In a recent paper [Yan F L et al. Chin.Phys.Lett. 25(2008)1187], a quantum secret sharing the protocol between multiparty and multiparty with single photons and unitary transformations was presented. We analyze the ...In a recent paper [Yan F L et al. Chin.Phys.Lett. 25(2008)1187], a quantum secret sharing the protocol between multiparty and multiparty with single photons and unitary transformations was presented. We analyze the security of the protocol and find that a dishonest participant can eavesdrop the key by using a special attack. Finally, we give a description of this strategy and put forward an improved version of this protocol which can stand against this kind of attack.展开更多
This work develops an equilibrium model for finding the optimal distribution strategy to maximize performance of key predistribution protocols in terms of cost, resilience, connectivity, and lifetime. As an essential ...This work develops an equilibrium model for finding the optimal distribution strategy to maximize performance of key predistribution protocols in terms of cost, resilience, connectivity, and lifetime. As an essential attribute of wireless sensor networks, heterogeneity and its impacts on random key predistribution protocols are first discussed. Using supernetworks theory, the optimal node deployment model is proposed and illustrated. In order to find the equilibrium performance of our model, all optimal performance functions are changed into variational inequalities so that this optimization problem can be solved. A small-scale example is presented to illustrate the applicability of our model.展开更多
Recently,a genuine five-qubit entangled state has been achieved by Brown et al.[J.Phys.A 38(2005)1119].Later it was indicated that this state can be used for quantum teleportation and quantum state sharing.Here we bui...Recently,a genuine five-qubit entangled state has been achieved by Brown et al.[J.Phys.A 38(2005)1119].Later it was indicated that this state can be used for quantum teleportation and quantum state sharing.Here we build a quantum secure direct communication protocol with this state,and prove that it is secure in ideal conditions.In the protocol,the sender performs unitary transformations to encode a secret message on his/her particles and sends them to the receiver.The receiver then performs projective determinate measurement to decode the secret message directly.Fhrthermore,this protocol utilizes superdense coding to achieve a high intrinsic efficiency and source capacity.展开更多
An arbitrated quantum signature scheme without using entangled states is proposed.In the scheme,by employing a classical hash function and random numbers,the secret keys of signer and receiver can be reused.It is show...An arbitrated quantum signature scheme without using entangled states is proposed.In the scheme,by employing a classical hash function and random numbers,the secret keys of signer and receiver can be reused.It is shown that the proposed scheme is secure against several well-known attacks.Specifically,it can stand against the receiver’s disavowal attack.Moreover,compared with previous relevant arbitrated quantum signature schemes,the scheme proposed has the advantage of less transmission complexity.展开更多
基金Supported by the National Natural Science Foundation of China under Grant Nos 60873191, 60903152 and 60821001, the SRFDP under Grant No 200800131016, Beijing Nova Program under Grant No 2008B51, Key Project of the Ministry of Education of China under Grant No 109014, China Postdoctoral Science Foundation under Grant No 20090450018, Fujian Provincial Natural Science Foundation under Grant No 2008J0013, and the Foundation of Fujian Education Bureau under Grant No 3A08044.
文摘In a recent paper [Yan F L et al. Chin.Phys.Lett. 25(2008)1187], a quantum secret sharing the protocol between multiparty and multiparty with single photons and unitary transformations was presented. We analyze the security of the protocol and find that a dishonest participant can eavesdrop the key by using a special attack. Finally, we give a description of this strategy and put forward an improved version of this protocol which can stand against this kind of attack.
基金supported by the National Natural Science Foundation of China (Nos.61170241 and 61472097)the Specialized Research Fund for the Doctoral Program of Higher Education (No.20132304110017)the Open Fund of the Key Lab of Network Security and Cryptography of Fujian Province (No.150003)
文摘This work develops an equilibrium model for finding the optimal distribution strategy to maximize performance of key predistribution protocols in terms of cost, resilience, connectivity, and lifetime. As an essential attribute of wireless sensor networks, heterogeneity and its impacts on random key predistribution protocols are first discussed. Using supernetworks theory, the optimal node deployment model is proposed and illustrated. In order to find the equilibrium performance of our model, all optimal performance functions are changed into variational inequalities so that this optimization problem can be solved. A small-scale example is presented to illustrate the applicability of our model.
基金Supported by the National Natural Science Foundation of China under Grant Nos 60873191,60903152 and 61003286the Specialized Research Fund for the Doctoral Program of Higher Education(SRFDP)under Grant Nos 200800131016 and 20090005110010,Beijing Nova Program(No 2008B51)Fujian Province Natural Science Foundation(No 2010J05128),a Key Project of Fujian Provincial Universities–Information Technology Research Based on Mathematics.
文摘Recently,a genuine five-qubit entangled state has been achieved by Brown et al.[J.Phys.A 38(2005)1119].Later it was indicated that this state can be used for quantum teleportation and quantum state sharing.Here we build a quantum secure direct communication protocol with this state,and prove that it is secure in ideal conditions.In the protocol,the sender performs unitary transformations to encode a secret message on his/her particles and sends them to the receiver.The receiver then performs projective determinate measurement to decode the secret message directly.Fhrthermore,this protocol utilizes superdense coding to achieve a high intrinsic efficiency and source capacity.
基金supported by the National Natural Science Foundation of China (Grants Nos.61202451 and 61103210)Fujian Province Science and Technology Cooperation Projects (Grant No.2010H6007)+2 种基金Foundation of Fujian Education Bureau (Grant No.JA12062)Program for Innovative Re search Team in Science and Technology in Fujian Province Universitya Key Project of Fujian Provincial Universities-Information Technology Research Based on Mathematics
文摘An arbitrated quantum signature scheme without using entangled states is proposed.In the scheme,by employing a classical hash function and random numbers,the secret keys of signer and receiver can be reused.It is shown that the proposed scheme is secure against several well-known attacks.Specifically,it can stand against the receiver’s disavowal attack.Moreover,compared with previous relevant arbitrated quantum signature schemes,the scheme proposed has the advantage of less transmission complexity.