首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
In order to enable two parties to exchange their secret information equally, we propose a controlled quantum dialogue protocol based on quantum walks, which implements the equal exchange of secret information between the two parties with the help of the controller TP. The secret information is transmitted via quantum walks, by using this method, the previously required entangled particles do not need to be prepared in the initial phase, and the entangled particles can be produced spontaneously via quantum walks. Furthermore, to resist TP’s dishonest behavior, we use a hash function to verify the correctness of the secret information. The protocol analysis shows that it is safe and reliable facing some attacks, including intercept-measure-resend attack, entanglement attack, dishonest controller’s attack and participant attack. And has a slightly increasing efficiency comparing with the previous protocols. Note that the proposed protocol may be feasible because quantum walks prove to be implemented in different physical systems and experiments.  相似文献   

2.
Quantum mechanics shows superiority than classical mechanics in many aspects and quantum entanglement plays an essential role in information processing and some computational tasks such as quantum teleportation (QT). QT was proposed to transmit the unknown states, in which EPR pairs, the entangled states, can be used as quantum channels. In this paper, we present two simple schemes for teleporting a product state of two arbitrary single-particle and an arbitrary two-particle pure entangled state respectively. Alice and Bob have shared an entangle state. Two Bell states are used as quantum channels. Then after Alice measuring her qubits and informing Bob her measurement results, Bob can perfectly reconstruct the original state by performing corresponding unitary operators on his qubits. It shown that a product state of two arbitrary single-particle and an arbitrary two-particle pure entangled state can be teleported perfectly, i.e. the success probabilities of our schemes are both 1.  相似文献   

3.
We introduce a new entangled state, which is composed of two photon-added coherent states. We discuss the entanglement of this state by using several sufficient entanglement criteria, such as higher-order entanglement criterion, EPR criterion, SU(1,1) algebra and Cauchy–Schwarz inequality. These criteria reflect some entanglement effects of this new state, but fail to find the degree of entanglement directly. Thus, we use the covariance to measure the entanglement in this state. Our findings show that the degree of entanglement decreases with the increasing of photon-number and the amplitude of the coherent states. One interesting result is that the new entangled state becomes a maximally entangled state when the photon-added number is 1 and the amplitude of the coherent states is zero, which is just one of the four Bell states.  相似文献   

4.
With the emergence of classical communication security problems, quantum communication has been studied more extensively. In this paper, a novel probabilistic hierarchical quantum information splitting protocol is designed by using a non-maximally entangled four-qubit cluster state. Firstly, the sender Alice splits and teleports an arbitrary one-qubit secret state invisibly to three remote agents Bob, Charlie, and David. One agent David is in high grade, the other two agents Bob and Charlie are in low grade. Secondly, the receiver in high grade needs the assistance of one agent in low grade, while the receiver in low grade needs the aid of all agents. While introducing an ancillary qubit, the receiver’s state can be inferred from the POVM measurement result of the ancillary qubit. Finally, with the help of other agents, the receiver can recover the secret state probabilistically by performing certain unitary operation on his own qubit. In addition, the security of the protocol under eavesdropping attacks is analyzed. In this proposed protocol, the agents need only single-qubit measurements to achieve probabilistic hierarchical quantum information splitting, which has appealing advantages in actual experiments. Such a probabilistic hierarchical quantum information splitting protocol hierarchical is expected to be more practical in multipartite quantum cryptography.  相似文献   

5.
We present a scheme for generating entangled states of two qutrits, by using a 4-level system and a 3-level system coupled to a single cavity. Because of only employing resonant interactions, the entangled state can be fast created. This scheme is easy to implement in experiments since only a single cavity is needed and none of measurement, auxiliary system and identical system-cavity coupling constant is required. Furthermore, two-qutrit partially or maximally entangled states can be created by using this scheme. The proposal is quite general, which can be used to prepare entangled states of two qutrits in various physical systems, such as two natural or artificial atoms of the Λ-type or Δ-type three lowest levels, coupled to an optical or microwave cavity.  相似文献   

