期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Cryptanalysis and improvement of controlled secure direct communication 被引量:2
1
作者 Kao Shih-Hung hwang tzonelih 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第6期203-205,共3页
This paper points out that, due to a flaw in the sender's encoding, the receiver in Gao et al.'s controlled quantum secret direct communication (CQSDC) protocol [Chin. Phys. 14 (2005), No. 5, p. 893] can reveal ... This paper points out that, due to a flaw in the sender's encoding, the receiver in Gao et al.'s controlled quantum secret direct communication (CQSDC) protocol [Chin. Phys. 14 (2005), No. 5, p. 893] can reveal the whole secret message without permission from the controller. An improvement is proposed to avoid this flaw. 展开更多
关键词 quantum cryptography quantum communication
下载PDF
Fault tolerant two-step quantum secure direct communication protocol against collective noises 被引量:22
2
作者 TSAI ChiaWei hwang tzonelih 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2011年第3期496-501,共6页
This work proposes two fault tolerant quantum secure direct communication (QSDC) protocols which are robust against two kinds of collective noises: the collective-dephasing noises and the collective-rotation noises, r... This work proposes two fault tolerant quantum secure direct communication (QSDC) protocols which are robust against two kinds of collective noises: the collective-dephasing noises and the collective-rotation noises, respectively. The two QSDC protocols are constructed from four-qubit DF states which consist of two logical qubits. The receiver simply performs two Bell state measurements (rather than four-qubit joint measurements) to obtain the secret message. The protocols have qubit effciency twice that of the other corresponding fault tolerant QSDC protocols. Furthermore, the proposed protocols are free from Trojan horse attacks. 展开更多
关键词 量子安全直接通信 通信协议 集体 容错 声音 联合测量 量子比特 旋转噪声
原文传递
Deterministic quantum communication using the symmetric W state 被引量:9
3
作者 TSAI Chia-Wei hwang tzonelih 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2013年第10期1903-1908,共6页
This study proposes a new coding function for the symmetric W state.Based on the new coding function,a theoretical protocol of deterministic quantum communication(DQC) is proposed.The sender can use the proposed codin... This study proposes a new coding function for the symmetric W state.Based on the new coding function,a theoretical protocol of deterministic quantum communication(DQC) is proposed.The sender can use the proposed coding function to encode his/her message,and the receiver can perform the imperfect Bell measurement to obtain the sender's message.In comparison to the existing DQC protocols that also use the W class state,the proposed protocol is more efcient and also more practical within today's technology.Moreover,the security of this protocol is analyzed to show that any eavesdropper will be detected with a very high probability under both the ideal and the noisy quantum channel. 展开更多
关键词 量子通信 W态 对称 编码函数 安全性分析 量子通道 协议 接收器
原文传递
Multi-party quantum secret sharing based on two special entangled states 被引量:4
4
作者 TSAI ChiaWei hwang tzonelih 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2012年第3期460-464,共5页
A multi-party quantum secret sharing protocol using two entangled states,is proposed and analyzed.In this protocol,without requiring to generate any photon or do any local unitary operation,an agent can obtain a shado... A multi-party quantum secret sharing protocol using two entangled states,is proposed and analyzed.In this protocol,without requiring to generate any photon or do any local unitary operation,an agent can obtain a shadow of the secret key by simply performing a measurement of single photon.Furthermore,the security of the protocol is analyzed.It shows that no agent can obtain the manager's secret without the help of the other agents,and any eavesdropper will be detected if he/she tries to steal the manager's secret under ideal or noisy quantum channels. 展开更多
关键词 量子秘密共享 纠缠态 单光子 代理人 协议 安全性 代理商 经理
原文传递
CNOT extraction attack on “quantum asymmetric cryptography with symmetric keys” 被引量:2
5
作者 LIN Ching-Ying hwang tzonelih 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2014年第5期1001-1003,共3页
This paper is based on previous quantum encryption proposed by researchers developing a scheme for cryptography using symmetric keys.This study has pointed out that the scheme consists of a pitfall that could lead to ... This paper is based on previous quantum encryption proposed by researchers developing a scheme for cryptography using symmetric keys.This study has pointed out that the scheme consists of a pitfall that could lead to a controlled-NOT(CNOT)extraction attack.A malicious user can obtain the secret message of a sender without being detected by using a sequence of single photons and a controlled-NOT gate. 展开更多
关键词 对称密钥 量子加密 非对称加密 攻击 提取 加密方案 研究人员 受控非门
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部