We suggest a method for transferring an unknown quantum state. In this method the sender Alice first applies a controlled-not operation on the particle in the unknown quantum state and an ancillary particle which she ...We suggest a method for transferring an unknown quantum state. In this method the sender Alice first applies a controlled-not operation on the particle in the unknown quantum state and an ancillary particle which she wants to send to the receiver Bob. Then she sends the ancillary particle to Bob. When Alice is informed by Bob that the ancillary particle is received, she performs a local measurement on her particle and sends Bob the outcome of the local measurement via a classical channel. Depending on the outcome Bob can restore the unknown quantum state, which Alice destroyed, on the ancillary particle successfully. As an application of this method we propose a quantum secure direct communication protocol. By introducing the decoy qubits the security of the scheme is guaranteed.展开更多
Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols. A new approach—tunnel key node identification (TKNI) was proposed. Based on tunnel-key-node identification and prio...Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols. A new approach—tunnel key node identification (TKNI) was proposed. Based on tunnel-key-node identification and priority-based route discovery, TKNI can rapidly rebuild the communications that have been blocked by wormhole attack. Compared to previous approaches, the proposed approach aims at both static and dynamic topology environment, involves addressing visible and invisible wormhole attack modes, requires no extra hardware, has a low overhead, and can be easily applied to MANET.展开更多
Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Chall...Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols.展开更多
基金The project supported by the National Natural Science Foundation of China under Grant No. 10671054 and the Natural Science Foundation of Hebei Province under Grant Nos. A2004000141 and A2005000140
文摘We suggest a method for transferring an unknown quantum state. In this method the sender Alice first applies a controlled-not operation on the particle in the unknown quantum state and an ancillary particle which she wants to send to the receiver Bob. Then she sends the ancillary particle to Bob. When Alice is informed by Bob that the ancillary particle is received, she performs a local measurement on her particle and sends Bob the outcome of the local measurement via a classical channel. Depending on the outcome Bob can restore the unknown quantum state, which Alice destroyed, on the ancillary particle successfully. As an application of this method we propose a quantum secure direct communication protocol. By introducing the decoy qubits the security of the scheme is guaranteed.
文摘Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols. A new approach—tunnel key node identification (TKNI) was proposed. Based on tunnel-key-node identification and priority-based route discovery, TKNI can rapidly rebuild the communications that have been blocked by wormhole attack. Compared to previous approaches, the proposed approach aims at both static and dynamic topology environment, involves addressing visible and invisible wormhole attack modes, requires no extra hardware, has a low overhead, and can be easily applied to MANET.
文摘Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols.