共查询到17条相似文献,搜索用时 604 毫秒
1.
通过在节点间建立成对纠缠态,构造了一个量子无标度网络.通过局域化纠缠交换的方式对网络中的节点进行随机攻击以及等概率地使网络中的节点发生蓄意故障,对比其纠缠渗流阈值变化.结果表明随机攻击下的阈值明显变小,蓄意故障下的阈值明显增大,体现了量子无标度网络的鲁棒性与脆弱性;纠缠浓缩下的量子无标度网络在随机攻击与蓄意故障下仍具有鲁棒性与脆弱性,但较纠缠浓缩前的鲁棒性变弱,说明真实网络具有较好的鲁棒性. 相似文献
2.
3.
根据腔量子电动力学(QED,quantum electrodynamics)原子的演化规律提出腔QED内新颖的量子隐写协议,其隐藏容量高达4bit。协议通过腔QED中任意两个Bell态纠缠交换,建立一个隐藏信道传送秘密信息。协议不需将多粒子量子纠缠态作为量子资源,也不涉及关于多粒子量子纠缠态的纠缠交换和量子测量。分析表明,本文协议能够抵抗截获-重发攻击、测量-重发攻击和纠缠-测量攻击,具有良好的安全性。 相似文献
4.
提出一种以纠缠交换作为核心技术的远程量子链路建立策略,建立了基于链路状态矩阵的量子链路模型并分析了纠缠交换的实现和矩阵表示。提出了链路协议栈以及端到端的建立策略,分析了矩阵控制下的纠缠交换和纠缠纯化流程,计算得出了在基于自动重传请求( ARQ )协议经典信息辅助下的链路时延和吞吐量与节点数、误帧率、平均距离、操作成功率之间的定量关系。仿真结果表明:处于同一状态区间内的链路性能随节点数呈现出较为一致和平缓的变化;不同区间内的链路性能差异较为显著,在节点平均距离为1 km、经典信息误帧率为0、纠缠保真度为0.98的情况下,当节点数分别为32、33和34时,链路时延分别为1.0770 ms、1.0903 ms和1.6690 ms,链路吞吐量分别为0.9285 kb/s、0.9172 kb/s和0.5992 kb/s。 相似文献
5.
6.
7.
已有的大多数有关量子博弈的研究只关注粒子处在最大纠缠态和特定的量子操作时模型的优越性。在实际应用中,所用粒子可能偏离最大纠缠态,量子操作也可能存在一定的偏差。基于此,研究了这两方面对CHSH量子博弈模型优越性的影响。结果表明,当粒子处在特定纠缠态时,量子获胜概率 并不总是大于经典获胜概率 ,采用不同的量子旋转门操作可以达到的最大量子获胜概率 随着量子态纠缠度的增大而增大。在 对应的量子门旋转角附近,某些旋转角范围对应的 变化较小。这些研究对量子博弈的应用提供了理论指导。 相似文献
8.
9.
提出在一个源量子节点与M个目的量子节点组成的网络中抗量子特洛伊木马攻击的组播通信协议,源量子节点构建2n+δ个EPR纠缠对,并用发送序列标记;在发送序列中随机选取n个作为检测纠缠对,利用CHSH不等式进行信道检测;发送序列中剩余n+δ个EPR纠缠对变形为非正交的量子态作为密钥,将广播明文信息分组编码成密文,利用量子态的不精确克隆复制M份发送给每个目的节点;目的节点接收密文逆向解密。分析了通信的吞吐量、信道的利用率、协议的安全性等问题。通过分析,证明该协议能有效防止特洛伊木马攻击,保证组播信息的安全。 相似文献
10.
基于隐形传态的跨中心量子身份认证方案 总被引:3,自引:3,他引:0
基于量子光学中的隐形传态原理和量子纠缠交换技术,提出一个网络中跨中心的量子身份认证方案。在分布式网络系统中,通过客户端和服务端之间,以及服务端相互之间的量子信道共享EPR纠缠对进行信息传输,同时在经典信道上也进行必须的交互协商,实现了无条件安全的量子身份认证。其无条件安全性得到了量子力学原理的保证,与EPR密钥分发协议的安全性相同。与已有的量子身份认证方案相比,该方案克服了点对点的量子身份认证方案的缺点,具有可跨中心认证的优点,扩大了认证的范围,具有更好的灵活性和实用性。 相似文献
11.
