期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Participant attack on the deterministic measurement-device-independent quantum secret sharing protocol 被引量:3
1
作者 Yu-Guang Yang Yue-Chao Wang +4 位作者 Yong-Li Yang Xiu-Bo Chen Dan Li Yi-Hua Zhou Wei-Min Shi 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2021年第6期121-124,共4页
In a recent article[Gao et al.,Sci.China-Phys.Mech.Astron.63,120311(2020)],a two-receiver measurement-deviceindependent quantum secret sharing(MDI-QSS)protocol was presented.It was proven to be secure against eavesdro... In a recent article[Gao et al.,Sci.China-Phys.Mech.Astron.63,120311(2020)],a two-receiver measurement-deviceindependent quantum secret sharing(MDI-QSS)protocol was presented.It was proven to be secure against eavesdropping and generalized to the multireceiver case.However,the participant attack is a fatal threat to QSS protocols.Here,we highlight that a dishonest participant can obtain a sender’s secret message alone without introducing any detectable error,evidencing the vulnerability of the MDI-QSS protocol to the participant attack. 展开更多
关键词 quantum cryptography quantum secret sharing participant attack
原文传递
Quantum Private Comparison via Cavity QED 被引量:2
2
作者 Tian-Yu Ye 《Communications in Theoretical Physics》 SCIE CAS CSCD 2017年第2期147-156,共10页
The first quantum private comparison(QPC) protocol via cavity quantum electrodynamics(QED) is proposed in this paper by making full use of the evolution law of atom via cavity QED, where the third party(TP) is allowed... The first quantum private comparison(QPC) protocol via cavity quantum electrodynamics(QED) is proposed in this paper by making full use of the evolution law of atom via cavity QED, where the third party(TP) is allowed to misbehave on his own but cannot conspire with either of the two users. The proposed protocol adopts two-atom product states rather than entangled states as the initial quantum resource, and only needs single-atom measurements for two users. Both the unitary operations and the quantum entanglement swapping operation are not necessary for the proposed protocol. The proposed protocol can compare the equality of one bit from each user in each round comparison with one two-atom product state. The proposed protocol can resist both the outside attack and the participant attack.Particularly, it can prevent TP from knowing two users' secrets. Furthermore, the qubit efficiency of the proposed protocol is as high as 50%. 展开更多
关键词 quantum private comparison(QPC) third party(TP) cavity quantum electrodynamics(QED) product state participant attack
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部