期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Coherent attacks on a practical quantum oblivious transfer protocol
1
作者 Guang-Ping He 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第10期202-207,共6页
In a recent quantum oblivious transfer protocol proposed by Nagy et al., it was proven that attacks based on individual measurements and 2-qubit entanglement can all be defeated. Later we found that 5-body entanglemen... In a recent quantum oblivious transfer protocol proposed by Nagy et al., it was proven that attacks based on individual measurements and 2-qubit entanglement can all be defeated. Later we found that 5-body entanglement-based attacks can break the protocol. Here we further tighten the security bound, by showing that the protocol is insecure against 4-body entanglement-based attacks, while being immune to 3-body entanglement-based attacks. Also, increasing the number of qubits in the protocol is useless for improving its security. 展开更多
关键词 quantum cryptography quantum algorithm quantum oblivious transfer ENTANGLEMENT
原文传递
Quantum Oblivious Transfer with Reusable Bell State
2
作者 Shu-Yu Kuo Kuo-Chun Tseng +1 位作者 Yao-Hsin Chou Fan-Hsun Tseng 《Computers, Materials & Continua》 SCIE EI 2023年第1期915-932,共18页
In cryptography,oblivious transfer(OT)is an important multiparty cryptographic primitive and protocol,that is suitable for many upperlayer applications,such as secure computation,remote coin-flipping,electrical contra... In cryptography,oblivious transfer(OT)is an important multiparty cryptographic primitive and protocol,that is suitable for many upperlayer applications,such as secure computation,remote coin-flipping,electrical contract signing and exchanging secrets simultaneously.However,some nogo theorems have been established,indicating that one-out-of-two quantum oblivious transfer(QOT)protocols with unconditional security are impossible.Fortunately,some one-out-of-two QOT protocols using the concept of Crepeau’s reduction have been demonstrated not to conform to Lo’s no-go theorem,but these protocols require more quantum resources to generate classical keys using all-or-nothing QOT to construct one-out-of-two QOT.This paper proposes a novel and efficient one-out-of-two QOT which uses quantum resources directly instead of wasting unnecessary resources to generate classical keys.The proposed protocol is not covered by Lo’s no-go theorem,and it is able to check the sender’s loyalty and avoid the attack from the receiver.Moreover,the entangled state of the proposed protocol is reusable,so it can provide more services for the participants when necessary.Compared with otherQOT protocols,the proposed protocol is more secure,efficient,and flexible,which not only can prevent external and internal attacks,but also reduce the required resources and resource distribution time. 展开更多
关键词 quantum cryptography information security quantum oblivious transfer bell State
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部