In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting and e-...In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting and e-payment. In this paper, we propose an identity-based proxy blind signature scheme which combines the advantages of proxy signature and of blind signature. Our scheme fulfills peffecdy the security requirements of a proxy blind signature. Comparing the previous scheme, our scheme needs less computational overhead and is more efficient.展开更多
Measuring the two photons from a Bell state will yield certain correlations between the measurement results. Based on this feature, two quantum secret sharing protocols were proposed. The security against several gene...Measuring the two photons from a Bell state will yield certain correlations between the measurement results. Based on this feature, two quantum secret sharing protocols were proposed. The security against several general attacks was analysed and it was shown that both schemes are secure in theory. Furthermore, both schemes achieve full efficiency and there is no need to utilize multi-particle entanglement, which is relatively more difficult to generate.展开更多
We discuss the security of the kind of multiparty quantum secret sharing protocols encrypting in series. It is secure against the eavesdroppers outside. However it is weak to withstand the attack of insider with a fak...We discuss the security of the kind of multiparty quantum secret sharing protocols encrypting in series. It is secure against the eavesdroppers outside. However it is weak to withstand the attack of insider with a fake signal and cheating. An idiographic attack strategy is given based on the protocol. Furthermore, we conclude the key leak of the protocols and present a possible way to prevent the dishonest agents from stealing the secret.展开更多
From the perspective of information theory and cryptography,the security of two quantum dialogue protocols and a bidirectional quantum secure direct communi-cation(QSDC) protocol was analyzed,and it was pointed out th...From the perspective of information theory and cryptography,the security of two quantum dialogue protocols and a bidirectional quantum secure direct communi-cation(QSDC) protocol was analyzed,and it was pointed out that the transmitted information would be partly leaked out in them.That is,any eavesdropper can elicit some information about the secrets from the public annunciations of the legal us-ers.This phenomenon should have been strictly forbidden in a quantum secure communication.In fact,this problem exists in quite a few recent proposals and,therefore,it deserves more research attention in the following related study.展开更多
An efficient quantum secure direct communication protocol is presented over the amplitude damping channel.The protocol encodes logical bits in two-qubit noiseless states,and so it can function over a quantum channel s...An efficient quantum secure direct communication protocol is presented over the amplitude damping channel.The protocol encodes logical bits in two-qubit noiseless states,and so it can function over a quantum channel subjected to collective amplitude damping.The feature of this protocol is that the sender encodes the secret directly on the quantum states,the receiver decodes the secret by performing determinate measurements,and there is no basis mismatch.The transmission's safety is ensured by the nonorthogonality of the noiseless states traveling forward and backward on the quantum channel.Moreover,we construct the efficient quantum circuits to implement channel encoding and information encoding by means of primitive operations in quantum computation.展开更多
A quantum secure direct communication protocol with cluster states is proposed.Compared with the deterministic secure quantum communication protocol with the cluster state proposed by Yuan and Song(Int.J.Quant.Inform....A quantum secure direct communication protocol with cluster states is proposed.Compared with the deterministic secure quantum communication protocol with the cluster state proposed by Yuan and Song(Int.J.Quant.Inform.,2009,7:689),this protocol can achieve higher intrinsic efficiency by using two-step transmission.The implementation of this protocol is also discussed.展开更多
The way to compare the efficiencies of different detect strategies (DSs) in the "ping-pong" protocol is studied. The trade-off between information gain and dis- turbance is calculated and compared for differ...The way to compare the efficiencies of different detect strategies (DSs) in the "ping-pong" protocol is studied. The trade-off between information gain and dis- turbance is calculated and compared for different DSs. The comparison result primely tallies with our intuitional analysis. It is shown that the analysis of this trade-off is a feasible way to compare the performances of different DSs in theory.展开更多
Based on quantum encryption,we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system. We show that the quantum-mechanical nature renders it feasible...Based on quantum encryption,we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system. We show that the quantum-mechanical nature renders it feasible and reasonable to use symmetric keys in such a scheme,which is quite different from that in conventional public-key cryptography. The security of our scheme is analyzed and some features are discussed. Furthermore,the state-estimation attack to a prior QPKC scheme is demonstrated.展开更多
