期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
量子网络系统研究进展与关键技术分析
1
作者 李静 高飞 +2 位作者 秦素娟 温巧燕 张平 《中国工程科学》 CSCD 北大核心 2023年第6期80-95,共16页
量子信息领域的迅速发展为现代信息技术带来了新的机遇与挑战,其中的热门研究方向之一即量子网络,旨在利用量子力学的基本特性实现长距离的(安全)通信任务,或通过分布式计算提供优于经典计算网络的计算能力,相关研究对推动量子信息的实... 量子信息领域的迅速发展为现代信息技术带来了新的机遇与挑战,其中的热门研究方向之一即量子网络,旨在利用量子力学的基本特性实现长距离的(安全)通信任务,或通过分布式计算提供优于经典计算网络的计算能力,相关研究对推动量子信息的实用化具有重要意义。本文根据量子网络应用场景和技术手段的差异性,从量子密码网络、量子云计算网络、量子隐形传态网络3个细分类别出发,全面梳理了国内外的研究进展及发展挑战,以便掌握量子网络系统的最新发展态势;结合量子网络的实施情况,阐述了量子网络系统发展中亟待攻克的链路建立、信息传输、网络协议、物理硬件等关键技术。综合来看,量子网络仍处于初级发展阶段,当前需积极应对挑战并把握机遇,以增强我国前沿领域的科技硬实力。研究建议,加强基础硬件设施研发投入、重视量子网络理论研究、加强交叉学科研究和相关人才培养,以促进我国量子网络系统的发展。 展开更多
关键词 量子信息 量子网络 量子密码网络 量子云计算网络 量子隐形传态网络
下载PDF
QML:一种混合空间索引结构 被引量:2
2
作者 崔栋 温巧燕 +1 位作者 张华 王华伟 《通信学报》 EI CSCD 北大核心 2021年第12期1-16,共16页
为了丰富现有学习多维索引的功能并提高索引效率,提出了可以保留数据分布特征的动态数据分段算法DDSA,并结合四叉树和Z顺序曲线构建了混合空间索引(QML),在此基础上分别设计范围查询算法和KNN查询算法。这种保留数据分布特征的索引可以... 为了丰富现有学习多维索引的功能并提高索引效率,提出了可以保留数据分布特征的动态数据分段算法DDSA,并结合四叉树和Z顺序曲线构建了混合空间索引(QML),在此基础上分别设计范围查询算法和KNN查询算法。这种保留数据分布特征的索引可以灵活实现快速查询和更新。实验结果表明,QML索引在实现丰富功能的前提下优化了检索效率,数据更新的时间复杂度为O(1)。与R^(*)-tree相比,QML索引存储减少约33%,更新效率提升40%~80%。查询效率与最优树形索引相近。 展开更多
关键词 数据库 空间索引 学习索引
下载PDF
Efficient ID-Based Proxy Blind Signature Scheme 被引量:2
3
作者 ZHANG Qing wen qiaoyan CHEN Gengli 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期105-108,共4页
In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting and e-... In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting and e-payment. In this paper, we propose an identity-based proxy blind signature scheme which combines the advantages of proxy signature and of blind signature. Our scheme fulfills peffecdy the security requirements of a proxy blind signature. Comparing the previous scheme, our scheme needs less computational overhead and is more efficient. 展开更多
关键词 proxy signature blind signature IDENTITY-BASED bilinear pairings
下载PDF
水质分析过程中采样与保存的质量控制 被引量:1
4
作者 温巧艳 黄肖凤 +3 位作者 林发媚 李京桃 韩惠芳 王一晨 《云南化工》 CAS 2022年第10期57-58,63,共3页
为了确保实验室监测的水质能真实的反映水质的实际情况,水质的采集要求和保存方法是质量控制很重要的工作。依据GB 17378.3-2007、HJ/T 91-2002等标准简述了水样的采集与保存的措施,加强质量控制,有效提高水质监测过程中结果数据的准确... 为了确保实验室监测的水质能真实的反映水质的实际情况,水质的采集要求和保存方法是质量控制很重要的工作。依据GB 17378.3-2007、HJ/T 91-2002等标准简述了水样的采集与保存的措施,加强质量控制,有效提高水质监测过程中结果数据的准确性和有效性。 展开更多
关键词 水样采集 保存 质量控制
下载PDF
Quantum Secret Sharing Protocols with High Efficiency
5
作者 GAO Fei wen qiaoyan ZHU Fuchen 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期117-120,共4页
Measuring the two photons from a Bell state will yield certain correlations between the measurement results. Based on this feature, two quantum secret sharing protocols were proposed. The security against several gene... Measuring the two photons from a Bell state will yield certain correlations between the measurement results. Based on this feature, two quantum secret sharing protocols were proposed. The security against several general attacks was analysed and it was shown that both schemes are secure in theory. Furthermore, both schemes achieve full efficiency and there is no need to utilize multi-particle entanglement, which is relatively more difficult to generate. 展开更多
关键词 quantum secret sharing quantum cryptography ENTANGLEMENT information security
下载PDF
Eavesdropping on the Orderly-Encrypting Multiparty Quantum Secret Sharing Protocols
6
作者 QIN Sujuan wen qiaoyan ZHU Fuchen 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1593-1596,共4页
We discuss the security of the kind of multiparty quantum secret sharing protocols encrypting in series. It is secure against the eavesdroppers outside. However it is weak to withstand the attack of insider with a fak... We discuss the security of the kind of multiparty quantum secret sharing protocols encrypting in series. It is secure against the eavesdroppers outside. However it is weak to withstand the attack of insider with a fake signal and cheating. An idiographic attack strategy is given based on the protocol. Furthermore, we conclude the key leak of the protocols and present a possible way to prevent the dishonest agents from stealing the secret. 展开更多
关键词 quantum secret sharing bell measurement entangled state
下载PDF
Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication 被引量:28
7
作者 GAO Fei GUO FenZhuo +1 位作者 wen qiaoyan ZHU FuChen 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2008年第5期559-566,共8页
