期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Quantum Key Distribution against Trojan Horse Attacks 被引量:2
1
作者 蔡庆宇 吕桦 《Chinese Physics Letters》 SCIE CAS CSCD 2007年第5期1154-1157,共4页
Realistic experimental apparatus of quantum cryptography are imperfect, which may be utilized by a potential eavesdropper to eavesdrop on the communication. We show that quantum communication may be improved with quan... Realistic experimental apparatus of quantum cryptography are imperfect, which may be utilized by a potential eavesdropper to eavesdrop on the communication. We show that quantum communication may be improved with quantum teleportation and entanglement swapping, which is robustly secure against the most general Trojan horse attacks. Our scheme is not an improvement of the communication apparatus, but the improvement of quantum communication protocol itself. We show that our modified schemes may be implemented with current technology. 展开更多
关键词 unconditional security COMMUNICATION CRYPTOGRAPHY ENTANGLEMENT SCHEME
下载PDF
The Multireceiver Commitment Schemes
2
作者 WANG Shuhong QI Zhifeng 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期759-764,共6页
Existing commitment schemes were addressed under the classic two-party scenario, However, popularity of the secure multi-party computation in today's lush network communication is motivating us to adopt more sophisti... Existing commitment schemes were addressed under the classic two-party scenario, However, popularity of the secure multi-party computation in today's lush network communication is motivating us to adopt more sophisticate commitment schemes. In this paper, we study for the first time multireceiver commitment in unconditionally secure setting, i.e., one committer promises a group of verifiers a common secret value (in computational setting it is trivial). We extend the Rivest model for this purpose and present a provably secure generic construction using multireceiver authentication codes (without secrecy) as building blocks. Two concrete schemes are proposed as its immediate implementations, which are almost as efficient as an optimal MRA-code. We believe using other primitives to construct variants of this concept will open doors for more interesting research. 展开更多
关键词 commitment scheme multi-party computation unconditional security authentication code verifiable secret sharing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部