您的位置: 专家智库 > >

国家自然科学基金(60903152)

作品数:14 被引量:33H指数:4
相关作者:温巧燕林崧杜蛟庞善起王守印更多>>
相关机构:北京邮电大学福建师范大学河南师范大学更多>>
发文基金:国家自然科学基金国家教育部博士点基金北京市自然科学基金更多>>
相关领域:理学电子电信自动化与计算机技术机械工程更多>>

文献类型

  • 14篇期刊文章
  • 3篇会议论文

领域

  • 11篇电子电信
  • 9篇理学
  • 3篇自动化与计算...
  • 2篇机械工程

主题

  • 3篇QUANTU...
  • 3篇ENTANG...
  • 3篇CRYPTO...
  • 2篇量子
  • 2篇纠缠
  • 2篇CERTIF...
  • 1篇单光子
  • 1篇单粒子
  • 1篇递归构造
  • 1篇多粒子
  • 1篇多粒子纠缠态
  • 1篇正交
  • 1篇正交表
  • 1篇通信
  • 1篇匿名
  • 1篇子密钥
  • 1篇量子密码
  • 1篇量子密钥
  • 1篇量子密钥分发
  • 1篇量子通信

机构

  • 2篇北京邮电大学
  • 2篇福建师范大学
  • 1篇洛阳师范学院
  • 1篇新乡学院
  • 1篇河南师范大学

作者

  • 2篇温巧燕
  • 2篇林崧
  • 1篇王天银
  • 1篇姚志强
  • 1篇刘晓芬
  • 1篇王守印
  • 1篇庞善起
  • 1篇杜蛟

传媒

  • 5篇Chines...
  • 2篇The Jo...
  • 2篇Scienc...
  • 1篇应用数学学报
  • 1篇莆田学院学报
  • 1篇闽江学院学报
  • 1篇China ...
  • 1篇中国科学:物...

年份

  • 1篇2015
  • 3篇2012
  • 5篇2011
  • 5篇2010
  • 3篇2009
14 条 记 录,以下是 1-10
排序方式:
Controlled quantum teleportation with Bell states被引量:4
2011年
We propose a new scheme for controlled quantum teleportation with Bell states in which classical keys for controllers' portion are used. We also discuss the security of the proposed scheme and show that it can satisfy the requirements for controlled quantum teleportation. The comparison between this scheme and the previous ones shows that it is more economical and efficient.
王天银温巧燕
关键词:CONTROLLEDTELEPORTATION
Entanglement distribution using three-mode separable state with imperfect equipments
2011年
We show a scheme to distribute the entanglement by using three-mode separable Gaussian state prepared with imperfect equipments. The scheme achieves the aim that the entanglement is distributed between two distant parties with only Gaussian operations and linear optics elements. Moreover, we analyse the logarithmic negativity of the entanglement shared between the two parties when the systems are imperfect and arrive at the conclusion that the logarithmic negativity is asymptotically stable with fluctuations within a certain space range.
宋婷婷张劼高飞温巧燕
A Password-Based Secure Communication Scheme in Battlefields for Internet of Things被引量:1
2011年
Mobile Ad hoc NETwork (MANET) is a part of the Internet of Things (IoT). In battlefield communication systems, ground soldiers, tanks, and unmanned aerial vehicles comprise a heterogeneous MANET. In 2006, Byun et al. proposed the first constant-round password-based group key ex- change with different passwords for such net- works. In 2008, Nam et al. discovered the short- comings of the scheme, and modified it. But the works only provide the group key. In this paper, we propose a password-based secure communication scheme for the loT, which could be applied in the battlefield communication systems and support dy- namic group, in which the nodes join or leave. By performing the scheme, the nodes in the heteroge- neous MANET can realize secure broadcast, secure unicast, and secure direct communication across realms. After the analyses, we demonstrate that the scheme is secure and efficient.
张华高飞温巧燕金正平
关键词:PASSWORDBROADCASTUNICAST
Quantum asymmetric cryptography with symmetric keys被引量:6
2009年
Based on quantum encryption,we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system. We show that the quantum-mechanical nature renders it feasible and reasonable to use symmetric keys in such a scheme,which is quite different from that in conventional public-key cryptography. The security of our scheme is analyzed and some features are discussed. Furthermore,the state-estimation attack to a prior QPKC scheme is demonstrated.
GAO FeiWEN QiaoYanQIN SuJuanZHU FuChen
关键词:QUANTUMCRYPTOGRAPHYCRYPTOGRAPHYENTANGLEMENT
匿名接收者的量子通信
2010年
提出了一种新的匿名量子通信协议.在该协议中,除了指数小的概率,接收者的匿名性和传输的量子消息的保密性被完美的保护.而且,该协议利用单光子而不是多粒子纠缠态构造匿名纠缠.因此,与先前的工作相比,该协议节省了量子资源.
王天银温巧燕朱甫臣
关键词:单光子多粒子纠缠态
Quantum communications with an anonymous receiver被引量:5
2010年
A new protocol for the anonymous communication of quantum information is proposed. The anonymity of the receiver and the privacy of the quantum information are perfectly protected except with exponentially small probability in this protocol. Furthermore, this protocol uses single photons to construct anonymous entanglement instead of multipartite entangled states, and therefore it reduces quantum resources compared with the pioneering work.
WANG TianYinWEN QianYanZHU FuChen
General description of discriminating quantum operations
2011年
The discrimination of quantum operations plays a key role in quantum information and computation. Unlike discriminating quantum states, it has some special properties which can be carried out in practice. In this paper, we provide a general description of discriminating quantum operations. Concretely speaking, we describe the distinguisha- bility between quantum operations using a measure called operator fidelity. It is shown that, employing the theory of operator fidelity, we can not only verify some previous results to discriminate unitary operations, but also exhibit a more general discrimination condition. We further apply our results to analysing the security of some quantum cryptographic protocols and discuss the realization of our method using well-developed quantum algorithms.
张可佳朱萍高飞郭奋卓秦素娟温巧燕
Fair quantum blind signatures被引量:3
2010年
We present a new fair blind signature scheme based on the fundamental properties of quantum mechanics. In addition, we analyse the security of this scheme, and show that it is not possible to forge valid blind signatures. Moreover, comparisons between this scheme and public key blind signature schemes are also discussed.
王天银温巧燕
Algebraic immunities of vector-valued functions over finite fields
2015年
Algebraic immunity is an important cryptographic property of Boolean functions. The notion of algebraic immunity of Boolean functions has been generalized in several ways to vector-valued functions over arbitrary finite fields. In this paper, the results of Ref. [25] are generalized to arbitrary finite fields. We obtain vector-valued functions over arbitrary finite fields such that their algebraic immunities can reach the upper bounds. Furthermore, all the component functions, together with their some nonzero linear combinations, of vector-valued Boolean functions achieved by this construction have optimal algebraic immunities simultaneously.
Liu ZhenhuaZhang JieWen Qiaoyan
关键词:CRYPTOGRAPHY
A Constant-Round Perfect Parallel Coin-Tossing Protocol
<正>A coin-tossing protocol lets two parties decide on a string that should be a random(or at least pseudorando...
Xiaolan Zhang~(1
文献传递
共2页<12>
聚类工具0