期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
A Base Station Deployment Algorithm for Wireless Positioning Considering Dynamic Obstacles
1
作者 Aiguo Li Yunfei Jia 《Computers, Materials & Continua》 2025年第3期4573-4591,共19页
In the context of security systems,adequate signal coverage is paramount for the communication between security personnel and the accurate positioning of personnel.Most studies focus on optimizing base station deploym... In the context of security systems,adequate signal coverage is paramount for the communication between security personnel and the accurate positioning of personnel.Most studies focus on optimizing base station deployment under the assumption of static obstacles,aiming to maximize the perception coverage of wireless RF(Radio Frequency)signals and reduce positioning blind spots.However,in practical security systems,obstacles are subject to change,necessitating the consideration of base station deployment in dynamic environments.Nevertheless,research in this area still needs to be conducted.This paper proposes a Dynamic Indoor Environment Beacon Deployment Algorithm(DIE-BDA)to address this problem.This algorithm considers the dynamic alterations in obstacle locations within the designated area.It determines the requisite number of base stations,the requisite time,and the area’s practical and overall signal coverage rates.The experimental results demonstrate that the algorithm can calculate the deployment strategy in 0.12 s following a change in obstacle positions.Experimental results show that the algorithm in this paper requires 0.12 s to compute the deployment strategy after the positions of obstacles change.With 13 base stations,it achieves an effective coverage rate of 93.5%and an overall coverage rate of 97.75%.The algorithm can rapidly compute a revised deployment strategy in response to changes in obstacle positions within security systems,thereby ensuring the efficacy of signal coverage. 展开更多
关键词 Wireless positioning base station deployment dynamic obstacles dynamic obstacle wireless positioning
在线阅读 下载PDF
Genetic Algorithm Based Node Deployment in Hybrid Wireless Sensor Networks 被引量:3
2
作者 Omar Banimelhem Moad Mowafi Walid Aljoby 《Communications and Network》 2013年第4期273-279,共7页
In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after t... In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after the initial deployment to overcome the coverage holes problem. To achieve optimal coverage, an efficient algorithm should be employed to find the best positions of the additional mobile nodes. This paper presents a genetic algorithm that searches for an optimal or near optimal solution to the coverage holes problem. The proposed algorithm determines the minimum number and the best locations of the mobile nodes that need to be added after the initial deployment of the stationary nodes. The performance of the genetic algorithm was evaluated using several metrics, and the simulation results demonstrated that the proposed algorithm can optimize the network coverage in terms of the overall coverage ratio and the number of additional mobile nodes. 展开更多
关键词 TARGET COVERAGE NODE DEPLOYMENT GENETIC Algorithm WIRELESS Sensor Networks
在线阅读 下载PDF
Energy-Efficient and Coverage-Aware Clustering in Wireless Sensor Networks 被引量:1
3
作者 Fahed Awad Eyad Taqieddin Asmaa Seyam 《Wireless Engineering and Technology》 2012年第3期142-151,共10页
Energy efficiency and sensing coverage are essential metrics for enhancing the lifetime and the utilization of wireless sensor networks. Many protocols have been developed to address these issues, among which, cluster... Energy efficiency and sensing coverage are essential metrics for enhancing the lifetime and the utilization of wireless sensor networks. Many protocols have been developed to address these issues, among which, clustering is considered a key technique in minimizing the consumed energy. However, few clustering protocols address the sensing coverage metric. This paper proposes a general framework that addresses both metrics for clustering algorithms in wireless sensor networks. The proposed framework is based on applying the principles of Virtual Field Force on each cluster within the network in order to move the sensor nodes towards proper locations that maximize the sensing coverage and minimize the transmitted energy. Two types of virtual forces are used: an attractive force that moves the nodes towards the cluster head in order to reduce the energy used for communication and a repulsive force that moves the overlapping nodes away from each other such that their sensing coverage is maximized. The performance of the proposed mechanism was evaluated by applying it to the well-known LEACH clustering algorithm. The simulation results demonstrate that the proposed mechanism improves the performance of the LEACH protocol considerably in terms of the achieved sensing coverage, and the network lifetime. 展开更多