In this paper, we present a quantum-key-distribution(QKD)-based quantum private query(QPQ) protocol utilizing single-photon signal of multiple optical pulses. It maintains the advantages of the QKD-based QPQ, i.e., ea...In this paper, we present a quantum-key-distribution(QKD)-based quantum private query(QPQ) protocol utilizing single-photon signal of multiple optical pulses. It maintains the advantages of the QKD-based QPQ, i.e., easy to implement and loss tolerant. In addition, different from the situations in the previous QKD-based QPQ protocols, in our protocol, the number of the items an honest user will obtain is always one and the failure probability is always zero. This characteristic not only improves the stability(in the sense that, ignoring the noise and the attack, the protocol would always succeed), but also benefits the privacy of the database(since the database will no more reveal additional secrets to the honest users). Furthermore, for the user's privacy, the proposed protocol is cheat sensitive, and for security of the database, we obtain an upper bound for the leaked information of the database in theory.展开更多
We present a protocol for quantum private comparison of equality(QPCE) with the help of a semi-honest third party(TP).Instead of employing the entanglement,we use single photons to achieve the comparison in this proto...We present a protocol for quantum private comparison of equality(QPCE) with the help of a semi-honest third party(TP).Instead of employing the entanglement,we use single photons to achieve the comparison in this protocol.By utilizing collective eavesdropping detection strategy,our protocol has the advantage of higher qubit efficiency and lower cost of implementation.In addition to this protocol,we further introduce three robust versions which can be immune to collective dephasing noise,collective-rotation noise and all types of unitary collective noise,respectively.Finally,we show that our protocols can be secure against the attacks from both the outside eavesdroppers and the inside participants by using the theorems on quantum operation discrimination.展开更多
We present a quantum secret sharing protocol against collective-amplitude-damping noise. Each logical qubit is encoded in two qubit noiseless states. So it can function over such a noisy channel. The two agents encode...We present a quantum secret sharing protocol against collective-amplitude-damping noise. Each logical qubit is encoded in two qubit noiseless states. So it can function over such a noisy channel. The two agents encode their messages on each logical qubit only by performing a permutation operation on two physical qubits. Although each logical qubit received by each agent only carries a bit of information, the boss Alice can read out her agents' information by discriminating two orthogonal states by performing single-qubit measurements assisted by local operation and classical communication (LOCC).展开更多
Quantum pseudo-telepathy(QPT)is a new type of game where the quantum team can win with certainty while the classical one cannot.It means the advantages of quantum participants over classical ones in game.However,there...Quantum pseudo-telepathy(QPT)is a new type of game where the quantum team can win with certainty while the classical one cannot.It means the advantages of quantum participants over classical ones in game.However,there has been no systematic and formal analysis on the QPT game before.Here we present the formal description of the QPT game and the definition of the most simplified QPT.Based on the above definitions,we simplify a famous QPT game,i.e.the Cabllo game.Then,according to some instances,we analyze the minimum best success probability by classical strategies of the two-player QPT,which reflects the advantage of the quantum strategies.Finally,we prove the best success probability by classical strategies for the most simplified QPT is totally related to the number of all possible question combinations.展开更多
An effective data hiding method based on pixel value differencing (PVD) and modulus function (MF) PVD (MF-PVD) was proposed. MF-PVD method was derived by Wang et al in which the MF was employed to adjust the rem...An effective data hiding method based on pixel value differencing (PVD) and modulus function (MF) PVD (MF-PVD) was proposed. MF-PVD method was derived by Wang et al in which the MF was employed to adjust the remainder of two pixels for data embedding and extraction. In the proposed method, a new remainder function in a more general form is defined by selecting proper parameters, in which an indeterminate equation is constructed and an optimal solution is applied to revise the pixels. This strategy leads to a significant image distortion reduction compared with the original method. The experiment reveals that, by preserving the original embedding capacity, the method provides better embedding efficiency than both MF-PVD and PVD methods.展开更多
Algebraic immunity is an important cryptographic property of Boolean functions. The notion of algebraic immunity of Boolean functions has been generalized in several ways to vector-valued functions over arbitrary fini...Algebraic immunity is an important cryptographic property of Boolean functions. The notion of algebraic immunity of Boolean functions has been generalized in several ways to vector-valued functions over arbitrary finite fields. In this paper, the results of Ref. [25] are generalized to arbitrary finite fields. We obtain vector-valued functions over arbitrary finite fields such that their algebraic immunities can reach the upper bounds. Furthermore, all the component functions, together with their some nonzero linear combinations, of vector-valued Boolean functions achieved by this construction have optimal algebraic immunities simultaneously.展开更多
基金Supported by the Major Research Plan of the National Natural Science Foundation of China(90604023), the National Natural Science Foundation of China (60373059) and the National Research Foundation for the Doctoral Program of Higher Education of China(20040013007)
文摘In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting and e-payment. In this paper, we propose an identity-based proxy blind signature scheme which combines the advantages of proxy signature and of blind signature. Our scheme fulfills peffecdy the security requirements of a proxy blind signature. Comparing the previous scheme, our scheme needs less computational overhead and is more efficient.
