欢迎登录材料期刊网

材料期刊网

高级检索

提出一种含有安全可信任中心的量子秘密共享(QSS)方案.其中,中心能够产生并提供量子态,也能够测量并提取量子态信息.通信用户(Alice、Bob和Charlie)不拥有量子比特产生器和测量器,只需通过幺正操作和交换操作实现密钥传输和窃听防范;同时,Bob和Charlie必须合作才能获得正确的密钥.理论分析表明该方案可有效地抵御截取重发攻击、纠缠测量攻击和关联提取攻击等常见攻击策略;由于方案减少了量子比特产生器和测量器的数量,降低了量子通信的费用.这将为量子秘密共享实用化提供一种可参考的方法.

参考文献

[1] Zhang Q Y.Quantum secret sharing of single-qubit state via tripartite entangled states (in Chinese)[J].Chinese Journal of Quantum Electronics(量子电子学报),201229(04):421-426.
[2] Liu Y Q;Shi J;Hu B L.Scheme of three quantum bit secret sharing based on GHZ state (in Chinese)[J].Chinese Journal of Quantum Electronics(量子电子学报),201027(01):41-46.
[3] Sun X M;Zha X W;Qi J X.High-efficient quantum state sharing via non-maximally five-qubit cluster state (in Chinese)[J].Acta Physical Sinica(物理学报),201362(23):230302-230310.
[4] Hillery M;Buzek V;Berthiaume A.Quantum secret sharing[J].Physical Review A,199959(03):1829-1834.
[5] Karlsson A;Koashi M;Imoto N.Quantum entanglement for secret sharing and secret splitting[J].Physical Review A,199959(01):162-168.
[6] Xiao L;Long G L;Deng F G.Efficient multiparty quantum-secret-sharing schemes[J].Physical Review A,200469(05):052307-052311.
[7] Schmid C;Trojek P;Bourennane M.Experimental single qubit quantum secret sharing[J].Physical Review Letters,200595(23):230505-230508.
[8] Liu L L;Tsai C W;Hwang T.Quantum secret sharing using symmetric W state[J].International Journal of Theoretical Physics,201251:2291-2306.
[9] Li H;Zhang C Y;Pan G X.Creation of cluster coherent states via cavity QED (in Chinese)[J].Chinese Journal of Quantum Electronics(量子电子学报),201330(02):175-179.
[10] Liu L Y;Hu M J;Lv H J.Quantum key distribution protocol based on any Bell states (in Chinese)[J].Chinese Journal of Quantum Electronics(量子电子学报),201330(04):439-444.
[11] Shih H C;Lee K C;Hwang T.New efficient three-party quantum key distribution protocols[J].IEEE Journal of Selected Topics in Quantum Electronics,200915(06):1602-1606.
[12] Zhao S M;Zheng B Y.Quantum Information Processing Techniques(量子信息处理技术)(in Chinese)[M].Beijing:Posts and Telecommunications Press,2010:14-19,52-54.
[13] Zhao S M;Li M M;Zheng B Y.A novel quantum key distribution protocol based on quantum error correction code (in Chinese)[J].Journal of Electronics and Information Technology(电子与信息学报),200931(04):954-957.
[14] Zhao S M;Zhu X L;Xiao Y.A novel construction of quantum LDPC codes based on balanced incomplete block designs (in Chinese)[J].Journal of Electronics and Information Technology(电子与信息学报),201133(01):218-222.
[15] Lin J;Yang C W.Intercept-resend attacks on semi-quantum secret sharing and the improvements[J].International Journal of Theoretical Physics,201352:156-162.
[16] Qin S J;Gao F;Guo F Z.Comment on " Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair "[J].Physical Review A,201082(03):036301-036303.
[17] Song T T;Wen Q Y;Gao F.Participant attack and improvement to multiparty quantum secret sharing based on GHZ states[J].International Journal of Theoretical Physics,201352:293-301.
[18] Deng F G;Li X H;Zhou H Y.Improving the security of multiparty quantum secret sharing against Trojan horse attack[J].Physical Review A,200572(04):044302-044305.
[19] Yang Y G;Jia X;Xia J.Comment on " Quantum secure direct communication with authentication expansion using single photons "[J].International Journal of Theoretical Physics,201251:3681-3687.
[20] Gao F;Qin S J;Guo F Z.Dense-coding attack on three-party quantum key distribution protocols[J].IEEE Journal of Quantum Electronics,201147(05):630-635.
上一张 下一张
上一张 下一张
计量
  • 下载量()
  • 访问量()
文章评分
  • 您的评分:
  • 1
    0%
  • 2
    0%
  • 3
    0%
  • 4
    0%
  • 5
    0%