关键词 WSN CLUSTERING LEACH Virtual Field Force LIFETIME Sensing COVERAGE
在线阅读 下载PDF
High-Throughput and Area-Efficient FPGA Implementations of Data Encryption Standard (DES) 被引量:1
4
作者 Raed Bani-Hani Salah Harb +1 位作者 Khaldoon Mhaidat Eyad Taqieddin 《Circuits and Systems》 2014年第3期45-56,共12页
One of the most popular standards for protecting confidential information is the Data Encryption Standard (DES). Although it has been replaced by the Advanced Encryption Standard (AES), it is still widely used in Auto... One of the most popular standards for protecting confidential information is the Data Encryption Standard (DES). Although it has been replaced by the Advanced Encryption Standard (AES), it is still widely used in Automatic Teller Machines (ATM’s), smartcards, and mobile phone SIM cards. In this paper, we present area-efficient and high-throughput FPGA implementations of the DES which are developed using the Xilinx FPGA ISE design suite. In fact, we propose modifications on the fastest DES design reported in the literature and achieve 1.1 times higher speed. Also, we introduce an 8-stage pipelined design that needs only 0.75 times the registers and consumes 0.65 times the power of a similar 16-stages pipelined design. High-speed design and synthesis optimization techniques including pipelining, register retiming, and logic replication are used. Post- layout synthesis results show that the proposed implementations achieve high throughput-to-area ratio. To make a fair comparison, the proposed designs were synthesized using matching FPGA devices as being used by other implementations reported in the literature. 展开更多
关键词 DES FPGA PIPELINED ITERATIVE SECURITY Efficiency ENCRYPTION
暂未订购
Robust Joint Timing and Frequency Synchronization Algorithm for IEEE802.16e OFDM System
5
作者 董国军 戴居丰 魏志成 《Transactions of Tianjin University》 EI CAS 2007年第5期360-364,共5页
Based on the structures of the short preamble and long preamble, which are defined for synchronization in IEEES02.16e specification, the robust synchronization algorithm for IEEES02.16e OFDM system is proposed. The co... Based on the structures of the short preamble and long preamble, which are defined for synchronization in IEEES02.16e specification, the robust synchronization algorithm for IEEES02.16e OFDM system is proposed. The correlations among the sample sequences in the preamble are investigated, especially the correlation between the first sample sequence and the last sample sequence in the long preamble. The conventional joint timing and frequency synchronization algorithm is reviewed based on the short preamble referring to the algorithm proposed by Schmidl, then a robust joint timing and frequency synchronization algorithm is proposed based on the long preamble. The simulations in the multi-path and frequency selective fading channel show that the proposed algorithm has improved the performances of timing metric plateau, timing offset and synchronization acquisition time even when signal-to-noise ratio is less than -5 dB. 展开更多
关键词 IEEE802.16E OFDM SYNCHRONIZATION PREAMBLE correlation estimation training sequence
在线阅读 下载PDF
Fuzzy Model for Trust Evaluation 被引量:7
6
作者 张仕斌 何大可 《Journal of Southwest Jiaotong University(English Edition)》 2006年第1期23-28,共6页
Based on fuzzy set theory, a fuzzy trust model is established by using membership function to describe the fuzziness of trust. The trust vectors of subjective trust are obtained based on a mathematical model of fuzzy ... Based on fuzzy set theory, a fuzzy trust model is established by using membership function to describe the fuzziness of trust. The trust vectors of subjective trust are obtained based on a mathematical model of fuzzy synthetic evaluation. Considering the complicated and changeable relationships between various subjects, the multi-level mathematical model of fuzzy synthetic evaluation is introduced. An example of a two-level fuzzy synthetic evaluation model confirms the feasibility of the multi-level fuzzy synthesis evaluation model. The proposed fuzzy model for trust evaluation may provide a promising method for research of trust model in open networks. 展开更多
关键词 Trust model Trust vector Trust class Synthetic evaluation Fuzzy set theory
在线阅读 下载PDF
Robust quantum secure direct communication and authentication protocol against decoherence noise based on six-qubit DF state 被引量:2
7
作者 昌燕 张仕斌 +1 位作者 闫丽丽 韩桂华 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第5期239-246,共8页