基金Supported by the Major Research Plan of the National Natural Science Foundation of China (90604023), the National Natural Science Foundation of China (60373059), the National Laboratory for Modern Commu-nications Science Foundation of China, the National Research Foundation for the Doctoral Program of Higher Education of China (20040013007), the Gradu-ate Students Innovation Foundation of Beijing University of Posts and Tele-communications and the Integrated Service Networks Open Foundation
文摘Measuring the two photons from a Bell state will yield certain correlations between the measurement results. Based on this feature, two quantum secret sharing protocols were proposed. The security against several general attacks was analysed and it was shown that both schemes are secure in theory. Furthermore, both schemes achieve full efficiency and there is no need to utilize multi-particle entanglement, which is relatively more difficult to generate.
基金Supported by the Major Research Plan of the Na-tional Natural Science Foundation of China (90604023) the NationalNatural Science Foundation of China (60373059) +2 种基金the National Re-search Foundation for the Doctoral Program of Higher Education ofChina (20040013007) the National Laboratory for Modern Commu-nications Science Foundation of China (9140C1101010601)the Graduate Students Innovation Foundation and the Integrated ServiceNetworks Open Foundation
文摘We discuss the security of the kind of multiparty quantum secret sharing protocols encrypting in series. It is secure against the eavesdroppers outside. However it is weak to withstand the attack of insider with a fake signal and cheating. An idiographic attack strategy is given based on the protocol. Furthermore, we conclude the key leak of the protocols and present a possible way to prevent the dishonest agents from stealing the secret.
基金the National High Technology Research and Development Program of China(Grant No.2006AA01Z419)the National Natural Science Foundation of China(Grant Nos.90604023 and 60373059)+3 种基金the National Research Foundation for the Doctoral Program of Higher Edu- cation of China(Grant No.20040013007)the National Laboratory for Modern Communications Science Foundation of China(Grant No.9140C1101010601)the Natural Science Foundation of Beijing(Grant No.4072020)the ISN Open Foundation
文摘From the perspective of information theory and cryptography,the security of two quantum dialogue protocols and a bidirectional quantum secure direct communi-cation(QSDC) protocol was analyzed,and it was pointed out that the transmitted information would be partly leaked out in them.That is,any eavesdropper can elicit some information about the secrets from the public annunciations of the legal us-ers.This phenomenon should have been strictly forbidden in a quantum secure communication.In fact,this problem exists in quite a few recent proposals and,therefore,it deserves more research attention in the following related study.
基金Supported by the National Natural Science Foundation of China (Grant Nos. 60873191 and 60821001)the Specialized Research Fund for the Doctoral Program of Higher Education (Grant No. 200800131016)+2 种基金the Natural Science Foundation of Beijing (Grant No. 4072020)the National Laboratory for Modern Communications Science Foundation of China (Grant No. 9140C1101010601)the ISN Open Foundation
文摘An efficient quantum secure direct communication protocol is presented over the amplitude damping channel.The protocol encodes logical bits in two-qubit noiseless states,and so it can function over a quantum channel subjected to collective amplitude damping.The feature of this protocol is that the sender encodes the secret directly on the quantum states,the receiver decodes the secret by performing determinate measurements,and there is no basis mismatch.The transmission's safety is ensured by the nonorthogonality of the noiseless states traveling forward and backward on the quantum channel.Moreover,we construct the efficient quantum circuits to implement channel encoding and information encoding by means of primitive operations in quantum computation.