From the perspective of information theory and cryptography,the security of two quantum dialogue protocols and a bidirectional quantum secure direct communi-cation(QSDC) protocol was analyzed,and it was pointed out th... From the perspective of information theory and cryptography,the security of two quantum dialogue protocols and a bidirectional quantum secure direct communi-cation(QSDC) protocol was analyzed,and it was pointed out that the transmitted information would be partly leaked out in them.That is,any eavesdropper can elicit some information about the secrets from the public annunciations of the legal us-ers.This phenomenon should have been strictly forbidden in a quantum secure communication.In fact,this problem exists in quite a few recent proposals and,therefore,it deserves more research attention in the following related study. 展开更多
关键词 QUANTUM secure direct communication QUANTUM DIALOGUE QUANTUM CRYPTOGRAPHY CRYPTANALYSIS
原文传递
Quantum secure direct communication over the collective amplitude damping channel 被引量:9
8
作者 QIN SuJuan wen qiaoyan +1 位作者 MENG LuoMing ZHU FuChen 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2009年第8期1208-1212,共5页
An efficient quantum secure direct communication protocol is presented over the amplitude damping channel.The protocol encodes logical bits in two-qubit noiseless states,and so it can function over a quantum channel s... An efficient quantum secure direct communication protocol is presented over the amplitude damping channel.The protocol encodes logical bits in two-qubit noiseless states,and so it can function over a quantum channel subjected to collective amplitude damping.The feature of this protocol is that the sender encodes the secret directly on the quantum states,the receiver decodes the secret by performing determinate measurements,and there is no basis mismatch.The transmission's safety is ensured by the nonorthogonality of the noiseless states traveling forward and backward on the quantum channel.Moreover,we construct the efficient quantum circuits to implement channel encoding and information encoding by means of primitive operations in quantum computation. 展开更多
关键词 QUANTUM secure direct communication AMPLITUDE DAMPING QUANTUM CRYPTOGRAPHY
原文传递
Quantum secure direct communication with cluster states 被引量:20
9
作者 CAO WeiFeng YANG YuGuang wen qiaoyan 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2010年第7期1271-1275,共5页
A quantum secure direct communication protocol with cluster states is proposed.Compared with the deterministic secure quantum communication protocol with the cluster state proposed by Yuan and Song(Int.J.Quant.Inform.... A quantum secure direct communication protocol with cluster states is proposed.Compared with the deterministic secure quantum communication protocol with the cluster state proposed by Yuan and Song(Int.J.Quant.Inform.,2009,7:689),this protocol can achieve higher intrinsic efficiency by using two-step transmission.The implementation of this protocol is also discussed. 展开更多
关键词 quantum secure direct communication deterministic secure quantum communication cluster state
原文传递
Comparing the efficiencies of different detect strategies in the ping-pong protocol 被引量:7
10
作者 GAO Fei GUO FenZhuo +1 位作者 wen qiaoyan ZHU FuChen 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2008年第12期1853-1860,共8页
The way to compare the efficiencies of different detect strategies (DSs) in the "ping-pong" protocol is studied. The trade-off between information gain and dis- turbance is calculated and compared for differ... The way to compare the efficiencies of different detect strategies (DSs) in the "ping-pong" protocol is studied. The trade-off between information gain and dis- turbance is calculated and compared for different DSs. The comparison result primely tallies with our intuitional analysis. It is shown that the analysis of this trade-off is a feasible way to compare the performances of different DSs in theory. 展开更多
关键词 QUANTUM KEY distribution QUANTUM CRYPTOGRAPHY QUANTUM SECURE direct communication
原文传递
Quantum asymmetric cryptography with symmetric keys 被引量:6
11
作者 GAO Fei wen qiaoyan +1 位作者 QIN SuJuan ZHU FuChen 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2009年第12期1925-1931,共7页