By using six-qubit decoherence-free (DF) states as quantum carriers and decoy states, a robust quantum secure direct communication and authentication (QSDCA) protocol against decoherence noise is proposed. Four si... By using six-qubit decoherence-free (DF) states as quantum carriers and decoy states, a robust quantum secure direct communication and authentication (QSDCA) protocol against decoherence noise is proposed. Four six-qubit DF states are used in the process of secret transmission, however only the |0'〉 state is prepared. The other three six-qubit DF states can be obtained by permuting the outputs of the setup for |0'〉. By using the |0'〉 state as the decoy state, the detection rate and the qubit error rate reach 81.3%, and they will not change with the noise level. The stability and security are much higher than those of the ping-pong protocol both in an ideal scenario and a decoherence noise scenario. Even if the eavesdropper measures several qubits, exploiting the coherent relationship between these qubits, she can gain one bit of secret information with probability 0.042. 展开更多
关键词 quantum secure direct communication decoherence noise AUTHENTICATION six-qubit decohevencefree state
原文传递
A Multiparty Controlled Bidirectional Quantum Secure Direct Communicationand Authentication Protocol Based on EPR Pairs 被引量:1
8
作者 CHANG Yan ZHANG Shi-Bin +1 位作者 YAN Li-Li SHENG Zhi-Wei 《Chinese Physics Letters》 SCIE CAS CSCD 2013年第6期9-12,共4页
A multiparty controlled bidirectional quantum secure direct communication and authentication protocol is proposed based on EPR pair and entanglement swapping.The legitimate identities of communicating parties are enco... A multiparty controlled bidirectional quantum secure direct communication and authentication protocol is proposed based on EPR pair and entanglement swapping.The legitimate identities of communicating parties are encoded to Bell states which act as a detection sequence.Secret messages are transmitted by using the classical XOR operation,which serves as a one-time-pad.No photon with secret information transmits in the quantum channel.Compared with the protocols proposed by Wang et al.[Acta Phys.Sin.56(2007)673;Opt.Commun.266(2006)732],the protocol in this study implements bidirectional communication and authentication,which defends most attacks including the‘man-in-the-middle’attack efficiently. 展开更多
关键词 QUANTUM QUANTUM EPR
原文传递
A Bidirectional Quantum Secure Direct Communication Protocol Based on Five-Particle Cluster State 被引量:1
9
作者 CHANG Yan ZHANG Shi-Bin YAN Li-Li 《Chinese Physics Letters》 SCIE CAS CSCD 2013年第9期10-13,共4页
To transmit a message safely,five-particle cluster state particles are used to construct a bidirectional quantum secure direct communication protocol.Five-particle cluster state particles are used for both detecting e... To transmit a message safely,five-particle cluster state particles are used to construct a bidirectional quantum secure direct communication protocol.Five-particle cluster state particles are used for both detecting eavesdrop-pers and transmitting secret messages.All of the five-particle cluster states’photons for detection are mixed to the sending sequence to detect eavesdroppers.The detection rate approaches 88%per qubit.The five-particle cluster states needed are only one fifth of the photons in the sending sequence.In this protocol,there is no photon carrying secret information transmitting in quantum channel,and the classical XOR operation which serves as a one-time-pad is used to ensure the security of the protocol.Compared with three photons of each five-particle cluster state as detection photons,the five photons in this study will decrease the five-particle cluster states needed for detection greatly. 展开更多
关键词 CLUSTER QUANTUM QUANTUM
原文传递
Quantum broadcast communication and authentication protocol with a quantum one-time pad
10
作者 昌燕 许春香 +1 位作者 张仕斌 闫丽丽 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第1期80-83,共4页
A quantum broadcast communication and authentication protocol with a quantum one-time pad based on the Greenberger-Horne-Zeilinger state is proposed. A binary string is used to express the identity of the receiver, wh... A quantum broadcast communication and authentication protocol with a quantum one-time pad based on the Greenberger-Horne-Zeilinger state is proposed. A binary string is used to express the identity of the receiver, which is encoded as a single sequence of photons. The encoded photon sequence acts as a detection sequence and implements au- thentication. An XOR operation serves as a one-time pad and is used to ensure the security of the protocol. The binary string is reused even in a noisy channel and proves to be unconditionally secure. In contrast with the protocols proposed by Wang et al. [Chin. Phys. 16 1868 (2007)] and Yang et al. [Chin. Phys. B 19 070304 (2010)], the protocol in this study implements the identity authentication with a reusable binary string; no hash function or local unitary operation is used. The protocol in this study is also easier to implement and highly efficient without losing security. 展开更多
