期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Deterministic Quantum Secure Direct Communication with Dense Coding and Continuous Variable Operations
1
作者 HAN Lian-Fang CHEN Yue-Ming YUAN Hao 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第4期648-652,共5页
We propose a deterministic quantum secure direct two check photon sequences are used to check the securities of the communication protocol by using dense coding. The channels between the message sender and the receive... We propose a deterministic quantum secure direct two check photon sequences are used to check the securities of the communication protocol by using dense coding. The channels between the message sender and the receiver. The continuous variable operations instead of the usual discrete unitary operations are performed on the travel photons so that the security of the present protocol can be enhanced. Therefore some specific attacks such as denial-of-service attack, intercept-measure-resend attack and invisible photon attack can be prevented in ideal quantum channel. In addition, the scheme is still secure in noise channel. Furthurmore, this protocol has the advantage of high capacity and can be realized in the experiment. 展开更多
关键词 ping-pong protocol continuous variable operations quantum secure direct communication SECURITY capacity
下载PDF
如何配置局域网中的通讯协议
2
作者 马净 《国外电子测量技术》 2005年第5期32-36,共5页
本文基于局域网环境,以WindowsNT为主,同时兼顾NetWare、Windows95/98等操作系统,介绍和分析了常用通信协议的特点、性能和必要的配置方法,供组网者和网络管理人员参考。
关键词 局域网 通讯协议 WINDOWS95/98 NETWARE 操作系统 通信协议 配置方法 管理人员
下载PDF
Multiparty Quantum Secret Report
3
作者 邓富国 李熙涵 +3 位作者 李春燕 周萍 梁玉洁 周宏余 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第7期1676-1679,共4页
A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her M agents first share a sequence of (M + 1)-particle Greenberger-Horne-Zeilinger (GHZ) states that only Alice k... A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her M agents first share a sequence of (M + 1)-particle Greenberger-Horne-Zeilinger (GHZ) states that only Alice knows which state each (M + 1)-particle quantum system is in. Each agent exploits a controlled-not (CNot) gate to encrypt the travelling particle by using the particle in the GHZ state as the control qubit. The boss Alice decrypts the travelling particle with a CNot gate after performing a aσ∞ operation on her particle in the GHZ state or not. After the GHZ states (the quantum key) are used up, the parties check whether there is a vicious eavesdropper, say Eve, monitoring the quantum line, by picking out some samples from the GHZ states shared and measuring them with two measuring bases. After confirming the security of the quantum key, they use the remaining GHZ states repeatedly for the next round of quantum communication. This scheme has the advantage of high intrinsic efficiency for the qubits and total efficiency. 展开更多
关键词 SECURE DIRECT communication LOCAL UNITARY operationS KEY DISTRIBUTION BELLTHEOREM GHZ STATES ENTANGLEMENT CRYPTOGRAPHY SCHEME protocol NETWORK
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部