您的位置: 专家智库 > >

国家自然科学基金(61100205)

作品数:8 被引量:34H指数:3
相关作者:彭勇李剑郭晓静单振芳李敬有更多>>
相关机构:北京邮电大学中国信息安全测评中心齐齐哈尔大学更多>>
发文基金:国家自然科学基金更多>>
相关领域:理学电子电信自动化与计算机技术机械工程更多>>

文献类型

  • 7篇期刊文章
  • 1篇会议论文

领域

  • 5篇理学
  • 3篇电子电信
  • 3篇自动化与计算...
  • 1篇机械工程
  • 1篇交通运输工程

主题

  • 2篇通信
  • 2篇窃听
  • 2篇PARTIC...
  • 2篇QUANTU...
  • 2篇QUANTU...
  • 2篇CLUSTE...
  • 2篇EAVESD...
  • 1篇一次一密
  • 1篇拥堵
  • 1篇远程
  • 1篇远程通信
  • 1篇智能交通
  • 1篇三粒子W态
  • 1篇身份认证
  • 1篇随机密钥
  • 1篇通信方案
  • 1篇团簇
  • 1篇网络
  • 1篇物联网
  • 1篇联网

机构

  • 2篇北京邮电大学
  • 1篇石家庄邮电职...
  • 1篇齐齐哈尔大学
  • 1篇北京市交通委...
  • 1篇中国信息安全...
  • 1篇无锡北邮感知...

作者

  • 1篇郭晓静
  • 1篇李剑
  • 1篇彭勇
  • 1篇李敬有
  • 1篇单振芳

传媒

  • 2篇Scienc...
  • 2篇Chines...
  • 1篇计算机应用与...
  • 1篇信息网络安全
  • 1篇Scienc...
  • 1篇第七届中国智...

年份

  • 2篇2014
  • 1篇2013
  • 4篇2012
  • 1篇2011
8 条 记 录,以下是 1-8
排序方式:
A quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation被引量:5
2012年
In order to transmit secure messages,a quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation is presented.The five-particle cluster state is used to detect eavesdroppers,and the classical XOR operation serving as a one-time-pad is used to ensure the security of the protocol.In the security analysis,the entropy theory method is introduced,and three detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference introduced.If the eavesdroppers intend to obtain all the information,the detection rate of the original ping-pong protocol is 50%;the second protocol,using two particles of the Einstein-Podolsky-Rosen pair as detection particles,is also 50%;while the presented protocol is 89%.Finally,the security of the proposed protocol is discussed,and the analysis results indicate that the protocol in this paper is more secure than the other two.
李剑宋丹劼郭晓静景博
可控量子远程通信方案的研究
2013年
针对一般可控量子远程通信方案能防止外部窃听,但无法有效防止冒充攻击这一安全缺陷,提出一种具备身份认证功能的可控量子远程通信方案。可信任第三方Charlie利用纠缠交换对接收者Bob进行身份认证,在确定Bob的合法身份并将消息反馈给发送者Alice后,Alice再传送量子信息。该方案利用身份认证能有效防止冒充攻击,并能够增强量子信息传送的正确性和安全性。
李敬有单振芳
关键词:身份认证远程通信纠缠交换
Improved eavesdropping detection strategy based on four-particle cluster state in quantum direct communication protocol被引量:5
2012年
In order to improve the eavesdropping detection efficiency in a two-step quantum direct communication protocol, an improved eavesdropping detection strategy using the four-particle cluster state is proposed, in which the four-particle cluster state is used to detect eavesdroppers. During the security analysis, the method of the entropy theory is introduced, and two detection strategies are compared quantitatively using the constraint between the information that the eavesdropper can obtain and the interference that has been introduced. If the eavesdroppers intend to obtain all information, the eavesdropping detection rate of the original two-step quantum direct communication protocol using EPR pair block as detection particles will be 50%; while the proposed strategy's detection rate will be 75%. In the end, the security of the proposed protocol is discussed. The analysis results show that the eavesdropping detection strategy presented is more secure.
LI JianJIN HaiFeiJING Bo
关键词:窃听团簇
Robust EPR-pairs-based quantum secure communication with authentication resisting collective noise被引量:3
2014年
This work presents two robust quantum secure communication schemes with authentication based on Einstein-Podolsky-Rosen(EPR) pairs, which can withstand collective noises. Two users previously share an identity string representing their identities. The identity string is encoded as decoherence-free states(termed logical qubits), respectively, over the two collective noisy channels, which are used as decoy photons. By using the decoy photons, both the authentication of two users and the detection of eavesdropping were implemented. The use of logical qubits not only guaranteed the high fidelity of exchanged secret message, but also prevented the eavesdroppers to eavesdrop beneath a mask of noise.
CHANG YanZHANG ShiBinLI JianYAN LiLi
关键词:AUTHENTICATION
复杂网络理论在城市交通系统中的应用研究综述
大型城市交通系统涉及的路网和车辆数量巨大,他们之间的连接具有多样性,不稳定性及演进性,这给城市交通系统的管理提出了挑战。最新的研究方式是采用复杂网络理论作为研究城市交通系统的工具,从而分析复杂城市交通网络的拓扑特性、网络...
芦效峰刘建峰邓小勇黄建玲
关键词:城市交通系统智能交通复杂网络理论
文献传递
物联网安全问题对策研究被引量:19
2011年
文章全面分析了物联网中的安全隐患,并提出相应的对策和建议,对物联网中的安全问题进行了全面深入地分析。在物联网潜在隐患的分析过程中,文章重点探讨了RFID技术存在的安全隐患和风险、国外的物联网先进技术和设备渗透到重点行业带来的安全隐患,以及物联网和互联网之间安全威胁相互扩散的问题,挖掘出了其发展过程中存在的一些安全隐患和风险问题,并分别提出了相应的对策和建议,从而保障物联网建设顺利进行,维护国家网络信息安全。
彭勇谢丰劼郭晓静宋丹李剑
关键词:物联网安全对策RFID
Deterministic secure quantum communication and authentication protocol based on three-particle W state and quantum one-time pad被引量:3
2014年
Three-particle W states are used as decoy photons,and the eavesdropping detection rate reaches63%.The positions of decoy photons in information sequence are encoded with identity string ID of the legitimate users.Authentication is implemented by using previously shared identity string.State/j i is used as the carrier.One photon of/j i is sent to Bob;and Bob obtains a random key by measuring photons with bases dominated by ID.The bases information is secret to others except Alice and Bob.Both the eavesdropping detection based on three-particle W state and the secret ID ensure the security of the protocol.Unitary operations are not used.
Yan ChangShibin ZhangLili YanJian Li
关键词:三粒子W态量子通信一次一密随机密钥
Determinate joint remote preparation of an arbitrary W-class quantum state被引量:1
2012年
A novel determinate joint remote preparation scheme of an arbitrary W-class quantum state is proposed to improve the probability of successful preparation. The presented scheme is realized through orthogonal projective measurement of the Hadamard transferred basis, which converts a global measurement to several local measurements. Thus orthogonal projective measurement of the Hadamard transferred basis enables quantum information to be transmitted from different sources simultaneously, which is a breakthrough for quantum network node processing. Finally, analysis shows the feasibility and validity of the proposed method, with a 100% probability of successful preparation.
李剑郑欢洋
共1页<1>
聚类工具0