It is established that a single quantum cryptography protocol usually cooperates with other cryptographicsystems,such as an authentication system,in the real world.However,few protocols have been proposed on how tocom...It is established that a single quantum cryptography protocol usually cooperates with other cryptographicsystems,such as an authentication system,in the real world.However,few protocols have been proposed on how tocombine two or more quantum protocols.To fill this gap,we propose a composed quantum protocol,containing bothquantum identity authentication and quantum key distribution,using squeezed states.Hence,not only the identity canbe verified,but also a new private key can be generated by our new protocol.We also analyze the security under anoptimal attack,and the efficiency,which is defined by the threshold of the tolerant error rate,using Gaussian errorfunction.展开更多
A theoretical scheme of quantum secure communication using a class of three-particle W states is proposed. In the scheme,two communicators may communicate after they test the security of the quantum channel.The receiv...A theoretical scheme of quantum secure communication using a class of three-particle W states is proposed. In the scheme,two communicators may communicate after they test the security of the quantum channel.The receiver can obtain the secret message determinately if the quantum channel is safe.The present scheme can be realized without using teleportation.展开更多
With recent advances of quantum computanon, new threats key cryptosystems. In order to build more secure bit commitment schemes, this paper gave a survey of the new coming braid-based cryptography and then brought for...With recent advances of quantum computanon, new threats key cryptosystems. In order to build more secure bit commitment schemes, this paper gave a survey of the new coming braid-based cryptography and then brought forward the first braid-based bit commitment protocol. The security proof manifests that the proposed protocol is computationally binding and information-theoretically hiding. Furthermore, the proposed protocol is also invulnerable to currently known quantum attacks.展开更多
Quantum cryptography and quantum search algorithm are considered as two important research topics in quantum information science.An asymmetrical quantum encryption protocol based on the properties of quantum one-way f...Quantum cryptography and quantum search algorithm are considered as two important research topics in quantum information science.An asymmetrical quantum encryption protocol based on the properties of quantum one-way function and quantum search algorithm is proposed.Depending on the no-cloning theorem and trapdoor one-way functions of the publickey,the eavesdropper cannot extract any private-information from the public-keys and the ciphertext.Introducing key-generation randomized logarithm to improve security of our proposed protocol,i.e.,one privatekey corresponds to an exponential number of public-keys.Using unitary operations and the single photon measurement,secret messages can be directly sent from the sender to the receiver.The security of the proposed protocol is proved that it is informationtheoretically secure.Furthermore,compared the symmetrical Quantum key distribution,the proposed protocol is not only efficient to reduce additional communication,but also easier to carry out in practice,because no entangled photons and complex operations are required.展开更多
We propose two schemes for quantum dense coding without Bell states measurement. One is deterministic, the other is probabilistic. In the deterministic scheme, the initial entangled state will be not destructed. In th...We propose two schemes for quantum dense coding without Bell states measurement. One is deterministic, the other is probabilistic. In the deterministic scheme, the initial entangled state will be not destructed. In the proba-bilistic scheme, the initial unknown nonmaximal entangled state will be transformed into a maximal entangled one. Our schemes require two auxiliary particles and perform single-qubit measurements on them. Thus our schemes are simple and economic.展开更多
We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryp...We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryption protocols. Here we consider the way it increases the unicity distance of both classical and quantum private-key encryption schemes. The security of quantum probabilistic privatekey encryption schemes against two kinds of attacks is analyzed. By using the no-signalling postulate, we show that the scheme can resist attack to the key. The scheme's security against plaintext attack is also investigated by considering the information-theoretic indistinguishability of the encryption scheme. Finally, we make a conjecture regarding Breidbart's attack.展开更多
We present a scheme for quantum secure direct communication,in which the message is encoded bylocal unitary operations,transmitted through entangled photons,and deduced from both the sender and receiver's localmea...We present a scheme for quantum secure direct communication,in which the message is encoded bylocal unitary operations,transmitted through entangled photons,and deduced from both the sender and receiver's localmeasurement results.In such a scheme,only one pair of entangled photons is consumed,and there is no need to transmitthe sender's qubit carrying the secret message in a public channel,in order to transmit two-bit classical information.展开更多
