期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Cryptanalysis and Improvement of Quantum Secret Sharing Protocol between Multiparty and Multiparty with Single Photons and Unitary Transformations 被引量:1
1
作者 林崧 温巧燕 刘晓芬 《Chinese Physics Letters》 SCIE CAS CSCD 2009年第12期35-38,共4页
In a recent paper [Yan F L et al. Chin.Phys.Lett. 25(2008)1187], a quantum secret sharing the protocol between multiparty and multiparty with single photons and unitary transformations was presented. We analyze the ... In a recent paper [Yan F L et al. Chin.Phys.Lett. 25(2008)1187], a quantum secret sharing the protocol between multiparty and multiparty with single photons and unitary transformations was presented. We analyze the security of the protocol and find that a dishonest participant can eavesdrop the key by using a special attack. Finally, we give a description of this strategy and put forward an improved version of this protocol which can stand against this kind of attack. 展开更多
关键词 Computational physics Electronics and devices Optics quantum optics and lasers Quantum information and quantum mechanics
原文传递
Optimization of Key Predistribution Protocol Based on Supernetworks Theory in Heterogeneous WSN
2
作者 Qi Yuan Chunguang Ma +2 位作者 Xiaorui Zhong Gang Du Jiansheng Yao 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第3期333-343,共11页
This work develops an equilibrium model for finding the optimal distribution strategy to maximize performance of key predistribution protocols in terms of cost, resilience, connectivity, and lifetime. As an essential ... This work develops an equilibrium model for finding the optimal distribution strategy to maximize performance of key predistribution protocols in terms of cost, resilience, connectivity, and lifetime. As an essential attribute of wireless sensor networks, heterogeneity and its impacts on random key predistribution protocols are first discussed. Using supernetworks theory, the optimal node deployment model is proposed and illustrated. In order to find the equilibrium performance of our model, all optimal performance functions are changed into variational inequalities so that this optimization problem can be solved. A small-scale example is presented to illustrate the applicability of our model. 展开更多
关键词 OPTIMIZATION key predistribution protocol supernetworks variational inequality wireless sensornetworks
原文传递
Quantum Secure Direct Communication with Five-Qubit Entangled State
3
作者 LIN Song GAO Fei LIU Xiao-Fen 《Chinese Physics Letters》 SCIE CAS CSCD 2011年第3期17-20,共4页
Recently,a genuine five-qubit entangled state has been achieved by Brown et al.[J.Phys.A 38(2005)1119].Later it was indicated that this state can be used for quantum teleportation and quantum state sharing.Here we bui... Recently,a genuine five-qubit entangled state has been achieved by Brown et al.[J.Phys.A 38(2005)1119].Later it was indicated that this state can be used for quantum teleportation and quantum state sharing.Here we build a quantum secure direct communication protocol with this state,and prove that it is secure in ideal conditions.In the protocol,the sender performs unitary transformations to encode a secret message on his/her particles and sends them to the receiver.The receiver then performs projective determinate measurement to decode the secret message directly.Fhrthermore,this protocol utilizes superdense coding to achieve a high intrinsic efficiency and source capacity. 展开更多
关键词 CONDITIONS capacity QUANTUM
原文传递
Arbitrated quantum signature scheme based on reusable key 被引量:1
4
作者 YU ChaoHua GUO GongDe LIN Song 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2014年第11期2079-2085,共7页
An arbitrated quantum signature scheme without using entangled states is proposed.In the scheme,by employing a classical hash function and random numbers,the secret keys of signer and receiver can be reused.It is show... An arbitrated quantum signature scheme without using entangled states is proposed.In the scheme,by employing a classical hash function and random numbers,the secret keys of signer and receiver can be reused.It is shown that the proposed scheme is secure against several well-known attacks.Specifically,it can stand against the receiver’s disavowal attack.Moreover,compared with previous relevant arbitrated quantum signature schemes,the scheme proposed has the advantage of less transmission complexity. 展开更多
关键词 signature signer receiver secret message cryptography encryption entangled reused resist
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部