关键词 quantum broadcast communication quantum secure direct communication Greenberger–Horne–Zeilinger(GHZ) state AUTHENTICATION
原文传递
Energy efficient fuzzy-based DASH adaptation algorithm
11
作者 Moad Mowafi Eyad Taqieddin Hiba Al-Dahoud 《Digital Communications and Networks》 SCIE CSCD 2021年第1期113-119,共7页
With the expansive demand for video streaming over mobile networks,it is necessary to adopt schemes that balance the need for high video quality with the available network resources when streaming or downloading the v... With the expansive demand for video streaming over mobile networks,it is necessary to adopt schemes that balance the need for high video quality with the available network resources when streaming or downloading the video.Several approaches were proposed in the literature,including Dynamic Adaptive Streaming over HTTP(DASH).In this work,we consider an approach in which we place sufficient emphasis on the constrained battery resources in mobile devices when making decisions on the quality(or bitrate)of the video to be requested.This is done by using a fuzzy logic controller that enhances the performance of the Fuzzy-based DASH(FDASH)scheme.Simulation results show that our proposed approach conserves more energy than its predecessor while maintaining similar video quality and avoiding playback interruptions. 展开更多
关键词 DASH Bitrate adaptation ENERGY THROUGHPUT BUFFER
在线阅读 下载PDF
Using dummy data for RFID tag and reader authentication
12
作者 Baha’A.Alsaify Dale R.Thompson +1 位作者 Abdallah Alma'aitah Jia Di 《Digital Communications and Networks》 SCIE CSCD 2022年第5期804-813,共10页
Radio-Frequency IDentification(RFID)technology is an essential enabler of a multitude of intelligent applications.The robust authentication of RFID system components is critical in providing trustworthy data delivery ... Radio-Frequency IDentification(RFID)technology is an essential enabler of a multitude of intelligent applications.The robust authentication of RFID system components is critical in providing trustworthy data delivery from/to tags.In this paper,we propose an authentication protocol based on monitoring the transmissions between readers and tags in the system.The proposed authentication scheme is based on injecting decoys within the exchanged communications(between RFID readers and tags)and is used in the authentication process.Furthermore,the proposed authentication scheme is mathematically modeled and validated using extensive simulation.The simulations results show that the proposed scheme provides a 100%confidence level in the authentication of tags and detection of compromised readers. 展开更多
关键词 RFID AUTHENTICATION Dummy data SECURITY DECOYS
在线阅读 下载PDF
Research on phase-detecting method for coherent combining beams in fiber laser array
13
作者 CHU Xing-chun ZHAN Sheng-bao ZHAO Shang-hong LI Yun-xia XU Jie 《Optoelectronics Letters》 EI 2007年第6期455-458,共4页
A novel method for phase-detecting of each individual beam in coherent beam combining system of fiber laser array based on the property of time-shift of fast Fourier transform is reported. It takes advantage of the re... A novel method for phase-detecting of each individual beam in coherent beam combining system of fiber laser array based on the property of time-shift of fast Fourier transform is reported. It takes advantage of the relative movement of fringepattern to detect the phase shift between each individual beam and reference beam. No frequency shift component for reference beam is required in the system. At the same time, the acquisition fringe-pattern is firstly tailored to a few multiple of fringes in order to reduce the phase-detecting error caused by energy leakage during the course of fast Fourier transform. This technique can greatly reduce the effect of energy leakage and thus improve the phase-detecting precision. Basic principle of the new phase-detecting method is described in detail, and numerical results show that the phase-detecting error is less than 1/1000 wavelength bv utilizing our method. 展开更多
关键词 光检测技术 光纤元件 组合光束 激光
在线阅读 下载PDF
Self-healing and SDN:bridging the gap
14
作者 Leonardo Ochoa-Aday Cristina Cervell o-Pastor Adriana Fernaandez-Fernaandez 《Digital Communications and Networks》 SCIE 2020年第3期354-368,共15页