A quantum encryption protocol based on Gaussian-modulated continuous variable EPR correlations is proposed. The security is guaranteed by continuous variable EPR entanglement correlations produced by nondegenerate opt...A quantum encryption protocol based on Gaussian-modulated continuous variable EPR correlations is proposed. The security is guaranteed by continuous variable EPR entanglement correlations produced by nondegenerate optical parametric amplifier (NOPA). For general beam splitter eavesdropping strategy, the mutual information I(α, ε) between Alice and Eve is caJculated by employing Shannon information theory. Finally the security analysis is presented.展开更多
Quantum dense coding (QDC) is a process originally proposed to send two classical bits information from a sender to a receiver by sending only one qubit. Our scheme of QDC is proposed following some ideas on secret ...Quantum dense coding (QDC) is a process originally proposed to send two classical bits information from a sender to a receiver by sending only one qubit. Our scheme of QDC is proposed following some ideas on secret sharing with entanglement in cavity QED. Based on the theory of secret sharing the QDC process can be more secure.展开更多
A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the f...A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the four one-qubit unitary operations implemented by Alice and the Bell states measurement implemented by Bob in stead of direct measuring the previously shared Einstein-Podolsky-Rosen pairs by both of the distant parties, Alice and Bob.Considering the practical application we can get the conclusion that our protocol has some advantages. It not only simplifies the measurement which may induce potential errors, but also improves the effectively transmitted rate of the generated qubits by the raw key. Here we also discuss eavesdropping attacks against the scheme and the channel loss.展开更多
基金Supported by the National Natural Science Foundation of China under Grant No. 60872052
文摘It is established that a single quantum cryptography protocol usually cooperates with other cryptographicsystems,such as an authentication system,in the real world.However,few protocols have been proposed on how tocombine two or more quantum protocols.To fill this gap,we propose a composed quantum protocol,containing bothquantum identity authentication and quantum key distribution,using squeezed states.Hence,not only the identity canbe verified,but also a new private key can be generated by our new protocol.We also analyze the security under anoptimal attack,and the efficiency,which is defined by the threshold of the tolerant error rate,using Gaussian errorfunction.
基金supported by National Natural Science Foundation of China under Grant Nos.10647101 and 10704011
文摘A theoretical scheme of quantum secure communication using a class of three-particle W states is proposed. In the scheme,two communicators may communicate after they test the security of the quantum channel.The receiver can obtain the secret message determinately if the quantum channel is safe.The present scheme can be realized without using teleportation.
文摘With recent advances of quantum computanon, new threats key cryptosystems. In order to build more secure bit commitment schemes, this paper gave a survey of the new coming braid-based cryptography and then brought forward the first braid-based bit commitment protocol. The security proof manifests that the proposed protocol is computationally binding and information-theoretically hiding. Furthermore, the proposed protocol is also invulnerable to currently known quantum attacks.
基金This work was supported in part by the program for Innovation Team Building at Institutions of Higher Education in Chongqing under Grant No.KJTD201310,the Scientific and Technological Research Program of Chongqing Municipal Education Commission of China under Grant KJ120513,Natural Science Foundation Project of CQ CSTC of P.R.China under Grant No.cstc2011jjA40031
文摘Quantum cryptography and quantum search algorithm are considered as two important research topics in quantum information science.An asymmetrical quantum encryption protocol based on the properties of quantum one-way function and quantum search algorithm is proposed.Depending on the no-cloning theorem and trapdoor one-way functions of the publickey,the eavesdropper cannot extract any private-information from the public-keys and the ciphertext.Introducing key-generation randomized logarithm to improve security of our proposed protocol,i.e.,one privatekey corresponds to an exponential number of public-keys.Using unitary operations and the single photon measurement,secret messages can be directly sent from the sender to the receiver.The security of the proposed protocol is proved that it is informationtheoretically secure.Furthermore,compared the symmetrical Quantum key distribution,the proposed protocol is not only efficient to reduce additional communication,but also easier to carry out in practice,because no entangled photons and complex operations are required.
