期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
公开的力量
1
作者 东方 《中国档案》 北大核心 2004年第5期1-1,共1页
关键词 攻务信息 信息公开 现行文件利用 档案查阅
下载PDF
Deterministic Quantum Secure Direct Communication with Dense Coding and Continuous Variable Operations
2
作者 HAN Lian-Fang CHEN Yue-Ming YUAN Hao 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第4期648-652,共5页
We propose a deterministic quantum secure direct two check photon sequences are used to check the securities of the communication protocol by using dense coding. The channels between the message sender and the receive... We propose a deterministic quantum secure direct two check photon sequences are used to check the securities of the communication protocol by using dense coding. The channels between the message sender and the receiver. The continuous variable operations instead of the usual discrete unitary operations are performed on the travel photons so that the security of the present protocol can be enhanced. Therefore some specific attacks such as denial-of-service attack, intercept-measure-resend attack and invisible photon attack can be prevented in ideal quantum channel. In addition, the scheme is still secure in noise channel. Furthurmore, this protocol has the advantage of high capacity and can be realized in the experiment. 展开更多
关键词 ping-pong protocol continuous variable operations quantum secure direct communication SECURITY capacity
下载PDF
High-efficiency quantum steganography based on the tensor product of Bell states 被引量:6
3
作者 XU ShuJiang CHEN XiuBo +1 位作者 NIU XinXin YANG YiXian 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2013年第9期1745-1754,共10页
In this paper,we first propose a hidden rule among the secure message,the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first pa... In this paper,we first propose a hidden rule among the secure message,the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first particle of the two initial Bell states,and then present a high-efficiency quantum steganography protocol under the control of the hidden rule.In the proposed quantum steganography scheme,a hidden channel is established to transfer a secret message within any quantum secure direct communication(QSDC) scheme that is based on 2-level quantum states and unitary transformations.The secret message hiding/unhiding process is linked with the QSDC process only by unitary transformations.To accurately describe the capacity of a steganography scheme,a quantitative measure,named embedding efficiency,is introduced in this paper.The performance analysis shows that the proposed steganography scheme achieves a high efficiency as well as a good imperceptibility.Moreover,it is shown that this scheme can resist all serious attacks including the intercept-resend attack,measurement-resend attack,auxiliary particle attack and even the Denial of Service attack.To improve the efficiency of the proposed scheme,the hidden rule is extended based on the tensor product of multiple Bell states. 展开更多
关键词 quantum steganography embedding efficiency quantum secure direct communication tensor product Bell state
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部