量子安全直接通信(Quantum secure direct communication,QSDC)是一种预先不需要建立共享秘钥而直接传输秘密信息的协议。针对信道中联合噪声的存在,提出一种基于单光子态自避错传输的量子安全直接通信协议。研究结果表明,该方案有效地...量子安全直接通信(Quantum secure direct communication,QSDC)是一种预先不需要建立共享秘钥而直接传输秘密信息的协议。针对信道中联合噪声的存在,提出一种基于单光子态自避错传输的量子安全直接通信协议。研究结果表明,该方案有效地避免了联合噪声对传输信息的影响,使接收方得到原未知量子态的成功率可趋近于100%,大大提高了量子态传输的保真度。该方案实验操作简单,有很高的学术研究和应用价值。展开更多
A theoretical scheme of quantum secure direct communication using teleportation is proposed. In the scheme, the sender needs to prepare a class of three-particle W states to use as quantum channel. The two communicato...A theoretical scheme of quantum secure direct communication using teleportation is proposed. In the scheme, the sender needs to prepare a class of three-particle W states to use as quantum channel. The two communicators may communicate after they test the security of the quantum channel. The security of the protocol is ensured by quantum entanglement and quantum no-cloning theorem. The receiver can obtain the secret message determinately if the quantum channel is secure.展开更多
We present a scheme for quantum secure direct communication,in which the message is encoded bylocal unitary operations,transmitted through entangled photons,and deduced from both the sender and receiver's localmea...We present a scheme for quantum secure direct communication,in which the message is encoded bylocal unitary operations,transmitted through entangled photons,and deduced from both the sender and receiver's localmeasurement results.In such a scheme,only one pair of entangled photons is consumed,and there is no need to transmitthe sender's qubit carrying the secret message in a public channel,in order to transmit two-bit classical information.展开更多
A theoretical scheme for multiparty multi-particle state sharing is proposed. After she introduces auxiliary particles and Einstein-Podolsky-Rosen (EPIC) pairs, the sender (Alice) performs Hadamard (14) gate ope...A theoretical scheme for multiparty multi-particle state sharing is proposed. After she introduces auxiliary particles and Einstein-Podolsky-Rosen (EPIC) pairs, the sender (Alice) performs Hadamard (14) gate operations and Controlled-NOT (CNOT) gate operations on them. Subsequently, the sender leaves one particle sequence and distributes the rest particles to the other participants. And then, the sender makes Bell-state measurements on her particles and publishes the measurement outcomes via the classical channel to realize the quantum state sharing among the others. Only the simple operations are used to realize quantum state sharing. The sender may increase or decrease the number of the participants by changing the number of the auxiliary particles.展开更多
By swapping the entanglement of genuine four-particle entangled states,we propose a bidirectional quantumsecure communication protocol.The biggest merit of this protocol is that the information leakage does not exist....By swapping the entanglement of genuine four-particle entangled states,we propose a bidirectional quantumsecure communication protocol.The biggest merit of this protocol is that the information leakage does not exist.Inaddition,the ideas of the 'two-step' transmission and the block transmission are employed in this protocol.In order toanalyze the security of the second sequence transmission,decoy states are used.展开更多
We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps...We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps integers to quantum states via photon rotations. Based on this algorithm, we find that the protocol is secure under various classes of attacks. Specially, owe to the algorithm, the security of the classical privacy contained in the quantum public-key and the corresponding ciphertext is guaranteed. And the protocol is robust against the impersonation attack and the active wiretapping attack by designing particular checking processing, thus the protocol is valid.展开更多
We proposed a novel and efficient multiparty quantum secret sharing scheme using entangled state which in that the number of parties can be arbitrary large.The state which we used,has special properties that make our ...We proposed a novel and efficient multiparty quantum secret sharing scheme using entangled state which in that the number of parties can be arbitrary large.The state which we used,has special properties that make our scheme simple and safe.The operations which are needed to recover secret message,are only exclusive-or addition and complement operation.Moreover it is shown that this scheme is secure against eavesdropping.Also this scheme provides the best quantum bit efficiency compared with some famous quantum secret sharing schemes.展开更多
In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The c...In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The correctness and security of our protocol are discussed.One party cannot learn the other's private information and the third party also cannot learn any information about the private information.展开更多
文摘量子安全直接通信(Quantum secure direct communication,QSDC)是一种预先不需要建立共享秘钥而直接传输秘密信息的协议。针对信道中联合噪声的存在,提出一种基于单光子态自避错传输的量子安全直接通信协议。研究结果表明,该方案有效地避免了联合噪声对传输信息的影响,使接收方得到原未知量子态的成功率可趋近于100%,大大提高了量子态传输的保真度。该方案实验操作简单,有很高的学术研究和应用价值。
基金National Natural Science Foundation of China under Grant Nos.10647101 and 10704011
文摘A theoretical scheme of quantum secure direct communication using teleportation is proposed. In the scheme, the sender needs to prepare a class of three-particle W states to use as quantum channel. The two communicators may communicate after they test the security of the quantum channel. The security of the protocol is ensured by quantum entanglement and quantum no-cloning theorem. The receiver can obtain the secret message determinately if the quantum channel is secure.
