期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
抗泄漏密码学中泄漏模型的研究 被引量:2
1
作者 滕美林 《信息技术》 2014年第11期31-33,38,共4页
边信道攻击利用边信道来危害传统密码学方案的安全性,抗泄漏密码学的研究则可以抵抗这种攻击。安全的抗泄漏密码学方案的设计必须在一个合适的泄漏模型中。文中介绍了目前存在的几种主要的泄漏模型,包括计算泄漏、相对泄漏模型、有界恢... 边信道攻击利用边信道来危害传统密码学方案的安全性,抗泄漏密码学的研究则可以抵抗这种攻击。安全的抗泄漏密码学方案的设计必须在一个合适的泄漏模型中。文中介绍了目前存在的几种主要的泄漏模型,包括计算泄漏、相对泄漏模型、有界恢复模型、持续泄漏模型、事后泄漏模型等,并论述了各个模型下的一些主要的研究成果和研究进展。 展开更多
关键词 边信道攻击 抗泄漏密码学 泄漏模型 密码学方案
下载PDF
Quantum proxy signature scheme with public verifiability 被引量:6
2
作者 ZHOU JingXian ZHOU YaJian +1 位作者 NIU XinXin YANG YiXian 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2011年第10期1828-1832,共5页
In recent years, with the development of quantum cryptography, quantum signature has also made great achievement. However,the effectiveness of all the quantum signature schemes reported in the literature can only be v... In recent years, with the development of quantum cryptography, quantum signature has also made great achievement. However,the effectiveness of all the quantum signature schemes reported in the literature can only be verified by a designated person.Therefore, its wide applications are limited. For solving this problem, a new quantum proxy signature scheme using EPR quantumentanglement state and unitary transformation to generate proxy signature is presented. Proxy signer announces his public key whenhe generates the final signature. According to the property of unitary transformation and quantum one-way function, everyone canverify whether the signature is effective or not by the public key. So the quantum proxy signature scheme in our paper can be publicverified. The quantum key distribution and one-time pad encryption algorithm guarantee the unconditional security of this scheme.Analysis results show that this new scheme satisfies strong non-counterfeit and strong non-disavowal. 展开更多
关键词 quantum cryptography proxy signature quantum one-way function public verifiably
原文传递
Experimental cryptographic verification for near-term quantum cloud computing
3
作者 Xi Chen Bin Cheng +4 位作者 Zhaokai Li Xinfang Nie Nengkun Yu Man-Hong Yung Xinhua Peng 《Science Bulletin》 SCIE EI CSCD 2021年第1期23-28,M0003,共7页
An important task for quantum cloud computing is to make sure that there is a real quantum computer running,instead of classical simulation.Here we explore the applicability of a cryptographic verification scheme for ... An important task for quantum cloud computing is to make sure that there is a real quantum computer running,instead of classical simulation.Here we explore the applicability of a cryptographic verification scheme for verifying quantum cloud computing.We provided a theoretical extension and implemented the scheme on a 5-qubit NMR quantum processor in the laboratory and a 5-qubit and 16-qubit processors of the IBM quantum cloud.We found that the experimental results of the NMR processor can be verified by the scheme with about 1.4%error,after noise compensation by standard techniques.However,the fidelity of the IBM quantum cloud is currently too low to pass the test(about 42%error).This verification scheme shall become practical when servers claim to offer quantum-computing resources that can achieve quantum supremacy. 展开更多
关键词 Quantum computation NMR quantum computing VERIFICATION Quantum cloud computing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部