期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Cryptanalysis and Improvement of a Quantum Secret Sharing Protocol between Multiparty and Multiparty with Single Photons and Unitary Transformations 被引量:2
1
作者 ZHU Zhen-Chao ZHANG Yu-Qing 《Chinese Physics Letters》 SCIE CAS CSCD 2010年第6期13-15,共3页
在一份最近的报纸[下巴。Phys。Lett 25 (2008 ) 1187 ] ,分享计划在之间的一个量秘密多党、多党被介绍。因为没有介绍任何错误,在艾莉斯的组的最后成员能非法获得很秘密的消息,我们证明协议不是安全的。最后,避免安全缺陷的一个可... 在一份最近的报纸[下巴。Phys。Lett 25 (2008 ) 1187 ] ,分享计划在之间的一个量秘密多党、多党被介绍。因为没有介绍任何错误,在艾莉斯的组的最后成员能非法获得很秘密的消息,我们证明协议不是安全的。最后,避免安全缺陷的一个可能的方法被建议。[从作者抽象] 展开更多
关键词 秘密共享方案 密码分析 协议 量子 酉变换 单光子 安全漏洞 内聚力
下载PDF
Cryptanalysis and improvement of a quantum secret sharing scheme based on χ-type entangled states 被引量:1
2
作者 朱珍超 张玉清 付安民 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第1期1-5,共5页
In the paper [2010 Chin. Phys. B 19 050306], Yang et al. put forward a novel three-party quantum secret sharing protocol of secure direct communication based on x-type entangled states, they claimed that the scheme is... In the paper [2010 Chin. Phys. B 19 050306], Yang et al. put forward a novel three-party quantum secret sharing protocol of secure direct communication based on x-type entangled states, they claimed that the scheme is secure. However, in this paper, we study the security of the protocol and find that it is insecure. Applying intercept and resend attack, the agent Bob can obtain Alice's secret without the help from the other agent Charlie. In the end, we give our effective modification for its improvement. 展开更多
关键词 quantum secret sharing quantum entanglement bell state nonorthogonal base
下载PDF
Secure Multi-keyword Search Supporting Dynamic Update and Ranked Retrieval
3
作者 Jingbo Yan Yuqing Zhang Xuefeng Liu 《China Communications》 SCIE CSCD 2016年第10期209-221,共13页
As cloud computing is becoming prevalent, data owners are motivated to delegate complex data managements to the commercial cloud for economic savings. Sensitive data is usually encrypted before being uploaded to the c... As cloud computing is becoming prevalent, data owners are motivated to delegate complex data managements to the commercial cloud for economic savings. Sensitive data is usually encrypted before being uploaded to the cloud, which unfortunately makes the frequently-used search function a challenging problem. In this paper, we present a new multi-keyword dynamic search scheme with result ranking to make search over encrypted data more secure and practical. In the scheme, we employ a powerful function-hiding inner product encryption to enhance the security by preventing the leakage of search pattern. For the concern of efficiency, we adopt a tree-based index structure to facilitate the searching process and updating operations. A comprehensive security analysis is provided and experiments over the real world data show that our scheme is efficient. 展开更多
关键词 secure search ranked search dynamic update cloud computing
下载PDF
CLORKE-SFS:Certificateless One-Round Key Exchange Protocol with Strong Forward Security in Limited Communication Scenarios
4
作者 Xiaowei Li Dengqi Yang +1 位作者 Benhui Chen Yuqing Zhang 《China Communications》 SCIE CSCD 2021年第7期211-222,共12页
Certificateless one-round key exchange(CL-ORKE)protocols enable each participant to share a common key with only one round of communication which greatly saves communication cost.CLORKE protocols can be applied to sce... Certificateless one-round key exchange(CL-ORKE)protocols enable each participant to share a common key with only one round of communication which greatly saves communication cost.CLORKE protocols can be applied to scenarios with limited communication,such as space communication.Although CL-ORKE protocols have been researched for years,lots of them only consider what secrets can be compromised but ignore the time when the secrets have been corrupted.In CL-ORKE protocols,the reveal of the long-term key attacks can be divided into two different attacks according to the time of the long-term key revealed:the attack to weak Forward Security(wFS)and the attack to strong Forward Security(sFS).Many CLKE protocols did not take into account the sFS property or considered sFS as wFS.In this paper,we first propose a new security model for CL-ORKE protocols which considers the sFS property as well as the Ephemeral Key Reveal attack.Then,we give a CL-ORKE protocol which is called CLORKE-SFS.CLORKE-SFS is provably secure under the proposed model provided the Elliptic Curve Computational Diffie-Hellman(ECCDH)and the Bilinear Computational Diffie-Hellman problem(BCDH)assumption hold.The security model and the protocol may give inspiration for constructing oneround key exchange protocols with perfect forward security in certificateless scenarios. 展开更多
关键词 key exchange protocol strong forward security one-round CERTIFICATELESS
下载PDF
Efficient quantum secret sharing scheme with two-particle entangled states
5
作者 朱珍超 张玉清 付安民 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第4期59-64,共6页
This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 ... This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 3148) and Zhang et al. (2009 Chin. Phys. B 18 2149) respectively. The theoretical efficiency for qubits of the new protocol is improved from 50% to approaching 100%. All the entangled states can be used for generating the private key except those used for the eavesdropping check. The validity of a probable attack called opaque cheat attack to this kind of protocols is considered in the paper for the first time. 展开更多
关键词 quantum secret sharing quantum entanglement Bell state nonorthogonal base
下载PDF
Some classes of complete permutation polynomials over Fq 被引量:1
6
作者 WU GaoFei LI Nian +1 位作者 HELLESETH Tor ZHANG YuQing 《Science China Mathematics》 SCIE CSCD 2015年第10期2081-2094,共14页
By using a powerful criterion for permutation polynomials, we give several classes of complete permutation polynomials over finite fields. First, two classes of complete permutation monomials whose exponents are of Ni... By using a powerful criterion for permutation polynomials, we give several classes of complete permutation polynomials over finite fields. First, two classes of complete permutation monomials whose exponents are of Niho type are presented. Second, for any odd prime p, we give a sufficient and necessary condition for a-1xdto be a complete permutation polynomial over Fp4 k, where d =(p4k-1)/(pk-1)+ 1 and a ∈ F*p4k. Finally, we present a class of complete permutation multinomials, which is a generalization of recent work. 展开更多
关键词 置换多项式 充分必要条件 有限域 日本式 单项式 奇素数
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部