您的位置: 专家智库 > >

国家自然科学基金(61272514)

作品数:11 被引量:20H指数:3
发文基金:国家自然科学基金霍英东教育基金国家教育部博士点基金更多>>
相关领域:理学电子电信机械工程自然科学总论更多>>

文献类型

  • 8篇中文期刊文章

领域

  • 7篇理学
  • 3篇电子电信
  • 2篇机械工程
  • 1篇交通运输工程

主题

  • 4篇量子
  • 3篇纠缠
  • 2篇PROTOC...
  • 2篇QUANTU...
  • 2篇BELL态
  • 2篇ENTANG...
  • 2篇GHZ
  • 2篇STEGAN...
  • 1篇信息隐藏
  • 1篇隐形传态
  • 1篇张量积
  • 1篇正交补
  • 1篇直接通信
  • 1篇通信
  • 1篇签名
  • 1篇签名协议
  • 1篇子空间
  • 1篇最大纠缠态
  • 1篇幺正变换
  • 1篇量子安全直接...

传媒

  • 3篇Chines...
  • 3篇Scienc...
  • 2篇Comput...

年份

  • 2篇2019
  • 1篇2015
  • 1篇2014
  • 4篇2013
11 条 记 录,以下是 1-8
排序方式:
A blind quantum signature protocol using the GHZ states被引量:10
2013年
Recently,some blind quantum signature(BQS) protocols have been proposed.But the previous schemes have security and efficiency problems.Based on the entangled Greenberger-Horne-Zeilinger(GHZ) states,a new weak BQS protocol is proposed.Compared with some existing schemes,our protocol has 100% efficiency.Besides,the protocol is simple and easy to implement.The security of the protocol is guaranteed by the correlation of the GHZ particles held by each participant.In our protocol,the signatory is kept blind from the content of the message.According to the security analysis,the signatory cannot disavowal his/her signature while the signature cannot be forged by others.
WANG MingMingCHEN XiuBoYANG YiXian
关键词:签名协议GHZ态安全保证GHZ
Controlled Secure Direct Communication Protocol via the Three-Qubit Partially Entangled Set of States被引量:1
2019年
In this paper,we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme,which was found insecure under two kinds of attacks,fake entangled particles attack and disentanglement attack.Then,by changing the party of the preparation of cluster states and using unitary operations,we present an improved protocol which can avoid these two kinds of attacks.Moreover,the protocol is proposed using the three-qubit partially entangled set of states.It is more efficient by only using three particles rather than four or even more to transmit one bit secret information.Given our using state is much easier to prepare for multiqubit states and our protocol needs less measurement resource,it makes this protocol more convenient from an applied point of view.
Gang XuKe XiaoZongpeng LiXin-Xin NiuMichael Ryan
Typical universal entanglers
2014年
A universal entangler is a very powerful fault-tolerant entangling device for generating quantum entanglements from any joint states. Our paper aims to address the construction of universal entanglers. We prove that universal entanglers may be obtained from random unitary gates according to the Harr measure. The success probability is close to 1 for large system spaces. This result represents the typical density of entanglement subspaces in large state spaces. It also partially solves an open problem of universal bipartite entanglers and is explained by some experiment simulations.
WANG FengLUO MingXingCHEN XiuBoYANG YiXianWANG XiaoJun
关键词:量子纠缠子空间
High-efficiency quantum steganography based on the tensor product of Bell states被引量:6
2013年
In this paper,we first propose a hidden rule among the secure message,the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first particle of the two initial Bell states,and then present a high-efficiency quantum steganography protocol under the control of the hidden rule.In the proposed quantum steganography scheme,a hidden channel is established to transfer a secret message within any quantum secure direct communication(QSDC) scheme that is based on 2-level quantum states and unitary transformations.The secret message hiding/unhiding process is linked with the QSDC process only by unitary transformations.To accurately describe the capacity of a steganography scheme,a quantitative measure,named embedding efficiency,is introduced in this paper.The performance analysis shows that the proposed steganography scheme achieves a high efficiency as well as a good imperceptibility.Moreover,it is shown that this scheme can resist all serious attacks including the intercept-resend attack,measurement-resend attack,auxiliary particle attack and even the Denial of Service attack.To improve the efficiency of the proposed scheme,the hidden rule is extended based on the tensor product of multiple Bell states.
XU ShuJiangCHEN XiuBoNIU XinXinYANG YiXian
关键词:BELL态张量积量子安全直接通信幺正变换拒绝服务攻击
Deterministic assisted clone of an unknown four-particle entangled cluster-type state
2013年
Two deterministic schemes are proposed to realize the assisted clone of an unknown four-particle entangled clustertype state.The schemes include two stages.The first stage requires teleportation via maximal entanglement as the quantum channel.In the second stages of the protocols,two novel sets of mutually orthogonal basis vectors are constructed.With the assistance of the preparer through a four-particle or two-step two-particle projective measurement under these bases,the perfect copy of an original state can be produced.Comparing with the previous protocols which produce the unknown state and its orthogonal complement state at the site of the sender,the proposed schemes generate the unknown state deterministically.
马松雅罗明星孙莹
关键词:最大纠缠态隐形传态量子通道正交补
Steganalysis and improvement of a quantum steganography protocol via a GHZ_4 state
2013年
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information.Recently,El Allati et al.proposed a new quantum steganography using the GHZ4 state.Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered,we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations.To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state,we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states.Due to the symmetry of the GHZ4 state,all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states,so the improved protocol achieves a high efficiency.
徐淑奖陈秀波钮心忻杨义先
A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states被引量:1
2015年
Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication(QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security.
徐淑奖陈秀波王连海钮心忻杨义先
关键词:纠缠交换信息隐藏量子态BELL态
Rational Non-Hierarchical Quantum State Sharing Protocol
2019年
Rational participants want to maximize their benefits.The protocol with rational participants will be more realistic than the protocol with honest,semi-honest and dishonest participants.We research the rational non-hierarchical quantum state sharing in this paper.General steps of some known quantum state sharing protocol are summarized.Based on these steps,a new rational protocol is proposed.It means that lots of common protocols could be modified to rational protocols.Our protocol is widely applicable.Analyses show that the proposed protocol is rational and secure.It is also all-win for agents.Furthermore,number of deceiving agents is considered to redefine the utilities of agents.
Zhao DouGang XuXiubo ChenKaiguo Yuan
共1页<1>
聚类工具0