多用户网络环境下量子密码术 总被引:3,自引:0,他引:3
在传统的点到点之间进行量子密钥分发协议的基础上,利用量子存储技术和EPR粒子纠缠态互换的方法,提出了在多用户、多控制中心、远距离的网络环境下进行量子密钥传送的方案。与传统的点与点之间的量子密钥传送协议类似,其安全性也是建立在量子力学原理上,任何窃听者的存在必将使生成密钥的误码率上升而被合法通信用户发现。 相似文献
12.
A Random Linear Network Coding Approach to Multicast 总被引:11,自引:0,他引:11
Ho T. Medard M. Koetter R. Karger D.R. Effros M. Jun Shi Leong B. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2006,52(10):4413-4430
We present a distributed random linear network coding approach for transmission and compression of information in general multisource multicast networks. Network nodes independently and randomly select linear mappings from inputs onto output links over some field. We show that this achieves capacity with probability exponentially approaching 1 with the code length. We also demonstrate that random linear coding performs compression when necessary in a network, generalizing error exponents for linear Slepian-Wolf coding in a natural way. Benefits of this approach are decentralized operation and robustness to network changes or link failures. We show that this approach can take advantage of redundant network capacity for improved success probability and robustness. We illustrate some potential advantages of random linear network coding over routing in two examples of practical scenarios: distributed network operation and networks with dynamically varying connections. Our derivation of these results also yields a new bound on required field size for centralized network coding on general multicast networks 相似文献
13.
14.
Yao-Hsin Chou Guo-Jyun Zeng Fang-Jhu Lin Chi-Yuan Chen Han-Chieh Chao 《Mobile Networks and Applications》2014,19(1):121-130
In this paper, we propose a communication protocol called Controlled Bidirectional Quantum Secret Direct Communication (CBQSDC) for mobile networks. In mobile networks, telecom companies assist the agent ensuring both sides could receive the other’s secret messages in the transmission by quantum theory simultaneously. This protocol is based on n-particle GHZ states (Greenberger-Horne-Zeilinger-states) which are transformed to Einstein-Podolsky-Rosen (EPR) pairs by entanglement swapping. GHZ states are used to carry both sides’ messages and entanglement swapping could reduce the number of transmission, so we could decrease the probability of eavesdropping. If any eavesdropper tries to steal dealer’s messages, the lawful participants will perceive it and abort their transmission. 相似文献
15.
The issue about cascading failures of interdependent networks is a hot research field based on the current complex network basic theories. This paper mainly researches methods for improving robustness of interdependent networks. At first, a model of interdependent network cascading failures was established to carry out robustness analysis of three different interdependent networks including BA–BA, WS–WS and ER–ER. Then, methods for improving robustness of interdependent networks under random attacks and targeted attacks were researched respectively. (1)Under random attacks, based on the overall idea of network addition, the paper summarized four common methods for improving robustness of a simple complex network, including random addition, low-degree node addition, low-betweenness node addition and addition based on algebra connectivity. After that, according to inherent characteristics of interdependent networks, the paper put forward an interdependent network addition algorithm based on internal similarities. It is shown in cascading failure simulation calculation results of three interdependent coupling networks, that the method put forward in this paper can most effectively improve robustness of interdependent networks under random attacks. (2)Based on the overall idea of protecting key nodes under targeted attacks, the paper put forward a method for analyzing key nodes of interdependent networks based on natural connectivity. Then, under the BA–BA interdependent network, the paper analyzed this method in comparison with the commonly approved Max-Cas algorithm. It is shown in simulation calculation results that, the method put forward in this paper can more obviously improve robustness of an interdependent network under targeted attacks and can be applied flexibly. 相似文献
16.
提出了一个基于GHZ态局域测量的新颖且高效的量子秘密共享方案.该方案充分利用了GHZ态3个粒子间的相关性,不需要进行任何酉操作或纠缠交换,只通过局域测量,就可在通信者之间建立共享联合密钥.除去用于窃听检测的粒子,其余粒子全部用于消息传输,每个GHZ态可以共享一个比特经典消息,效率达到100%.同时,对于可能存在的攻击方式,文中给出了详细的安全性证明.最后,建立了效率与安全的关系模型,并用MATLAB进行了比较深入的仿真分析. 相似文献
17.
ZHOU Nan-run GONG Li-hua LIU Ye 《光电子快报》2006,2(6):455-458
In quantum communication,a quantum channel be-tween communicators is more i mportant than the tradi-tional classical channels .Quantumchannel can be quan-tumentanglement between/among communicators .Forexample,for a two-party correspondence,the quantumcha… 相似文献