Based on quantum encryption,we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system. We show that the quantum-mechanical nature renders it feasible... Based on quantum encryption,we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system. We show that the quantum-mechanical nature renders it feasible and reasonable to use symmetric keys in such a scheme,which is quite different from that in conventional public-key cryptography. The security of our scheme is analyzed and some features are discussed. Furthermore,the state-estimation attack to a prior QPKC scheme is demonstrated. 展开更多
关键词 QUANTUM CRYPTOGRAPHY public-key CRYPTOGRAPHY ENTANGLEMENT
原文传递
QKD-based quantum private query without a failure probability 被引量:6
12
作者 LIU Bin GAO Fei +1 位作者 HUANG Wei wen qiaoyan 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2015年第10期12-17,共6页
In this paper, we present a quantum-key-distribution(QKD)-based quantum private query(QPQ) protocol utilizing single-photon signal of multiple optical pulses. It maintains the advantages of the QKD-based QPQ, i.e., ea... In this paper, we present a quantum-key-distribution(QKD)-based quantum private query(QPQ) protocol utilizing single-photon signal of multiple optical pulses. It maintains the advantages of the QKD-based QPQ, i.e., easy to implement and loss tolerant. In addition, different from the situations in the previous QKD-based QPQ protocols, in our protocol, the number of the items an honest user will obtain is always one and the failure probability is always zero. This characteristic not only improves the stability(in the sense that, ignoring the noise and the attack, the protocol would always succeed), but also benefits the privacy of the database(since the database will no more reveal additional secrets to the honest users). Furthermore, for the user's privacy, the proposed protocol is cheat sensitive, and for security of the database, we obtain an upper bound for the leaked information of the database in theory. 展开更多
关键词 quantum private query quantum key distribution single-photon signal
原文传递
Robust and efficient quantum private comparison of equality with collective detection over collective-noise channels 被引量:6
13
作者 HUANG Wei wen qiaoyan +2 位作者 LIU Bin GAO Fei SUN Ying 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2013年第9期1670-1678,共9页
We present a protocol for quantum private comparison of equality(QPCE) with the help of a semi-honest third party(TP).Instead of employing the entanglement,we use single photons to achieve the comparison in this proto... We present a protocol for quantum private comparison of equality(QPCE) with the help of a semi-honest third party(TP).Instead of employing the entanglement,we use single photons to achieve the comparison in this protocol.By utilizing collective eavesdropping detection strategy,our protocol has the advantage of higher qubit efficiency and lower cost of implementation.In addition to this protocol,we further introduce three robust versions which can be immune to collective dephasing noise,collective-rotation noise and all types of unitary collective noise,respectively.Finally,we show that our protocols can be secure against the attacks from both the outside eavesdroppers and the inside participants by using the theorems on quantum operation discrimination. 展开更多
关键词 quantum private comparison of equality collective detection collective noise
原文传递
Fault tolerant quantum secret sharing against collective-amplitude-damping noise 被引量:4
14
作者 YANG YuGuang CHAI HaiPing +2 位作者 WANG Yuan TENG YiWei wen qiaoyan 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2011年第9期1619-1624,共6页
We present a quantum secret sharing protocol against collective-amplitude-damping noise. Each logical qubit is encoded in two qubit noiseless states. So it can function over such a noisy channel. The two agents encode... We present a quantum secret sharing protocol against collective-amplitude-damping noise. Each logical qubit is encoded in two qubit noiseless states. So it can function over such a noisy channel. The two agents encode their messages on each logical qubit only by performing a permutation operation on two physical qubits. Although each logical qubit received by each agent only carries a bit of information, the boss Alice can read out her agents' information by discriminating two orthogonal states by performing single-qubit measurements assisted by local operation and classical communication (LOCC). 展开更多
