您的位置: 专家智库 > >

国家教育部博士点基金(20100005120002)

作品数:4 被引量:15H指数:2
发文基金:国家教育部博士点基金国家自然科学基金霍英东教育基金更多>>
相关领域:理学电子电信更多>>

文献类型

  • 4篇中文期刊文章

领域

  • 3篇理学
  • 2篇电子电信

主题

  • 2篇PROTOC...
  • 2篇QUANTU...
  • 2篇STEGAN...
  • 1篇PARTIC...
  • 1篇QUANTU...
  • 1篇QUANTU...
  • 1篇SECURI...
  • 1篇THREE-...
  • 1篇BASED_...
  • 1篇BLIND
  • 1篇COMPLE...
  • 1篇EFFICI...
  • 1篇ENTANG...
  • 1篇GHZ
  • 1篇GHZ_ST...
  • 1篇GHZ_ST...
  • 1篇CLONE
  • 1篇STEGAN...
  • 1篇ASSIST...

传媒

  • 2篇Scienc...
  • 1篇Commun...
  • 1篇Chines...

年份

  • 3篇2013
  • 1篇2011
4 条 记 录,以下是 1-4
排序方式:
Steganalysis and improvement of a quantum steganography protocol via a GHZ_4 state
2013年
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography using the GHZ4 state. Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered, we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations. To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state, we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states. Due to the symmetry of the GHZ4 state, all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states, so the improved protocol achieves a high efficiency.
徐淑奖陈秀波钮心忻杨义先
A blind quantum signature protocol using the GHZ states被引量:10
2013年
Recently,some blind quantum signature(BQS) protocols have been proposed.But the previous schemes have security and efficiency problems.Based on the entangled Greenberger-Horne-Zeilinger(GHZ) states,a new weak BQS protocol is proposed.Compared with some existing schemes,our protocol has 100% efficiency.Besides,the protocol is simple and easy to implement.The security of the protocol is guaranteed by the correlation of the GHZ particles held by each participant.In our protocol,the signatory is kept blind from the content of the message.According to the security analysis,the signatory cannot disavowal his/her signature while the signature cannot be forged by others.
WANG MingMingCHEN XiuBoYANG YiXian
关键词:EFFICIENCYSECURITY
Scheme for Cloing a Three-Particle GHZ Class State with Assistance被引量:1
2011年
Our concern is to design an assisted-clone scheme which can produce a perfect copy of a three-particle Oreenberger-Horne-Zeilinger (GHZ) class state with a high probability. In the first stage of the protocol, the sender teleports the input state to the receiver by using three EPR pairs as the quantum channel. In the second stage of the protocol, a novel set of mutually orthogonal basis vectors is constructed. With the assistance of the preparer through a three-particle projective measurement under this basis, the perfect copy of an original state can be reestablished by the sender with the probability 1/2. Moreover, the classical communication cost of the scheme is also calculated.
马松雅陈秀波汤平钮心忻杨义先
High-efficiency quantum steganography based on the tensor product of Bell states被引量:6
2013年
In this paper,we first propose a hidden rule among the secure message,the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first particle of the two initial Bell states,and then present a high-efficiency quantum steganography protocol under the control of the hidden rule.In the proposed quantum steganography scheme,a hidden channel is established to transfer a secret message within any quantum secure direct communication(QSDC) scheme that is based on 2-level quantum states and unitary transformations.The secret message hiding/unhiding process is linked with the QSDC process only by unitary transformations.To accurately describe the capacity of a steganography scheme,a quantitative measure,named embedding efficiency,is introduced in this paper.The performance analysis shows that the proposed steganography scheme achieves a high efficiency as well as a good imperceptibility.Moreover,it is shown that this scheme can resist all serious attacks including the intercept-resend attack,measurement-resend attack,auxiliary particle attack and even the Denial of Service attack.To improve the efficiency of the proposed scheme,the hidden rule is extended based on the tensor product of multiple Bell states.
XU ShuJiangCHEN XiuBoNIU XinXinYANG YiXian
共1页<1>
聚类工具0