6.
In this paper, we consider a multi-hop teleportation protocol for transfer of certain five-qubit entangled states. The speciality of this protocol is that intermediate nodes between the sender and the receiver are introduced. Teleportation processes over long distances are problematic because of the existence of the environmental noise which is almost unavoidable and adversely affects the entangled quantum channel. With a view to the above, intermediate nodes are introduced which are connected in series by entanglement. These short range quantum channels minimize the risk of the protocol being affected by noise. The present protocol is performed in an integrated manner in which the parties in the intermediate nodes act independently. A remarkable feature of the protocol is that only 3.13% of the basis elements are involved in the measurements. We also calculate the efficiency and indicate the advantages of the present protocol. The work is in the direction of research for transferring entangled quantum states.  相似文献   

7.
With one pair of entangled particles as the quantum channel, we present an explicit generalized protocol for preparing remotely a two-level N-particle Greenberger–Horne–Zeilinger (GHZ) state and generalize it to the d-level case. We show that by properly choosing the measurement basis it is possible to achieve unity fidelity remote preparation of the state. This protocol has the advantage of transmitting much fewer particles for remote preparation of the d-level N-particle GHZ state.  相似文献   

8.
The Global System for Mobile communication (GSM) network is proposed to mitigate the security problems and vulnerabilities observed in the mobile telecommunication system. However, the GSM network is vulnerable to different kinds of attacks such as redirection attack, impersonation attack and Man in-the Middle (MiTM) attack. The possibility of these attacks makes the wireless mobile system vulnerable to fraudulent access and eavesdropping. Different authentication protocols of GSM were proposed to overcome the drawbacks but many of them lead to network signalling overload and increases the call set-up time. In this paper, an efficient and secure authentication and key agreement protocol (ESAP-AKA) is proposed to overcome the flaws of existing authentication protocol for roaming users in the GSM network. The formal verification of the proposed protocol is presented by BAN logic and the security analysis is shown using the AVISPA tool. The security analysis shows that the proposed protocol avoids the different possible attacks on the communication network. The performance analysis based on the fluid flow mobility model shows that the proposed protocol reduces the communication overhead of the network by reducing a number of messages. On an average, the protocol reduces 60% of network signalling congestion overhead as compared with other existing GSM-AKA protocols. Moreover, the protocol not only removes the drawbacks of existing protocols but also accomplishes the needs of roaming users.  相似文献   

9.
Combined with the dense coding mechanism and the bias-BB84 protocol, an efficient quantum key distribution protocol with dense coding on single photons (QDKD-SP) is proposed. Compared with the BB84 or bias-BB84 protocols based on single photons, our QDKD-SP protocol has a higher capacity without increasing the difficulty of its experiment implementation as each correlated photon can carry two bits of useful information. Compared with the quantum dense key distribution (QDKD) protocol based on entangled states, our protocol is more feasible as the preparation and the measurement of a single-photon quantum state is not difficult with current technology. In addition, our QDKD-SP protocol is theoretically proved to be secure against the intercept-resend attack.  相似文献   

10.
Abstract

Measurement device independent Quantum Key Distribution (MDI-QKD), is immune to all attacks on detection and achieve immense improvement with respect to quantum key distribution system security. However, Bell state measurement (BSM), the kernel processing in MDI-QKD, can only identify two of the four Bell states, which limits the efficiency of the protocol. In this paper, a modified MDI-QKD with hybrid qubit is proposed to provide a major step towards answering this question. The hybrid qubits, which are composed of single photon qubit qubits and coherent qubit, are sent to the quantum relay to perform parallel BSMs synchronously and bit flip can be easily operated to complete the whole key distribution process. The secure key rate can be improved with our modified protocol owing to the higher success probability of BSM, which is increased by adding the parity check of coherent qubit. Furthermore, though our protocol requires photon number resolving detectors, the BSM of coherent state could be instead implemented using squeezed state which makes our scheme practical with state-of-the-art devices.  相似文献   

