期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Fault tolerant deterministic secure quantum communication using logical Bell states against collective noise 被引量:1
1
作者 王朝 刘建伟 +2 位作者 陈秀波 毕亚港 尚涛 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第4期53-62,共10页
This study proposes two novel fault tolerant deterministic secure quantum communication (DSQC) schemes resistant to collective noise using logical Bell states. Either DSQC scheme is constructed based on a new coding... This study proposes two novel fault tolerant deterministic secure quantum communication (DSQC) schemes resistant to collective noise using logical Bell states. Either DSQC scheme is constructed based on a new coding function, which is designed by exploiting the property of the corresponding logical Bell states immune to collective-dephasing noise and collective-rotation noise, respectively. The secret message can be encoded by two simple unitary operations and decoded by merely performing Bell measurements, which can make the proposed scheme more convenient in practical applications. Moreover, the strategy of one-step quanta transmission, together with the technique of decoy logical qubits checking not only reduces the influence of other noise existing in a quantum channel, but also guarantees the security of the communication between two legitimate users. The final analysis shows that the proposed schemes are feasible and robust against various well-known attacks over the collective noise channel. 展开更多
关键词 collective noise deterministic secure quantum communication logical Bell states
下载PDF
On Algebraic Immunity of Trace Inverse Functions on Finite Fields of Characteristic Two 被引量:1
2
作者 FENG Xiutao GONG Guang 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2016年第1期272-288,共17页
The trace inverse functions Tr(λx^(-1)) over the finite field F_(2~n) are a class of very important Boolean functions and are used in many stream ciphers such as SFINKS,RAKAPOSHI,the simple counter stream cipher(SCSC... The trace inverse functions Tr(λx^(-1)) over the finite field F_(2~n) are a class of very important Boolean functions and are used in many stream ciphers such as SFINKS,RAKAPOSHI,the simple counter stream cipher(SCSC) presented by Si W and Ding C(2012),etc.In order to evaluate the security of those ciphers in resistance to(fast) algebraic attacks,the authors need to characterize algebraic properties of Tr(λx^(-1)).However,currently only some bounds on algebraic immunity of Tr(λx^(-1)) are given in the public literature,for example,the NGG upper bound and the Bayev lower bound,etc.This paper gives the exact value of the algebraic immunity of Tr(λx^(-1)) over F_(2~n),that is,AI(Tr(λx^(-1))) =[2n^(1/2)]- 2,where n ≥ 2,A ∈ F_(2~n) and λ≠ 0,which shows that Dalai's conjecture on the algebraic immunity of Tr(λx^(-1)) is correct.What is more,the authors demonstrate some weak properties of Tr(λx^(-1)) against fast algebraic attacks. 展开更多
关键词 Algebraic immunity boolean functions fast algebraic attacks trace inverse functions
原文传递
A blind quantum signature protocol using the GHZ states 被引量:10
3
作者 WANG MingMing CHEN XiuBo YANG YiXian 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2013年第9期1636-1641,共6页
Recently,some blind quantum signature(BQS) protocols have been proposed.But the previous schemes have security and efficiency problems.Based on the entangled Greenberger-Horne-Zeilinger(GHZ) states,a new weak BQS prot... Recently,some blind quantum signature(BQS) protocols have been proposed.But the previous schemes have security and efficiency problems.Based on the entangled Greenberger-Horne-Zeilinger(GHZ) states,a new weak BQS protocol is proposed.Compared with some existing schemes,our protocol has 100% efficiency.Besides,the protocol is simple and easy to implement.The security of the protocol is guaranteed by the correlation of the GHZ particles held by each participant.In our protocol,the signatory is kept blind from the content of the message.According to the security analysis,the signatory cannot disavowal his/her signature while the signature cannot be forged by others. 展开更多
关键词 blind quantum signature GHZ state EFFICIENCY SECURITY
原文传递
Self-Dual Hadamard Bent Sequences
4
作者 SHI Minjia LI Yaya +3 位作者 CHENG Wei CRNKOVIC Dean KROTOV Denis SOLéPatrick 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2023年第2期894-908,共15页
A new notion of bent sequence related to Hadamard matrices was introduced recently,motivated by a security application(Solé,et al.,2021).The authors study the self-dual class in length at most 196.The authors use... A new notion of bent sequence related to Hadamard matrices was introduced recently,motivated by a security application(Solé,et al.,2021).The authors study the self-dual class in length at most 196.The authors use three competing methods of generation:Exhaustion,Linear Algebra and Gr?bner bases.Regular Hadamard matrices and Bush-type Hadamard matrices provide many examples.The authors conjecture that if v is an even perfect square,a self-dual bent sequence of length v always exists.The authors introduce the strong automorphism group of Hadamard matrices,which acts on their associated self-dual bent sequences.The authors give an efficient algorithm to compute that group. 展开更多
关键词 Bent sequences bush-type Hadamard matrices Hadanard matrices PUF functions regular Hadamard matrices
原文传递
A Novel Quantum Covert Channel Protocol Based on Any Quantum Secure Direct Communication Scheme
5
作者 徐淑奖 陈秀波 +1 位作者 钮心忻 杨义先 《Communications in Theoretical Physics》 SCIE CAS CSCD 2013年第5期547-553,共7页
By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which e... By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which employs unitary transformations to encode information. On the basis of the fact that the unitary transformations used in a QSDC protocol are secret and independent, a novel quantum covert channel protocol is proposed to transfer secret messages with unconditional security. The performance, including the imperceptibility, capacity and security of the proposed protocol are analyzed in detail. 展开更多
关键词 quantum information hiding quantum covert channel quantum cryptography quantum communication
原文传递
Universal quantum computation with qudits
6
作者 LUO MingXing WANG XiaoJun 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2014年第9期1712-1717,共6页
Quantum circuit model has been widely explored for various quantum applications such as Shors algorithm and Grovers searching algorithm.Most of previous algorithms are based on the qubit systems.Herein a proposal for ... Quantum circuit model has been widely explored for various quantum applications such as Shors algorithm and Grovers searching algorithm.Most of previous algorithms are based on the qubit systems.Herein a proposal for a universal circuit is given based on the qudit system,which is larger and can store more information.In order to prove its universality for quantum applications,an explicit set of one-qudit and two-qudit gates is provided for the universal qudit computation.The one-qudit gates are general rotation for each two-dimensional subspace while the two-qudit gates are their controlled extensions.In comparison to previous quantum qudit logical gates,each primitive qudit gate is only dependent on two free parameters and may be easily implemented.In experimental implementation,multilevel ions with the linear ion trap model are used to build the qudit systems and use the coupling of neighbored levels for qudit gates.The controlled qudit gates may be realized with the interactions of internal and external coordinates of the ion. 展开更多
关键词 universal qudit gate qudit circuit linear ion
原文传递
A Spatial Domain Quantum Watermarking Scheme
7
作者 魏战红 陈秀波 +2 位作者 徐淑奖 钮心忻 杨义先 《Communications in Theoretical Physics》 SCIE CAS CSCD 2016年第7期66-76,共11页
This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme,a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented sche... This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme,a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity. 展开更多
关键词 quantum cryptography quantum images quantum watermark spatial domain quantum watermark
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部