Achieving high programmability has become an essential aim of network research due to the ever-increasing internet traffic.Software-Defined Network(SDN)is an emerging architecture aimed to address this need.However,ma... Achieving high programmability has become an essential aim of network research due to the ever-increasing internet traffic.Software-Defined Network(SDN)is an emerging architecture aimed to address this need.However,maintaining accurate knowledge of the network after a failure is one of the largest challenges in the SDN.Motivated by this reality,this paper focuses on the use of self-healing properties to boost the SDN robustness.This approach,unlike traditional schemes,is not based on proactively configuring multiple(and memory-intensive)backup paths in each switch or performing a reactive and time-consuming routing computation at the controller level.Instead,the control paths are quickly recovered by local switch actions and subsequently optimized by global controller knowledge.Obtained results show that the proposed approach recovers the control topology effectively in terms of time and message load over a wide range of generated networks.Consequently,scalability issues of traditional fault recovery strategies are avoided. 展开更多
关键词 Software-defined network Autonomic network management Protocol design Fault tolerance Network management
在线阅读 下载PDF
C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol
15
作者 Moad Mowafi Lo'ai Tawalbeh +1 位作者 Walid Aljoby Mohammad Al-Rousan 《Journal of Information Security》 2012年第4期272-280,共9页
Wireless Sensor Networks (WSNs) are resource-constrained networks in which sensor nodes operate in an aggressive and uncontrolled environment and interact with sensitive data. Traffic aggregated by sensor nodes is sus... Wireless Sensor Networks (WSNs) are resource-constrained networks in which sensor nodes operate in an aggressive and uncontrolled environment and interact with sensitive data. Traffic aggregated by sensor nodes is susceptible to attacks and, due to the nature of WSNs, security mechanisms used in wired networks and other types of wireless networks are not suitable for WSNs. In this paper, we propose a mechanism to assure information security against security attacks and particularly node capturing attacks. We propose a cluster security management protocol, called Cryptographic Checksum Clustering Security Management (C3SM), to provide an efficient decentralized security management for hierarchal networks. In C3SM, every cluster selects dynamically and alternately a node as a cluster security manager (CSM) which distributes a periodic shared secrete key for all nodes in the cluster. The cluster head, then, authenticates identity of the nodes and derive a unique pairwise key for each node in the cluster. C3SM provides sufficient security regardless how many nodes are compromised, and achieves high connectivity with low memory cost and low energy consumption. Compared to existing protocols, our protocol provides stronger resilience against node capture with lower key storage overhead. 展开更多
关键词 Wireless Sensor Networks SECURITY MESSAGE Authentication Code CRYPTOGRAPHIC Node CAPTURE ATTACK
在线阅读 下载PDF
Enhancement of FSO Communications Links Under Complex Environment 被引量:1
16
作者 Satea H. ALNAJJAR Ammar A. NOORI Arwa A. MOOSA 《Photonic Sensors》 SCIE EI CAS CSCD 2017年第2期113-122,共10页
Free space optical communication is a line-of-sight (LOS) technology that uses lasers to provide optical bandwidth connections. Potential disturbance arising from the weather condition is one of the most effective f... Free space optical communication is a line-of-sight (LOS) technology that uses lasers to provide optical bandwidth connections. Potential disturbance arising from the weather condition is one of the most effective factors that influence the bi-directional free space optics (FSO) performance. The complex weather condition in the Middle East region and Arabian Gulf has been dominated by dust storms activities. Dust storms directly affect the characteristics of FSO and consequently lead to an increase in the bit error rate (BER) and deterioration Q-factor to bad levels due to the high attenuation factor. In this research, the authors compare the differences between two bi-directional FSOs. One is the traditional link, and the other has been developed to enhance the system performance under the dust storms condition. The proposed design consists of dual FSO channels, and each one includes erbium-doped fiber amplifier (EDFA) optical amplifiers. This design has demonstrated the proficiency in addressing the attenuation that occurs due to weather stickers. The results prove there is an improvement in performance by measuring the Q-factor. In addition, BER can be significantly improved, and further communicating distance can be achieved by utilizing 1550nm with multiple channels and EDFA. 展开更多
关键词 FSO atmospheric attenuation LASER dust attenuation EDFA
原文传递
Quantum secure direct communication and authentication protocol with single photons 被引量:16
17
作者 CHANG Yan XU ChunXiang +1 位作者 ZHANG ShiBin YAN LiLi 《Chinese Science Bulletin》 SCIE EI CAS 2013年第36期4571-4576,共6页
