期刊文献+

一种基于Einstein-Podolsky-Rosen(EPR)序列的量子安全直接通信协议 被引量:5

A Quantum Secure Direct Communication Scheme Based on Einstein-Podolsky-Rosen(EPR) Sequence
下载PDF
导出
摘要 为了提高量子安全直接通信协议的安全性并同时降低其成本,该文通过对协议中检测窃听过程的分析给出了一种有效的方法,并从量子安全直接通信和量子秘密共享两种角度验证了这种方法的可行性。合法通信者使用携带有秘密消息的传输粒子检测窃听,并且不会泄露任何秘密消息。分析表明,合法通信者在不用制备单独用来检测窃听的检测粒子情况下,不仅能够让协议的量子比特理论效率达到100%,而且可以确保其无条件安全。 To improve the security of quantum secure direct communication protocols and reduce their cost, tnls paper presents a new means after analyzing the process of the eavesdropping detection, and offers a quantum secure direct communication scheme and a quantum secret sharing protocol to argue for it. Players employ the travel particles carrying secret messages to detect eavesdropping, and leak noting about secret messages. Investigation shows that players can make the quantum cryptography protocol not only with qubit efficiency of 100% but also secure in case of none checking particles made for eavesdropping detection only.
出处 《电子与信息学报》 EI CSCD 北大核心 2012年第8期1917-1922,共6页 Journal of Electronics & Information Technology
基金 国家自然科学基金(60803154)资助课题
关键词 量子安全直接通信 传输粒子 检测粒子 量子比特理论效率 Quantum secure direct communication Travel particle Checking particle Qubit efficiency
  • 相关文献

参考文献10

  • 1GSM Association. GSM World-Home of the GSMAssociation. http://www.gsmworld.com/, June 2010.
  • 2Golic J. Cryptanalysis of three mutually clock-controlledstop/go shift registers[J]. IEEE Transactions on InformationTheory, 2000, 46(3): 1081-1090.
  • 3Kumar S, Paar C, Pelzl J, et al.. Breaking ciphers withCOPACOBANAa cost-optimized parallel code breaker[C]. Lecture Notes in Computer Science, 2006, 4249: 101-118.
  • 4Nohl K. Attacking phone privacy. ftp://ftp.trinxp. com/docz/it_tech/blackhat/BlackHat-USA-2010-Nohl-Attacking.Phone. Privacy-wp. pdf, 2010.
  • 5Glendrange M, Hove K, and Hvideberg E. Decoding GSM.http://ntnu.diva-portal.org/smash/get/diva2:355716/FULLTEXT01, June 2010.
  • 6Hamdan A and Bartlett H. State space convergence in theA5/1 keystream generator. http://www.spms.ntu.du.sg/Asiacrypt 2010/Rump, Dec 7th 2010.
  • 7Hellman M E. A cryptanalytic time-memory trade-off [J].IEEE Transactions on Information Theory, 1980, 26(4):401-406.
  • 8Borst J. Block ciphers: design, analysis and side-channelanalysis [D]. [Ph.D. dissertation], Katholieke UniversiteitLeuven, 2001.
  • 9Avoine G, Junod P, and Oechslin P. Time-memory trade-offs:false alarm detection using checkpoints [C]. Lecture Notes inComputer Science, 2005, 3797: 183-196.
  • 10Gisin N, Ribordy G, Tittle W, et al.. Quantum cryptography [J]. Reviews of Modern Physics, 2002, 74(2): 145-195.

同被引文献37

  • 1刘文杰,陈汉武,刘景发,刘志昊.基于互认证的三维单光子量子安全直接通信[J].中南大学学报(自然科学版),2009,40(S1):309-314. 被引量:4
  • 2计新.受控量子传输和安全直接通讯[J].延边大学学报(自然科学版),2005,31(3):175-178. 被引量:2
  • 3邓富国,周萍,李熙涵,李春燕,周宏余.量子安全直接通信研究进展[J].原子核物理评论,2005,22(4):382-386. 被引量:3
  • 4王剑,陈皇卿,张权,唐朝京.多方控制的量子安全直接通信协议[J].物理学报,2007,56(2):673-677. 被引量:22
  • 5潘承洞,潘承彪.初等数论[M].第2版.北京:北京大学出版社,2003.
  • 6Diffie W and Heilman M E. New directions on cryptography[J]. IEEE Transactions on Information Theory, 1976,IT-22(6): 644-654.
  • 7Shor P W. Polynomial-time algorithms for primefactorization and discrete logarithms on a quantum computer[J]. SIAM Journal on Computing, 1997, 26(5): 1484-1509.
  • 8Grover L K. A fast quantum mechanics algorithm fordatabase search [C]. Proceedings of the Twenty-EighthAnnual ACM Symposium on the Theory of computing,Philadelphia, 1996: 212-219.
  • 9Ajtai M. Generating hard instances of lattice problems[C].Proceedings of the Twenty-Eighth Annual ACM Symposiumon the Theory of Computing, Philadelphia, 1996: 1-32.
  • 10Menezes A J, Oorschot P C V, and Vanstone S A. Handbookof Applied Cryptography[M]. Canda: CRC Press LLC, 1997:103-104.

引证文献5

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部