期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
加快量子信息安全托管中心建设,推动能源革命向纵深发展
1
作者 曾建光 谯连 +1 位作者 古沛 黄海 《中国发展》 2024年第4期42-47,共6页
传统互联网技术是当前数字经济发展的基础,但其核心技术大多被他国掌握,因此我国的经济发展极大地受制于他国。与此同时,传统维护信息安全的加密算法面临的安全风险日益加剧,网络犯罪带来的损失巨大。为此如何打破现有被动格局成为一个... 传统互联网技术是当前数字经济发展的基础,但其核心技术大多被他国掌握,因此我国的经济发展极大地受制于他国。与此同时,传统维护信息安全的加密算法面临的安全风险日益加剧,网络犯罪带来的损失巨大。为此如何打破现有被动格局成为一个重要的议题。量子通信技术的出现,提供了一个良好的契机。加快量子信息安全托管中心建设是一个重要突破口,不仅能够增强数字化治理、保障安全,而且助力培育新兴业态,促进经济高效发展。该文从量子通信的原理和应用出发,分析了当下发展中存在的问题,并从基础建设与研究、平台建设、业务发展、政策与人才建设和构建新发展格局五个层面提供了相关的建议。 展开更多
关键词 互联网技术 安全风险 量子信息安全托管中心
下载PDF
量子信息安全技术 被引量:2
2
作者 赵生妹 姚佳 +1 位作者 李飞 郑宝玉 《南京邮电学院学报(自然科学版)》 2005年第3期1-7,共7页
自从BB84量子密钥分配协议提出以来,量子加密技术得到了迅速发展,以加密技术为基础的量子信息安全技术也得到了快速发展。为了更全面地、系统地了解量子信息安全技术当前的发展状况和以后发展的趋势,文中通过资料查新,以量子加密技术为... 自从BB84量子密钥分配协议提出以来,量子加密技术得到了迅速发展,以加密技术为基础的量子信息安全技术也得到了快速发展。为了更全面地、系统地了解量子信息安全技术当前的发展状况和以后发展的趋势,文中通过资料查新,以量子加密技术为基础,阐述了量子密钥分配协议及其实现、量子身份认证和量子数字签名、量子比特承诺等多种基于量子特性的信息安全技术的新发展和新动向。 展开更多
关键词 信息安全 量子 量子加密 量子信息安全技术
下载PDF
量子信息讲座续讲 第二讲 量子信息安全系统 被引量:5
3
作者 曾贵华 《物理》 CAS 2000年第10期623-626,共4页
详细介绍了量子密码的相关内容 ,包括量子密码理论基础、量子保密系统、量子认证系统、量子密码与其他学科的关系以及量子密码的应用与展望 。
关键词 密码学 量子密码 量子信息安全系统
原文传递
基于单光子态自避错传输的量子安全直接通信协议 被引量:5
4
作者 孙越 《量子光学学报》 CSCD 北大核心 2013年第2期122-128,共7页
量子安全直接通信(Quantum secure direct communication,QSDC)是一种预先不需要建立共享秘钥而直接传输秘密信息的协议。针对信道中联合噪声的存在,提出一种基于单光子态自避错传输的量子安全直接通信协议。研究结果表明,该方案有效地... 量子安全直接通信(Quantum secure direct communication,QSDC)是一种预先不需要建立共享秘钥而直接传输秘密信息的协议。针对信道中联合噪声的存在,提出一种基于单光子态自避错传输的量子安全直接通信协议。研究结果表明,该方案有效地避免了联合噪声对传输信息的影响,使接收方得到原未知量子态的成功率可趋近于100%,大大提高了量子态传输的保真度。该方案实验操作简单,有很高的学术研究和应用价值。 展开更多
关键词 量子信息安全 量子安全直接通信 联合噪声 单光子态自避错传输
原文传递
Quantum Secure Direct Communication Using W State 被引量:5
5
作者 DONG Li XIU Xiao-Ming GAO Ya-Jun CHI Feng 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第6期1495-1498,共4页
A theoretical scheme of quantum secure direct communication using teleportation is proposed. In the scheme, the sender needs to prepare a class of three-particle W states to use as quantum channel. The two communicato... A theoretical scheme of quantum secure direct communication using teleportation is proposed. In the scheme, the sender needs to prepare a class of three-particle W states to use as quantum channel. The two communicators may communicate after they test the security of the quantum channel. The security of the protocol is ensured by quantum entanglement and quantum no-cloning theorem. The receiver can obtain the secret message determinately if the quantum channel is secure. 展开更多
关键词 quantum information quantum secret direct communication W state
下载PDF
Quantum Secure Direct Communication Using Entangled Photon Pairs and Local Measurement 被引量:2
6
作者 YI Xiao-Jie NIE Yi-You +3 位作者 ZHOU Nan-Run HUANG Yi-Bing HONG Zhi-Hui LI Song-Song 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第7期81-84,共4页
We present a scheme for quantum secure direct communication,in which the message is encoded bylocal unitary operations,transmitted through entangled photons,and deduced from both the sender and receiver's localmea... We present a scheme for quantum secure direct communication,in which the message is encoded bylocal unitary operations,transmitted through entangled photons,and deduced from both the sender and receiver's localmeasurement results.In such a scheme,only one pair of entangled photons is consumed,and there is no need to transmitthe sender's qubit carrying the secret message in a public channel,in order to transmit two-bit classical information. 展开更多
关键词 quantum secure direct communication quantum cryptography information security
下载PDF
A Theoretical Scheme for Multiparty Multi-particle State Sharing
7
作者 XIU Xiao-Ming DONG Li GAO Ya-Jun CHI Feng 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第5期1203-1206,共4页