A quantum secure direct communication and authentication protocol is proposed by using single photons.An information transmission is completed by sending photons once in quantum channel,which improves the efficiency w... A quantum secure direct communication and authentication protocol is proposed by using single photons.An information transmission is completed by sending photons once in quantum channel,which improves the efficiency without losing the security.The protocol encodes identity-string of the receiver as single photons sequence,which acts as detection sequence and implements authentication.Before secret message is encoded as single photons sequence,it is encrypted with identity-string of the sender by using XOR operation,which defends quantum teleportation attack efficiently.The base identity-strings of the sender and the receiver are reused unconditionally secure even in noisy channel.Compared with the protocol proposed by Wang et al.(Phys Lett A,2006,358:256–258),the protocol in this study sends photons once in one transmission and defends most attacks including‘man-in-the-middle’attack and quantum teleportation attack efficiently. 展开更多
关键词 量子安全直接通信 认证协议 单光子 信息发送 量子隐形传态 信息编码 隐形传输 无条件安全
在线阅读 下载PDF
Controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad 被引量:13
18
作者 Yan Chang Chunxiang Xu +1 位作者 Shibin Zhang Lili Yan 《Chinese Science Bulletin》 SCIE EI CAS 2014年第21期2541-2546,共6页
A controlled quantum secure direct communication and authentication protocol is proposed with a quantum one-time pad based on five-particle cluster state.Photon 4 in each five-particle cluster state is sent to the con... A controlled quantum secure direct communication and authentication protocol is proposed with a quantum one-time pad based on five-particle cluster state.Photon 4 in each five-particle cluster state is sent to the controller as permission.Unitary operation I(U)on photon4 according to identity-string of the receiver is used to forbid the controller to deduce secret message.The classical XOR operation serving as a one-time-pad is used to forbid external eavesdroppers to eavesdrop.Eavesdropping detection and identity authentication are implemented by previously shared reusable base identity-strings.In one transmission,one qubit of each five-particle cluster state is used as controller’s permission,and two qubits are used to transmit two classical bit information. 展开更多
关键词 认证协议 一次一密 量子位 控制器 团簇 粒子 安全 量子比特
在线阅读 下载PDF
Deterministic secure quantum communication and authentication protocol based on three-particle W state and quantum one-time pad 被引量:3
19
作者 Yan Chang Shibin Zhang +1 位作者 Lili Yan Jian Li 《Chinese Science Bulletin》 SCIE EI CAS 2014年第23期2835-2840,共6页
Three-particle W states are used as decoy photons,and the eavesdropping detection rate reaches63%.The positions of decoy photons in information sequence are encoded with identity string ID of the legitimate users.Auth... Three-particle W states are used as decoy photons,and the eavesdropping detection rate reaches63%.The positions of decoy photons in information sequence are encoded with identity string ID of the legitimate users.Authentication is implemented by using previously shared identity string.State/j i is used as the carrier.One photon of/j i is sent to Bob;and Bob obtains a random key by measuring photons with bases dominated by ID.The bases information is secret to others except Alice and Bob.Both the eavesdropping detection based on three-particle W state and the secret ID ensure the security of the protocol.Unitary operations are not used. 展开更多
关键词 三粒子W态 认证协议 量子通信 安全性 一次一密 信息序列 身份验证 随机密钥
在线阅读 下载PDF
Robust EPR-pairs-based quantum secure communication with authentication resisting collective noise 被引量:3
20
作者 CHANG Yan ZHANG ShiBin +1 位作者 LI Jian YAN LiLi 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2014年第10期1907-1912,共6页
This work presents two robust quantum secure communication schemes with authentication based on Einstein-Podolsky-Rosen(EPR) pairs, which can withstand collective noises. Two users previously share an identity string ... This work presents two robust quantum secure communication schemes with authentication based on Einstein-Podolsky-Rosen(EPR) pairs, which can withstand collective noises. Two users previously share an identity string representing their identities. The identity string is encoded as decoherence-free states(termed logical qubits), respectively, over the two collective noisy channels, which are used as decoy photons. By using the decoy photons, both the authentication of two users and the detection of eavesdropping were implemented. The use of logical qubits not only guaranteed the high fidelity of exchanged secret message, but also prevented the eavesdroppers to eavesdrop beneath a mask of noise. 展开更多
关键词 quantum secure direct communication AUTHENTICATION fault tolerant collective noise
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部