期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
基于BCH码的无条件安全通信秘密编码 被引量:1
1
作者 吴剑浪 邹光南 +3 位作者 石云 潘绯 吴一帆 文红 《信息安全与通信保密》 2013年第7期58-60,共3页
无条件安全通信系统利用信道的噪声特性,不需要像传统安全通信系统那样,必须有一个绝对安全的信道来进行密钥分发、密钥管理。秘密编码是无条件安全通信系统的关键技术,通过对最优检错码的二进制本原BCH码以及非最优检错码的二进制本原... 无条件安全通信系统利用信道的噪声特性,不需要像传统安全通信系统那样,必须有一个绝对安全的信道来进行密钥分发、密钥管理。秘密编码是无条件安全通信系统的关键技术,通过对最优检错码的二进制本原BCH码以及非最优检错码的二进制本原BCH码构造的秘密编码进行研究,给出秘密编码方法和秘密条件,最后进一步对其性能进行仿真,最终发现纠错编码中的最优检错码将是一类非常好的秘密编码,在无条件安全通信系统有很大的运用价值。 展开更多
关键词 安全通信 窃听信道 BCH码 秘密编码
原文传递
Secret Sharing Schemes Based on the Dual Code of the Code of a Symmetric (v, k, λ)-Design and Minimal Access Sets
2
作者 Selda Calkavur 《Computer Technology and Application》 2015年第2期95-100,共6页
Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct... Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct the secret sharing schemes. Since the code of a symmetric (V, k, λ)-design is a linear code, this study is about the secret sharing schemes based on C of Fp-code C of asymmetric (v, k, λ)-design. 展开更多
关键词 Linear code the code of a symmetric design secret sharing scheme minimal access set.
下载PDF
A New Method to Construct Secret Sharing Schemes Based on Linear Codes
3
作者 Selda Calkavur 《Computer Technology and Application》 2015年第2期89-94,共6页
Secret sharing is an important topic in cryptography and has applications in information security. The coding theory has been an important role in the constructing of secret sharing schemes. It is known that every lin... Secret sharing is an important topic in cryptography and has applications in information security. The coding theory has been an important role in the constructing of secret sharing schemes. It is known that every linear code can be used to construct secret sharing schemes. So, we use the parity-check matrix of a linear code to construct secret sharing schemes based on linear codes. We also describe some techniques to recover the secret and determine the access structure of the new scheme. In this paper, we use the Massey's secret sharing scheme. 展开更多
关键词 Linear code parity-check matrix secret sharing scheme minimal codeword minimal access set.
下载PDF
Quantum Secure Direct Communication with Four-Particle Genuine Entangled State and Dense Coding
4
作者 XIU Xiao-Ming DONG Li GAO Ya-Jun CHI Feng 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第7期60-62,共3页
A quantum secure direct communication scheme using dense coding is proposed.At first,the sender (Alice)prepares four-particle genuine entangled states and shares them with the receiver (Bob) by sending two particles i... A quantum secure direct communication scheme using dense coding is proposed.At first,the sender (Alice)prepares four-particle genuine entangled states and shares them with the receiver (Bob) by sending two particles in eachentangled state to him.Secondly,Alice encodes secret information by performing the unitary transformations on herparticles and transmits them to Bob.Finally,Bob performs the joint measurements on his particles to decode the secretinformation.The two-step security test guarantees the security of communication. 展开更多
关键词 quantum communication quantum secure direct communication entanglement swapping four- particle genuine entangled state
下载PDF
An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States
5
作者 徐淑奖 陈秀波 +2 位作者 王连海 丁青艳 张淑慧 《Communications in Theoretical Physics》 SCIE CAS CSCD 2016年第6期705-710,共6页
In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good sym... In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry,the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line(column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. 展开更多
关键词 quantum communication quantum information hiding χ-type quantum state entanglement swapping
原文传递
A Novel Quantum Covert Channel Protocol Based on Any Quantum Secure Direct Communication Scheme
6
作者 徐淑奖 陈秀波 +1 位作者 钮心忻 杨义先 《Communications in Theoretical Physics》 SCIE CAS CSCD 2013年第5期547-553,共7页
By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which e... By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which employs unitary transformations to encode information. On the basis of the fact that the unitary transformations used in a QSDC protocol are secret and independent, a novel quantum covert channel protocol is proposed to transfer secret messages with unconditional security. The performance, including the imperceptibility, capacity and security of the proposed protocol are analyzed in detail. 展开更多
关键词 quantum information hiding quantum covert channel quantum cryptography quantum communication
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部