期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
基于量子单向函数的身份认证和密钥分配协议 被引量:1
1
作者 拱长青 唐虎 张大伟 《计算机工程》 CAS CSCD 2012年第6期161-162,166,共3页
研究量子单向函数和信息分割原理,提出一种身份认证和密钥分配协议。使用可信服务器为示证者提供随机身份信息,以完成认证过程的确认,在密钥分配的同时进行认证,利用量子单向函数提高认证的安全性。实验结果表明,该协议涉及的量子通信... 研究量子单向函数和信息分割原理,提出一种身份认证和密钥分配协议。使用可信服务器为示证者提供随机身份信息,以完成认证过程的确认,在密钥分配的同时进行认证,利用量子单向函数提高认证的安全性。实验结果表明,该协议涉及的量子通信技术易于实现,能提高密钥的分配效率。 展开更多
关键词 量子密码学 量子身份认证 密钥分配 量子单向函数 信息分割 偏振态
下载PDF
基于量子单向函数的量子门限签名方案 被引量:3
2
作者 邵博闻 欧海文 《微计算机信息》 北大核心 2007年第18期60-61,42,共3页
本文首次研究了量子签名中的门限签名问题,参考了LüXin和Feng Deng-guo的基于量子单向函数的签名协议,然后结合经典密码学中的Shamir门限方案提出了一个(t,w)门限量子签名的方案。方案是安全的(t,w)量子门限签名方案,安全性依赖于... 本文首次研究了量子签名中的门限签名问题,参考了LüXin和Feng Deng-guo的基于量子单向函数的签名协议,然后结合经典密码学中的Shamir门限方案提出了一个(t,w)门限量子签名的方案。方案是安全的(t,w)量子门限签名方案,安全性依赖于量子单向函数的存在,量子纠错码保证了量子态的真实性,量子一次一密保证了量子信息在信道的安全性。方案是对已知量子态的签名和验证。 展开更多
关键词 量子签名 量子密码 量子单向函数 (t w)门限方案
下载PDF
量子数字签名研究进展 被引量:1
3
作者 王剑 张权 唐朝京 《量子光学学报》 CSCD 北大核心 2006年第3期129-134,共6页
量子数字签名是量子理论与经典数字签名的结合,其目的是利用量子效应达到无条件安全的信息交互。介绍了目前提出的几种量子数字签名协议,详细分析了这几种协议的优缺点和效率,提出了量子数字签名协议设计的具体要求,并展望了此领域今后... 量子数字签名是量子理论与经典数字签名的结合,其目的是利用量子效应达到无条件安全的信息交互。介绍了目前提出的几种量子数字签名协议,详细分析了这几种协议的优缺点和效率,提出了量子数字签名协议设计的具体要求,并展望了此领域今后的发展方向。 展开更多
关键词 量子单向函数 量子一次一密 量子数字签名
下载PDF
量子密码学的理论基础
4
作者 杨理 《科学》 北大核心 2010年第6期13-16,共4页
世界上有两门学问公认比较难:一门是密码学,一门是量子物理。难的原因完全不同:密码学难是因为世界上有人太聪明.难在巧夺天工的构造和叹为观止的分析:量子物理难是因为大自然深奥难测,其微观规律远离人们的直觉,难在真正的理解... 世界上有两门学问公认比较难:一门是密码学,一门是量子物理。难的原因完全不同:密码学难是因为世界上有人太聪明.难在巧夺天工的构造和叹为观止的分析:量子物理难是因为大自然深奥难测,其微观规律远离人们的直觉,难在真正的理解和把握。玻尔(N.Bohr)曾经说过:一条深刻真理的反面可能是另一条深刻的真理。这句话集中体现了量子物理的辩证本质。 展开更多
关键词 量子密码学 量子信息 量子信息密码学 量子单向函数 密码学 形式知识理论
下载PDF
基于一次一密的量子身份识别方案 被引量:4
5
作者 潘江游 杨理 《中国科学院研究生院学报》 CAS CSCD 北大核心 2012年第2期277-281,共5页
给出一个基于Holevo定理的量子单向函数,并根据它构造了一个基于对称密码体制的量子身份识别方案.该方案通过一次性的随机数隐藏了双方共享的密钥,且验证算法不依赖于所使用的随机数,从而保护了密钥,使该方案的安全性不局限于敌手的计... 给出一个基于Holevo定理的量子单向函数,并根据它构造了一个基于对称密码体制的量子身份识别方案.该方案通过一次性的随机数隐藏了双方共享的密钥,且验证算法不依赖于所使用的随机数,从而保护了密钥,使该方案的安全性不局限于敌手的计算能力. 展开更多
关键词 量子身份识别 量子单向函数 一次一密
下载PDF
Key Exchange Protocol Based on Tensor Decomposition Problem 被引量:1
6
作者 MAO Shaowu ZHANG Huanguo +3 位作者 WU Wanqing ZHANG Pei SONG Jun LIU Jinhui 《China Communications》 SCIE CSCD 2016年第3期174-183,共10页
The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing.... The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing. In this paper, we firstly proposed a new variant of tensor decomposition problem, then two one-way functions are proposed based on the hard problem. Secondly we propose a key exchange protocol based on the one-way functions, then the security analysis, efficiency, recommended parameters and etc. are also given. The analyses show that our scheme has the following characteristics: easy to implement in software and hardware, security can be reduced to hard problems, and it has the potential to resist quantum computing.Besides the new key exchange can be as an alternative comparing with other classical key protocols. 展开更多
关键词 key exchange resistant quantum hard problem tensor decomposition
下载PDF
Asymmetrical Quantum Encryption Protocol Based on Quantum Search Algorithm 被引量:2
7
作者 LUO Wenjun LIU Guanli 《China Communications》 SCIE CSCD 2014年第9期104-111,共8页
Quantum cryptography and quantum search algorithm are considered as two important research topics in quantum information science.An asymmetrical quantum encryption protocol based on the properties of quantum one-way f... Quantum cryptography and quantum search algorithm are considered as two important research topics in quantum information science.An asymmetrical quantum encryption protocol based on the properties of quantum one-way function and quantum search algorithm is proposed.Depending on the no-cloning theorem and trapdoor one-way functions of the publickey,the eavesdropper cannot extract any private-information from the public-keys and the ciphertext.Introducing key-generation randomized logarithm to improve security of our proposed protocol,i.e.,one privatekey corresponds to an exponential number of public-keys.Using unitary operations and the single photon measurement,secret messages can be directly sent from the sender to the receiver.The security of the proposed protocol is proved that it is informationtheoretically secure.Furthermore,compared the symmetrical Quantum key distribution,the proposed protocol is not only efficient to reduce additional communication,but also easier to carry out in practice,because no entangled photons and complex operations are required. 