11.
Abstract

We describe in detail an entanglement purification protocol which generates maximally entangled states with high efficiencies from realistic Gaussian continuous variable entangled states. A physical implementation of this protocol which uses high finesse cavities and cavity enhanced cross-Kerr nonlinearities is analysed.  相似文献   

12.
In this paper, we propose two ways of Dicke state generation using single photons and weak coherent pulse resorting to Kerr nonlinearities. By interference of two coherent beams, the Dicke state are realized in polarization and photon number degrees of freedom. By performing homodyne detection on the coherent states, the multi-particle entangled Dicke state can be generated with a high probability. The realization of the protocols are more flexible as the phase differences can be easily distinguished during homodyne detection.  相似文献   

13.
It is shown that macroscopic entangled states can be generated using an experimental arrangement consisting of coupled spontaneous parametric down-converters with type-I phase matching (SPDCI) pumped simultaneously by optical fields in coherent state and two beam splitters. Two beam splitters in auxiliary generated modes are used to conditionally prepare macroscopic entangled states in output pumping modes of the studied system. Identification of two macroscopic entangled states is produced by use of photon number resolving detection. In contrast to all previous schemes, our scheme does not need Kerr-type nonlinear interaction and is purely based on second-order susceptibility of the crystal which is stronger for the Kerr nonlinearity. We calculate concurrence of the states as a measure of the amount of entanglement stored in the states and present analysis concerning ‘separation’ between components forming studied entangled states.  相似文献   

14.
The Internet Control Message Protocol (ICMP) covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission. Its concealment is stronger and it is not easy to be discovered. Most detection methods are detecting the existence of channels instead of clarifying specific attack intentions. In this paper, we propose an ICMP covert tunnel attack intent detection framework ICMPTend, which includes five steps: data collection, feature dictionary construction, data preprocessing, model construction, and attack intent prediction. ICMPTend can detect a variety of attack intentions, such as shell attacks, sensitive directory access, communication protocol traffic theft, filling tunnel reserved words, and other common network attacks. We extract features from five types of attack intent found in ICMP channels. We build a multi-dimensional dictionary of malicious features, including shell attacks, sensitive directory access, communication protocol traffic theft, filling tunnel reserved words, and other common network attack keywords. For the high-dimensional and independent characteristics of ICMP traffic, we use a support vector machine (SVM) as a multi-class classifier. The experimental results show that the average accuracy of ICMPTend is 92%, training ICMPTend only takes 55 s, and the prediction time is only 2 s, which can effectively identify the attack intention of ICMP.  相似文献   

15.
Quantum secure direct communication (QSDC) can transmit secret messages directly from one user to another without first establishing a shared secret key, which is different from quantum key distribution. In this paper, we propose a novel quantum secure direct communication protocol based on signal photons and Bell states. Before the execution of the proposed protocol, two participants Alice and Bob exchange their corresponding identity IDA and IDB through quantum key distribution and keep them secret, respectively. Then the message sender, Alice, encodes each secret message bit into two single photons (| 01〉or|10〉) or a Bell state , and composes an ordered secret message sequence. To insure the security of communication, Alice also prepares the decoy photons and inserts them into secret message sequence on the basis of the values of IDA and IDB. By the secret identity IDA and IDB, both sides of the communication can check eavesdropping and identify each other. The proposed protocol not only completes secure direct communication, but also realizes the mutual authentication. The security analysis of the proposed protocol is presented in the paper. The analysis results show that this protocol is secure against some common attacks, and no secret message leaks even if the messages are broken. Compared with the two-way QSDC protocols, the presented protocol is a one-way quantum communication protocol which has the immunity to Trojan horse attack. Furthermore, our proposed protocol can be realized without quantum memory.  相似文献   