A theoretical scheme for multiparty multi-particle state sharing is proposed. After she introduces auxiliary particles and Einstein-Podolsky-Rosen (EPIC) pairs, the sender (Alice) performs Hadamard (14) gate ope... A theoretical scheme for multiparty multi-particle state sharing is proposed. After she introduces auxiliary particles and Einstein-Podolsky-Rosen (EPIC) pairs, the sender (Alice) performs Hadamard (14) gate operations and Controlled-NOT (CNOT) gate operations on them. Subsequently, the sender leaves one particle sequence and distributes the rest particles to the other participants. And then, the sender makes Bell-state measurements on her particles and publishes the measurement outcomes via the classical channel to realize the quantum state sharing among the others. Only the simple operations are used to realize quantum state sharing. The sender may increase or decrease the number of the participants by changing the number of the auxiliary particles. 展开更多
关键词 quantum information quantum secret sharing quantum state sharing EPR state
下载PDF
A Protocol for Bidirectional Quantum Secure Communication Based on Genuine Four-Particle Entangled States
8
作者 高干 王丽萍 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第9期447-451,共5页
By swapping the entanglement of genuine four-particle entangled states,we propose a bidirectional quantumsecure communication protocol.The biggest merit of this protocol is that the information leakage does not exist.... By swapping the entanglement of genuine four-particle entangled states,we propose a bidirectional quantumsecure communication protocol.The biggest merit of this protocol is that the information leakage does not exist.Inaddition,the ideas of the 'two-step' transmission and the block transmission are employed in this protocol.In order toanalyze the security of the second sequence transmission,decoy states are used. 展开更多
关键词 Jbidirectional quantum secure communication x-type state information leakage
下载PDF
A Scheme to Share Information via Employing Discrete Algorithm to Quantum States
9
作者 康国栋 方卯发 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第2期239-243,共5页
We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps... We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps integers to quantum states via photon rotations. Based on this algorithm, we find that the protocol is secure under various classes of attacks. Specially, owe to the algorithm, the security of the classical privacy contained in the quantum public-key and the corresponding ciphertext is guaranteed. And the protocol is robust against the impersonation attack and the active wiretapping attack by designing particular checking processing, thus the protocol is valid. 展开更多
关键词 discrete algorithm under mod public-key cryptography SECURITY
下载PDF
A novel and efficient multiparty quantum secret sharing scheme using entangled states 被引量:4
10
作者 MASSOUD Hadian Dehkordi ELHAM Fattahi 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2012年第10期1828-1831,共4页
We proposed a novel and efficient multiparty quantum secret sharing scheme using entangled state which in that the number of parties can be arbitrary large.The state which we used,has special properties that make our ... We proposed a novel and efficient multiparty quantum secret sharing scheme using entangled state which in that the number of parties can be arbitrary large.The state which we used,has special properties that make our scheme simple and safe.The operations which are needed to recover secret message,are only exclusive-or addition and complement operation.Moreover it is shown that this scheme is secure against eavesdropping.Also this scheme provides the best quantum bit efficiency compared with some famous quantum secret sharing schemes. 展开更多
关键词 quantum secret sharing entangled state MULTIPARTY quantum cryptography
原文传递
Quantum Private Comparison Protocol Based on Bell Entangled States 被引量:3
11
作者 刘文 王永滨 崔巍 《Communications in Theoretical Physics》 SCIE CAS CSCD 2012年第4期583-588,共6页
In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The c... In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The correctness and security of our protocol are discussed.One party cannot learn the other's private information and the third party also cannot learn any information about the private information. 展开更多
关键词 quantum private comparison protocol Bell entangled state PRIVATE
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部