基金National Natural Science Foundation of China under Grant Nos.10647133 and 10404010the Natural Science Foundation of Jiangxi Province of China under Grant No.0512007the Research Foundation of the Education Department of Jiangxi Province under Grant Nos.[2005]79 and [2007]22
文摘We present a scheme for quantum secure direct communication,in which the message is encoded bylocal unitary operations,transmitted through entangled photons,and deduced from both the sender and receiver's localmeasurement results.In such a scheme,only one pair of entangled photons is consumed,and there is no need to transmitthe sender's qubit carrying the secret message in a public channel,in order to transmit two-bit classical information.
基金The project supported by National Natural Science Foundation of China under Grant Nos.10647101 and 10704011
文摘A theoretical scheme for multiparty multi-particle state sharing is proposed. After she introduces auxiliary particles and Einstein-Podolsky-Rosen (EPIC) pairs, the sender (Alice) performs Hadamard (14) gate operations and Controlled-NOT (CNOT) gate operations on them. Subsequently, the sender leaves one particle sequence and distributes the rest particles to the other participants. And then, the sender makes Bell-state measurements on her particles and publishes the measurement outcomes via the classical channel to realize the quantum state sharing among the others. Only the simple operations are used to realize quantum state sharing. The sender may increase or decrease the number of the participants by changing the number of the auxiliary particles.
基金Supported by the Natural Science Foundation of Anhui Province under Grant No.KJ2010B236
文摘By swapping the entanglement of genuine four-particle entangled states,we propose a bidirectional quantumsecure communication protocol.The biggest merit of this protocol is that the information leakage does not exist.Inaddition,the ideas of the 'two-step' transmission and the block transmission are employed in this protocol.In order toanalyze the security of the second sequence transmission,decoy states are used.
基金Supported by National Natural Science Foundation of China under Grant No.10374025the Education Ministry of Hunan Province under Grant No.06A038the Natural Science Foundation of Hunan Province under Grant No.07JJ3013
文摘We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps integers to quantum states via photon rotations. Based on this algorithm, we find that the protocol is secure under various classes of attacks. Specially, owe to the algorithm, the security of the classical privacy contained in the quantum public-key and the corresponding ciphertext is guaranteed. And the protocol is robust against the impersonation attack and the active wiretapping attack by designing particular checking processing, thus the protocol is valid.
文摘We proposed a novel and efficient multiparty quantum secret sharing scheme using entangled state which in that the number of parties can be arbitrary large.The state which we used,has special properties that make our scheme simple and safe.The operations which are needed to recover secret message,are only exclusive-or addition and complement operation.Moreover it is shown that this scheme is secure against eavesdropping.Also this scheme provides the best quantum bit efficiency compared with some famous quantum secret sharing schemes.
基金Supported by the High Technology Research and Development Program of China (863 Program,2011AA01A107)Beijing Municipal Special Fund for Cultural and Creative Industries(2009)the Beijing Municipal Natural Science Foundation (4112052)
文摘In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The correctness and security of our protocol are discussed.One party cannot learn the other's private information and the third party also cannot learn any information about the private information.