期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
基于d维多粒子纠缠态的(t,n)门限量子秘密共享
1
作者 宋秀丽 徐建坤 《计算机工程与应用》 CSCD 北大核心 2019年第5期89-95,共7页
为了突破Hilbert空间2维度的局限性,解决秘密重建过程中部分参与者缺席的问题,使用d维多粒子纠缠态,提出了一个(t,n)门限量子秘密共享方案。秘密分发者制备n个d维2粒子纠缠对,将第2个粒子分别分发给n个参与者。当秘密分发者选择自己手中... 为了突破Hilbert空间2维度的局限性,解决秘密重建过程中部分参与者缺席的问题,使用d维多粒子纠缠态,提出了一个(t,n)门限量子秘密共享方案。秘密分发者制备n个d维2粒子纠缠对,将第2个粒子分别分发给n个参与者。当秘密分发者选择自己手中t个粒子进行联合投影测量时,纠缠交换使得参与者手中的对应t个粒子坍塌成一个t粒子纠缠态。这t个参与者通过QFT变换和Pauli运算将份额加入t粒子纠缠态。最终,共享的秘密由这t个参与者一起合作恢复。安全性分析表明,该方案能抵抗截获-测量-重发攻击、纠缠-测量攻击、合谋攻击和伪造攻击。 展开更多
关键词 门限量子秘密共享 d维多粒纠缠态 纠缠交换 联合投影测量
下载PDF
Dynamic(2, 3) Threshold Quantum Secret Sharing of Secure Direct Communication 被引量:1
2
作者 赖红 Orgun A.Mehmet +2 位作者 肖井华 Pieprzyk Josef 薛理银 《Communications in Theoretical Physics》 SCIE CAS CSCD 2015年第4期459-465,共7页
In this paper, we show that a(2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised... In this paper, we show that a(2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised by first placing the shares of smaller secret pieces into the shares of the largest secret piece, converting the shares of the largest secret piece into corresponding quantum state sequences, inserting nonorthogonal state particles into the quantum state sequences with the purpose of detecting eavesdropping, and finally sending the new quantum state sequences to the three participants respectively. Consequently, every particle can on average carry up to 1.5-bit messages due to the use of recurrence. The control codes are randomly prepared using the way to generate fountain codes with pre-shared source codes between Alice and Bob, making three participants can detect eavesdropping by themselves without sending classical messages to Alice. Due to the flexible encoding, our scheme is also dynamic, which means that it allows the participants to join and leave freely. 展开更多
关键词 (2 3) threshold quantum state sharing RECURRENCE distributed fountain codes EFFICIENCY Trojan horse attacks
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部