期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Quantum Key Distribution Network Based on Differential Phase Shift 被引量:5
1
作者 王婉莹 王川 +1 位作者 文凯 龙桂鲁 《Chinese Physics Letters》 SCIE CAS CSCD 2007年第6期1463-1466,共4页
Using a series of quantum correlated photon pairs, we propose a theoretical scheme for any-to-any multi-user quantum key distribution network based on differential phase shift. The differential phase shift and the dif... Using a series of quantum correlated photon pairs, we propose a theoretical scheme for any-to-any multi-user quantum key distribution network based on differential phase shift. The differential phase shift and the different detection time slots ensure the security of our scheme against eavesdropping. We discuss the security under the intercept-resend attack and the source replacement attack. 展开更多
关键词 SECURE DIRECT COMMUNICATION DISTRIBUTION PROTOCOL OPTICAL NETWORKS belltheorem CRYPTOGRAPHY ENTANGLEMENT STATES
下载PDF
Multiparty Quantum Secret Report
2
作者 邓富国 李熙涵 +3 位作者 李春燕 周萍 梁玉洁 周宏余 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第7期1676-1679,共4页
A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her M agents first share a sequence of (M + 1)-particle Greenberger-Horne-Zeilinger (GHZ) states that only Alice k... A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her M agents first share a sequence of (M + 1)-particle Greenberger-Horne-Zeilinger (GHZ) states that only Alice knows which state each (M + 1)-particle quantum system is in. Each agent exploits a controlled-not (CNot) gate to encrypt the travelling particle by using the particle in the GHZ state as the control qubit. The boss Alice decrypts the travelling particle with a CNot gate after performing a aσ∞ operation on her particle in the GHZ state or not. After the GHZ states (the quantum key) are used up, the parties check whether there is a vicious eavesdropper, say Eve, monitoring the quantum line, by picking out some samples from the GHZ states shared and measuring them with two measuring bases. After confirming the security of the quantum key, they use the remaining GHZ states repeatedly for the next round of quantum communication. This scheme has the advantage of high intrinsic efficiency for the qubits and total efficiency. 展开更多
关键词 SECURE DIRECT COMMUNICATION LOCAL UNITARY OPERATIONS KEY DISTRIBUTION belltheorem GHZ STATES ENTANGLEMENT CRYPTOGRAPHY SCHEME PROTOCOL NETWORK
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部