关键词 quantum secret sharing fault tolerant collective noise amplitude damping
原文传递
Minimum best success probability by classical strategies for quantum pseudo-telepathy 被引量:3
15
作者 GAO Fei FANG Wei wen qiaoyan 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2014年第7期1244-1249,共6页
Quantum pseudo-telepathy(QPT)is a new type of game where the quantum team can win with certainty while the classical one cannot.It means the advantages of quantum participants over classical ones in game.However,there... Quantum pseudo-telepathy(QPT)is a new type of game where the quantum team can win with certainty while the classical one cannot.It means the advantages of quantum participants over classical ones in game.However,there has been no systematic and formal analysis on the QPT game before.Here we present the formal description of the QPT game and the definition of the most simplified QPT.Based on the above definitions,we simplify a famous QPT game,i.e.the Cabllo game.Then,according to some instances,we analyze the minimum best success probability by classical strategies of the two-player QPT,which reflects the advantage of the quantum strategies.Finally,we prove the best success probability by classical strategies for the most simplified QPT is totally related to the number of all possible question combinations. 展开更多
关键词 quantum game pseudo-telepathy quantum strategy
原文传递
Data embedding based on pixel value differencing and modulus function using indeterminate equation 被引量:2
16
作者 Wang Zhao Zhang Jie +1 位作者 Liao Xin wen qiaoyan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2015年第1期95-100,共6页
An effective data hiding method based on pixel value differencing (PVD) and modulus function (MF) PVD (MF-PVD) was proposed. MF-PVD method was derived by Wang et al in which the MF was employed to adjust the rem... An effective data hiding method based on pixel value differencing (PVD) and modulus function (MF) PVD (MF-PVD) was proposed. MF-PVD method was derived by Wang et al in which the MF was employed to adjust the remainder of two pixels for data embedding and extraction. In the proposed method, a new remainder function in a more general form is defined by selecting proper parameters, in which an indeterminate equation is constructed and an optimal solution is applied to revise the pixels. This strategy leads to a significant image distortion reduction compared with the original method. The experiment reveals that, by preserving the original embedding capacity, the method provides better embedding efficiency than both MF-PVD and PVD methods. 展开更多
关键词 pixel value differencing modulus function indeterminate equation data embedding
原文传递
浅析博物馆数字文化资源的开放与共享
17
作者 闻桥妍 毕经纬 《艺术博物馆》 2022年第4期48-55,共8页
博物馆数字文化资源的开放与共享是公众的迫切需求,也是博物馆的内在使命和必然要求。当前我国博物馆的藏品、展览、教育活动以及学术性数字文化资源,均存在开放与共享程度较低、质量较差等问题,影响了博物馆的社会形象以及社会服务职... 博物馆数字文化资源的开放与共享是公众的迫切需求,也是博物馆的内在使命和必然要求。当前我国博物馆的藏品、展览、教育活动以及学术性数字文化资源,均存在开放与共享程度较低、质量较差等问题,影响了博物馆的社会形象以及社会服务职能的实现。针对这些问题,博物馆需要改变现有观念、健全制度法规、完善平台建设、打破知识产权壁垒、利用市场助力等方式,推动数字文化资源的开放与共享,提升博物馆软实力,提高社会影响力,进而助力博物馆社会服务职能的实现。 展开更多
关键词 博物馆 数字文化资源 开放与共享
原文传递
Algebraic immunities of vector-valued functions over finite fields
18
作者 Liu Zhenhua Zhang Jie wen qiaoyan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2015年第5期16-21,共6页
Algebraic immunity is an important cryptographic property of Boolean functions. The notion of algebraic immunity of Boolean functions has been generalized in several ways to vector-valued functions over arbitrary fini... Algebraic immunity is an important cryptographic property of Boolean functions. The notion of algebraic immunity of Boolean functions has been generalized in several ways to vector-valued functions over arbitrary finite fields. In this paper, the results of Ref. [25] are generalized to arbitrary finite fields. We obtain vector-valued functions over arbitrary finite fields such that their algebraic immunities can reach the upper bounds. Furthermore, all the component functions, together with their some nonzero linear combinations, of vector-valued Boolean functions achieved by this construction have optimal algebraic immunities simultaneously. 展开更多
关键词 CRYPTOGRAPHY Boolean functions algebraic immunity
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部