期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Twice-Hadamard-CNOT attack on Li et al.'s fault-tolerant quantum private comparison and the improved scheme 被引量:2
1
作者 季赛 王芳 +1 位作者 刘文杰 袁晓敏 《Frontiers of physics》 SCIE CSCD 2015年第2期73-78,共6页
Recently, Li et al. presented a two-party quantum private comparison scheme using Greenberger-- Horne-Zeitinger (GHZ) states and error-correcting code (ECC) lint. J. Theor. Phys. 52, 2818 (2013)], claiming it is... Recently, Li et al. presented a two-party quantum private comparison scheme using Greenberger-- Horne-Zeitinger (GHZ) states and error-correcting code (ECC) lint. J. Theor. Phys. 52, 2818 (2013)], claiming it is fault-tolerant and could be performed in a non-ideal scenario. However, there ex- ists a fatal loophole in their private comparison scheme under a special attack, namely the twice- Hadamard-CNOT attack. Specifically, a malicious party may intercept the other party's particles and execute Hadamard operations on the intercepted particles as well as on his or her own particles. Then, the malicious party could sequentially perform a controlled-NOT (CNOT) operation between intercepted particles and the auxiliary particles, as well as between his or her own particles and the auxiliary particles prepared in advance. By measuring the auxiliary particles, the secret input will be revealed to the malicious party without being detected. For resisting this special attack, a feasible improved scheme is proposed by introducing a permutation operator before the third party (TP) sends the particle sequences to each participant. 展开更多
关键词 quantum private comparison GHZ state twice-Hadamard-CNOT attack improvedscheme
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部