.However,few protocols have been proposed on how tocombine two or more quantum protocols.To fill this gap,we propose a composed quantum protocol,containing bothquantum identity authentication and quantum key distribution,using squeezed states.Hence,not only the identity canbe verified,but also a new private key can be generated by our new protocol.We also analyze the security under anoptimal attack,and the efficiency,which is defined by the threshold of the tolerant error rate,using Gaussian errorfunction. 展开更多
关键词 quantum key distribution quantum cryptography composed protocol
在线阅读 下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部