基金Supported by the Key Program of the Education Department of Anhui Province under Grant No.KJ2009A048Zthe Program of the Education Department of Anhui Province under Grant No.2006KJ057B+1 种基金Anhui Provincial Natural Science Foundation under Grant No.03042401the Talent Foundation of Anhui University
文摘We propose two schemes for quantum dense coding without Bell states measurement. One is deterministic, the other is probabilistic. In the deterministic scheme, the initial entangled state will be not destructed. In the proba-bilistic scheme, the initial unknown nonmaximal entangled state will be transformed into a maximal entangled one. Our schemes require two auxiliary particles and perform single-qubit measurements on them. Thus our schemes are simple and economic.
基金supported by the National Natural Science Foundation of China under Grant No. 61173157Strategy Pilot Project of Chinese Academy of Sciences under Grant No. XD06010702IIE's Cryptography Research Project
文摘We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryption protocols. Here we consider the way it increases the unicity distance of both classical and quantum private-key encryption schemes. The security of quantum probabilistic privatekey encryption schemes against two kinds of attacks is analyzed. By using the no-signalling postulate, we show that the scheme can resist attack to the key. The scheme's security against plaintext attack is also investigated by considering the information-theoretic indistinguishability of the encryption scheme. Finally, we make a conjecture regarding Breidbart's attack.
基金National Natural Science Foundation of China under Grant Nos.10647133 and 10404010the Natural Science Foundation of Jiangxi Province of China under Grant No.0512007the Research Foundation of the Education Department of Jiangxi Province under Grant Nos.[2005]79 and [2007]22
文摘We present a scheme for quantum secure direct communication,in which the message is encoded bylocal unitary operations,transmitted through entangled photons,and deduced from both the sender and receiver's localmeasurement results.In such a scheme,only one pair of entangled photons is consumed,and there is no need to transmitthe sender's qubit carrying the secret message in a public channel,in order to transmit two-bit classical information.
基金The project supported by National Natural Science Foundation of China under Grant No. 60472018
文摘A quantum encryption protocol based on Gaussian-modulated continuous variable EPR correlations is proposed. The security is guaranteed by continuous variable EPR entanglement correlations produced by nondegenerate optical parametric amplifier (NOPA). For general beam splitter eavesdropping strategy, the mutual information I(α, ε) between Alice and Eve is caJculated by employing Shannon information theory. Finally the security analysis is presented.
基金National Natural Science Foundation of China under Grant Nos.60678022 and 10674001the Key Program of the Education Department of Anhui Province under Grant Nos.2006KJ070A and 2006KJ057B+1 种基金the Talent Foundation of Anhui UniversityAnhui Key Laboratory of Information Materials and Devices of Anhui University
文摘Quantum dense coding (QDC) is a process originally proposed to send two classical bits information from a sender to a receiver by sending only one qubit. Our scheme of QDC is proposed following some ideas on secret sharing with entanglement in cavity QED. Based on the theory of secret sharing the QDC process can be more secure.
文摘A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the four one-qubit unitary operations implemented by Alice and the Bell states measurement implemented by Bob in stead of direct measuring the previously shared Einstein-Podolsky-Rosen pairs by both of the distant parties, Alice and Bob.Considering the practical application we can get the conclusion that our protocol has some advantages. It not only simplifies the measurement which may induce potential errors, but also improves the effectively transmitted rate of the generated qubits by the raw key. Here we also discuss eavesdropping attacks against the scheme and the channel loss.