期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Improved quantum "Ping-pong" protocol based on GHZ state and classical XOR operation 被引量:13
1
作者 LI Jian JIN HaiFei JING Bo 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2011年第9期1612-1618,共7页
In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostrrm and Felbinger [Bostrom K, et al. Phys Rev Lett, 200... In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostrrm and Felbinger [Bostrom K, et al. Phys Rev Lett, 2002, 89: 187902]. But the protocol was proved very vulnerable, and can be attacked by an eavesdropper. An improved "Ping-pong" protocol is presented to overcome the problem. The GHZ state particles are used to detect eavesdroppers, and the classical XOR operation which serves as a one-time-pad is used to ensure the security of the protocol. During the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information which an eavesdropper can obtain and the interference introduced. If the eavesdropper gets the full information, the detection rate of the original "Ping-pong" protocol is 50%; the detection rate of the second protocol which used two particles of EPR pair as detection particles is also 50%; and the detection rate of the presented protocol is 75%. In the end, the security of the pro-posed protocol is discussed. The analysis results show that the improved "Ping-pong" protocol in this paper is more secure than the other two. 展开更多
关键词 "Ping-pong" protocol xor operation GHZ state eavesdropping detection protocol security
原文传递
A quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation 被引量:5
2
作者 李剑 宋丹劼 +1 位作者 郭晓静 景博 《Chinese Physics C》 SCIE CAS CSCD 2012年第1期31-36,共6页
In order to transmit secure messages,a quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation is presented.The five-particle cluster state is used to detect eav... In order to transmit secure messages,a quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation is presented.The five-particle cluster state is used to detect eavesdroppers,and the classical XOR operation serving as a one-time-pad is used to ensure the security of the protocol.In the security analysis,the entropy theory method is introduced,and three detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference introduced.If the eavesdroppers intend to obtain all the information,the detection rate of the original ping-pong protocol is 50%;the second protocol,using two particles of the Einstein-Podolsky-Rosen pair as detection particles,is also 50%;while the presented protocol is 89%.Finally,the security of the proposed protocol is discussed,and the analysis results indicate that the protocol in this paper is more secure than the other two. 展开更多
关键词 QSDC xor operation five-particle cluster state eavesdropping detection protocol security
原文传递
Double quantum images encryption scheme based on chaotic system
3
作者 蒋社想 李杨 +1 位作者 石锦 张茹 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期305-320,共16页
This paper explores a double quantum images representation(DNEQR)model that allows for simultaneous storage of two digital images in a quantum superposition state.Additionally,a new type of two-dimensional hyperchaoti... This paper explores a double quantum images representation(DNEQR)model that allows for simultaneous storage of two digital images in a quantum superposition state.Additionally,a new type of two-dimensional hyperchaotic system based on sine and logistic maps is investigated,offering a wider parameter space and better chaotic behavior compared to the sine and logistic maps.Based on the DNEQR model and the hyperchaotic system,a double quantum images encryption algorithm is proposed.Firstly,two classical plaintext images are transformed into quantum states using the DNEQR model.Then,the proposed hyperchaotic system is employed to iteratively generate pseudo-random sequences.These chaotic sequences are utilized to perform pixel value and position operations on the quantum image,resulting in changes to both pixel values and positions.Finally,the ciphertext image can be obtained by qubit-level diffusion using two XOR operations between the position-permutated image and the pseudo-random sequences.The corresponding quantum circuits are also given.Experimental results demonstrate that the proposed scheme ensures the security of the images during transmission,improves the encryption efficiency,and enhances anti-interference and anti-attack capabilities. 展开更多
关键词 double quantum images encryption chaotic system pixel scrambling xor operation
下载PDF
Image encryption algorithm based on multiple chaotic systems and improved Joseph block scrambling
4
作者 Dingkang Mou Yumin Dong 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第10期248-257,共10页