基金supported by the National High-Tech Research,Development Plan of China (Grant No. 2009AA01Z441)the National Natural Science Foundation of China (Grant Nos. 60873191 and 60821001)+1 种基金the Specialized Research Fund for the Doctoral Program of Higher Education(Grant Nos. 20091103120014 and 20090005110010)the Beijing Natural Science Foundation (Grant Nos. 1093015,1102004)
文摘A quantum secure direct communication protocol with cluster states is proposed.Compared with the deterministic secure quantum communication protocol with the cluster state proposed by Yuan and Song(Int.J.Quant.Inform.,2009,7:689),this protocol can achieve higher intrinsic efficiency by using two-step transmission.The implementation of this protocol is also discussed.
基金the National High Technology Research and Development Program of China (Grant No. 2006AA01Z419)the National Natural Science Foundation of China (Grant Nos. 90604023 and 6087319)+2 种基金the National Laboratory for Modern Communications Science Foundation of China (Grant No. 9140C1101010601)the Natural Science Foundation of Beijing (Grant No. 4072020)the ISN Open Foundation.
文摘The way to compare the efficiencies of different detect strategies (DSs) in the "ping-pong" protocol is studied. The trade-off between information gain and dis- turbance is calculated and compared for different DSs. The comparison result primely tallies with our intuitional analysis. It is shown that the analysis of this trade-off is a feasible way to compare the performances of different DSs in theory.
基金Supported by the National Natural Science Foundation of China (Grant Nos. 60873191, 60821001 and 60903152)the Specialized Research Fund for the Doctoral Program of Higher Education (Grant No. 200800131016)+3 种基金Beijing Nova Program (Grant No. 2008B51)Key Project of Chinese Ministry of Education (Grant No. 109014)Beijing Municipal Natural Science Foundation (Grant No. 4072020)China Postdoctoral Science Foundation (Grant No. 20090450018)
文摘Based on quantum encryption,we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system. We show that the quantum-mechanical nature renders it feasible and reasonable to use symmetric keys in such a scheme,which is quite different from that in conventional public-key cryptography. The security of our scheme is analyzed and some features are discussed. Furthermore,the state-estimation attack to a prior QPKC scheme is demonstrated.
基金supported by the National Natural Science Foundation of China(Grant Nos.61272057 and 61170270)Beijing Higher Education Young Elite Teacher Project(Grant Nos.YETP0475 and YETP0477)Beijing University of Posts and Telecommunications Excellent Ph.D.Students Foundation(Grant No.CX201442)
文摘In this paper, we present a quantum-key-distribution(QKD)-based quantum private query(QPQ) protocol utilizing single-photon signal of multiple optical pulses. It maintains the advantages of the QKD-based QPQ, i.e., easy to implement and loss tolerant. In addition, different from the situations in the previous QKD-based QPQ protocols, in our protocol, the number of the items an honest user will obtain is always one and the failure probability is always zero. This characteristic not only improves the stability(in the sense that, ignoring the noise and the attack, the protocol would always succeed), but also benefits the privacy of the database(since the database will no more reveal additional secrets to the honest users). Furthermore, for the user's privacy, the proposed protocol is cheat sensitive, and for security of the database, we obtain an upper bound for the leaked information of the database in theory.