展开更多
关键词 quantum cryptography asymmetrical encryption information-theoreticalsecurity quantum search algorithms
下载PDF
Quantum proxy signature scheme with public verifiability 被引量:6
8
作者 ZHOU JingXian ZHOU YaJian +1 位作者 NIU XinXin YANG YiXian 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2011年第10期1828-1832,共5页
In recent years, with the development of quantum cryptography, quantum signature has also made great achievement. However,the effectiveness of all the quantum signature schemes reported in the literature can only be v... In recent years, with the development of quantum cryptography, quantum signature has also made great achievement. However,the effectiveness of all the quantum signature schemes reported in the literature can only be verified by a designated person.Therefore, its wide applications are limited. For solving this problem, a new quantum proxy signature scheme using EPR quantumentanglement state and unitary transformation to generate proxy signature is presented. Proxy signer announces his public key whenhe generates the final signature. According to the property of unitary transformation and quantum one-way function, everyone canverify whether the signature is effective or not by the public key. So the quantum proxy signature scheme in our paper can be publicverified. The quantum key distribution and one-time pad encryption algorithm guarantee the unconditional security of this scheme.Analysis results show that this new scheme satisfies strong non-counterfeit and strong non-disavowal. 展开更多
关键词 quantum cryptography proxy signature quantum one-way function public verifiably
原文传递
Multi-Party Quantum Private Comparison Protocol Based on Entanglement Swapping of Bell Entangled States
9
作者 叶天语 《Communications in Theoretical Physics》 SCIE CAS CSCD 2016年第9期280-290,共11页
Recently, Liu et al. proposed a two-party quantum private comparison(QPC) protocol using entanglement swapping of Bell entangled state(Commun. Theor. Phys. 57(2012) 583). Subsequently, Liu et al. pointed out that in L... Recently, Liu et al. proposed a two-party quantum private comparison(QPC) protocol using entanglement swapping of Bell entangled state(Commun. Theor. Phys. 57(2012) 583). Subsequently, Liu et al. pointed out that in Liu et al.'s protocol, the TP can extract the two users' secret inputs without being detected by launching the Bell-basis measurement attack, and suggested the corresponding improvement to mend this loophole(Commun. Theor. Phys. 62(2014) 210). In this paper, we first point out the information leakage problem toward TP existing in both of the above two protocols, and then suggest the corresponding improvement by using the one-way hash function to encrypt the two users' secret inputs. We further put forward the three-party QPC protocol also based on entanglement swapping of Bell entangled state, and then validate its output correctness and its security in detail. Finally, we generalize the three-party QPC protocol into the multi-party case, which can accomplish arbitrary pair's comparison of equality among K users within one execution. 展开更多
关键词 multi-party quantum private comparison Bell entangled state entanglement swapping information leakage
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部