With the rapid development of digital information technology,images are increasingly used in various fields.To ensure the security of image data,prevent unauthorized tampering and leakage,maintain personal privacy,and... With the rapid development of digital information technology,images are increasingly used in various fields.To ensure the security of image data,prevent unauthorized tampering and leakage,maintain personal privacy,and protect intellectual property rights,this study proposes an innovative color image encryption algorithm.Initially,the Mersenne Twister algorithm is utilized to generate high-quality pseudo-random numbers,establishing a robust basis for subsequent operations.Subsequently,two distinct chaotic systems,the autonomous non-Hamiltonian chaotic system and the tentlogistic-cosine chaotic mapping,are employed to produce chaotic random sequences.These chaotic sequences are used to control the encoding and decoding process of the DNA,effectively scrambling the image pixels.Furthermore,the complexity of the encryption process is enhanced through improved Joseph block scrambling.Thorough experimental verification,research,and analysis,the average value of the information entropy test data reaches as high as 7.999.Additionally,the average value of the number of pixels change rate(NPCR)test data is 99.6101%,which closely approaches the ideal value of 99.6094%.This algorithm not only guarantees image quality but also substantially raises the difficulty of decryption. 展开更多
关键词 mersenne twister algorithm DNA coding confusion pixel xor operation improved Joseph block scrambling
下载PDF
A Multi-Stream Scrambling and DNA Encoding Method Based Image Encryption
5
作者 Nashat Salih Abdulkarim Alsandi Dilovan Asaad Zebari +4 位作者 Adel Al-Zebari Falah Y.H.Ahmed Mazin Abed Mohammed Marwan Albahar Abdulaziz Ali Albahr 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1321-1347,共27页
Information security has emerged as a key problem in encryption because of the rapid evolution of the internet and networks.Thus,the progress of image encryption techniques is becoming an increasingly serious issue an... Information security has emerged as a key problem in encryption because of the rapid evolution of the internet and networks.Thus,the progress of image encryption techniques is becoming an increasingly serious issue and considerable problem.Small space of the key,encryption-based low confidentiality,low key sensitivity,and easily exploitable existing image encryption techniques integrating chaotic system and DNA computing are purposing the main problems to propose a new encryption technique in this study.In our proposed scheme,a three-dimensional Chen’s map and a one-dimensional Logistic map are employed to construct a double-layer image encryption scheme.In the confusion stage,different scrambling operations related to the original plain image pixels are designed using Chen’s map.A stream pixel scrambling operation related to the plain image is constructed.Then,a block scrambling-based image encryption-related stream pixel scrambled image is designed.In the diffusion stage,two rounds of pixel diffusion are generated related to the confusing image for intra-image diffusion.Chen’s map,logistic map,and DNA computing are employed to construct diffusion operations.A reverse complementary rule is applied to obtain a new form of DNA.A Chen’s map is used to produce a pseudorandom DNA sequence,and then another DNA form is constructed from a reverse pseudorandom DNA sequence.Finally,the XOR operation is performed multiple times to obtain the encrypted image.According to the simulation of experiments and security analysis,this approach extends the key space,has great sensitivity,and is able to withstand various typical attacks.An adequate encryption effect is achieved by the proposed algorithm,which can simultaneously decrease the correlation between adjacent pixels by making it near zero,also the information entropy is increased.The number of pixels changing rate(NPCR)and the unified average change intensity(UACI)both are very near to optimal values. 展开更多
关键词 Grayscale image encryption stream scrambling-confusion DNA encoding xor operation chaotic systems
下载PDF
Controlled Deterministic Secure Quantum Communication Protocol Based on Three-Particle GHZ States in X-Basis 被引量:1
6
作者 昌燕 张仕斌 +1 位作者 闫丽丽 韩桂华 《Communications in Theoretical Physics》 SCIE CAS CSCD 2015年第3期285-290,共6页
A controlled deterministic secure quantum communication(CDSQC) protocol is proposed based on threeparticle GHZ state in X-basis.Only X-basis and Z_1Z_2X_3-basis(composed of Z-basis and X-basis) measurement are require... A controlled deterministic secure quantum communication(CDSQC) protocol is proposed based on threeparticle GHZ state in X-basis.Only X-basis and Z_1Z_2X_3-basis(composed of Z-basis and X-basis) measurement are required,which makes the scheme more convenient than others in practical applications.By distributing a random key between both sides of the communication and performing classical XOR operation,we realize a one-time-pad scheme,therefore our protocol achieves unconditional secure.Because only user with legitimate identity string can decrypt the secret,our protocol can resist man-in-the middle attack.The three-particle GHZ state in X-basis is used as decoy photons to detect eavesdropping.The detection rate reaches 75% per qubit. 展开更多
关键词 deterministic secure quantum communication eavesdropping detection classical xor operation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部