基金supported by the National Natural Science Foundation of China (Grant Nos.61272057,61170270,61100203,61003286,61121061 and 61103210)the Program for New Century Excellent Talents in Universities (Grant No.NCET-10-0260)+3 种基金the Specialized Research Fund for the Doctoral Program of Higher Education (Grant No.20090005110010)the Natural Science Foundation of Beijing (Grant Nos.4112040 and 4122054)the Fundamental Research Funds for the Central Universities (Grant No.2011YB01)the BUPT Excellent Ph.D.Students Foundation (Grant No.CX201217)
文摘We present a protocol for quantum private comparison of equality(QPCE) with the help of a semi-honest third party(TP).Instead of employing the entanglement,we use single photons to achieve the comparison in this protocol.By utilizing collective eavesdropping detection strategy,our protocol has the advantage of higher qubit efficiency and lower cost of implementation.In addition to this protocol,we further introduce three robust versions which can be immune to collective dephasing noise,collective-rotation noise and all types of unitary collective noise,respectively.Finally,we show that our protocols can be secure against the attacks from both the outside eavesdroppers and the inside participants by using the theorems on quantum operation discrimination.
基金supported by the National High Technology Research and Development Program of China (Grant No. 2009AA01Z441)the National Basic Research Program of China (Grant No. 2007CB311100)+3 种基金the National Natural Science Foundation of China (Grant Nos. 60873191,60821001 and 61003290)the Specialized Research Fund for the Doctoral Program of Higher Education (Grant Nos. 20091103120014 and 2009000-5110010)Beijing Natural Science Foundation (Grant Nos. 1093015 and1102004)the ISN Open Foundation
文摘We present a quantum secret sharing protocol against collective-amplitude-damping noise. Each logical qubit is encoded in two qubit noiseless states. So it can function over such a noisy channel. The two agents encode their messages on each logical qubit only by performing a permutation operation on two physical qubits. Although each logical qubit received by each agent only carries a bit of information, the boss Alice can read out her agents' information by discriminating two orthogonal states by performing single-qubit measurements assisted by local operation and classical communication (LOCC).
基金supported by the National Natural Science Foundation of China(Grant Nos.61300181,61272057,61202434,61170270,61100203 and 61121061)Beijing Natural Science Foundation(Grant No.4122054)Beijing Higher Education Young Elite Teacher Project(Grant Nos.YETP0475 and YETP0477)
文摘Quantum pseudo-telepathy(QPT)is a new type of game where the quantum team can win with certainty while the classical one cannot.It means the advantages of quantum participants over classical ones in game.However,there has been no systematic and formal analysis on the QPT game before.Here we present the formal description of the QPT game and the definition of the most simplified QPT.Based on the above definitions,we simplify a famous QPT game,i.e.the Cabllo game.Then,according to some instances,we analyze the minimum best success probability by classical strategies of the two-player QPT,which reflects the advantage of the quantum strategies.Finally,we prove the best success probability by classical strategies for the most simplified QPT is totally related to the number of all possible question combinations.
基金supported by the National Natural Science Foundation of China (61272057)Fundamental Research Funds for the Central Universities (2012RC0612)+2 种基金Specialized Research Fund for the Doctoral Program of Higher Education (20130161120004)Hunan Provincial Natural Science Foundation of China (14JJ7024)Project funded by China Postdoctoral Science Foundation (2014M560123)
文摘An effective data hiding method based on pixel value differencing (PVD) and modulus function (MF) PVD (MF-PVD) was proposed. MF-PVD method was derived by Wang et al in which the MF was employed to adjust the remainder of two pixels for data embedding and extraction. In the proposed method, a new remainder function in a more general form is defined by selecting proper parameters, in which an indeterminate equation is constructed and an optimal solution is applied to revise the pixels. This strategy leads to a significant image distortion reduction compared with the original method. The experiment reveals that, by preserving the original embedding capacity, the method provides better embedding efficiency than both MF-PVD and PVD methods.
基金supported by National Natural Science Foundation of China(60873191,60903152,61003286,60821001)
文摘Algebraic immunity is an important cryptographic property of Boolean functions. The notion of algebraic immunity of Boolean functions has been generalized in several ways to vector-valued functions over arbitrary finite fields. In this paper, the results of Ref. [25] are generalized to arbitrary finite fields. We obtain vector-valued functions over arbitrary finite fields such that their algebraic immunities can reach the upper bounds. Furthermore, all the component functions, together with their some nonzero linear combinations, of vector-valued Boolean functions achieved by this construction have optimal algebraic immunities simultaneously.