16.
Detection of unknown attacks like a zero-day attack is a research field that has long been studied. Recently, advances in Machine Learning (ML) and Artificial Intelligence (AI) have led to the emergence of many kinds of attack-generation tools developed using these technologies to evade detection skillfully. Anomaly detection and misuse detection are the most commonly used techniques for detecting intrusion by unknown attacks. Although anomaly detection is adequate for detecting unknown attacks, its disadvantage is the possibility of high false alarms. Misuse detection has low false alarms; its limitation is that it can detect only known attacks. To overcome such limitations, many researchers have proposed a hybrid intrusion detection that integrates these two detection techniques. This method can overcome the limitations of conventional methods and works better in detecting unknown attacks. However, this method does not accurately classify attacks like similar to normal or known attacks. Therefore, we proposed a hybrid intrusion detection to detect unknown attacks similar to normal and known attacks. In anomaly detection, the model was designed to perform normal detection using Fuzzy c-means (FCM) and identify attacks hidden in normal predicted data using relabeling. In misuse detection, the model was designed to detect previously known attacks using Classification and Regression Trees (CART) and apply Isolation Forest (iForest) to classify unknown attacks hidden in known attacks. As an experiment result, the application of relabeling improved attack detection accuracy in anomaly detection by approximately 11% and enhanced the performance of unknown attack detection in misuse detection by approximately 10%.  相似文献   

17.
Abstract

Entangled states are key ingredients to the new field of quantum information, including quantum dense coding, teleportation, and computation. However, only a relatively small class of entangled states has been investigated experimentally, or even discussed extensively. In particular, efforts to date have focused on two particles entangled in a single degree of freedom, for example polarization, or energy, or momentum direction. Novel phase-matching arrangements in spontaneous parametric down-conversion allow the preparation of pairs of photons that are simultaneously entangled in all of these. We shall call such a multiply-entangled state ?hyper-entangled‘. In addition, an even more general state–-a non-maximally entangled state–-should be realizable, in which the amplitudes of the contributing terms are not equal.  相似文献   

18.
A double-network model is established, which consists of the segments, E and A-constituent chains, the polymeric chains entangled with other ones by multi-entanglement and polymeric chains connected to a great number of destructible particles by multi-adsorption, based on which the E and A-constituent chains can be recreated and released dynamically. The distribution function of the end-to-end vector, the statistical distribution function of conformation for two kinds of chains in the multi-entanglement and multi-adsorption states and their number of polymeric chains are calculated by the combination of statistical mechanics and kinetics. Then the viscoelastic free energies of deformation for two kinds of the networks and suspensions are calculated by Boltzmann's statistical theory. Also, elastic modulus and memory function for two kinds of the network and suspensions are derived. Consequently, a new molecular theory of the non-linear viscoelasticity for polymeric suspensions is proposed, and the constitutive equation and material function with yielding and thinning for the polymeric suspensions in different flow fields are derived from this theory.  相似文献   

19.
Many imperfections in a practical quantum key distribution (QKD) system have been exploited by an eavesdropper (Eve) to attack the system. However, most of these attacks will introduce perturbations to the system while collecting information about the key. For example, the phase-remapping attack [Phys. Rev. A2007,75, 032314], in which Eve performs time shift on the signal pulse from the constant acting range of the phase modulation voltage to its rising edge to introduce an imperfection, results in an quantum bit error rate (QBER) of 14.6%, which is too high and will be discovered by careful users. In this paper, a frequency shift (FS) attack on ‘plug-and-play’ QKD systems with phase-coding BB84 protocol is proposed, in which Eve introduces an imperfection by the same method as she used in the phase-remapping attack. The most novel advantage of our FS attack is that Eve can get full information without introducing detectable QBER, which is more deceptive than the phase-remapping attack.  相似文献   

20.
The single-photon strong coupling in the deep-resolved sideband of the optomechanical system induces photon blockade (PB) effect. For the PB cavity, an initial mechanical coherent state evolves into superposition of phonon cat states entangled with the cavity Fock states. Measurement of the cavity photon number states produces phonon even and odd cat states. The information leakage effect of two photon states on the fidelity of cat states is calculated, it is shown that for low average phonon number this effect is negligible and decreases by increasing the two photon cavity state. The Lindblad equation is solved numerically to obtain the environmental effects on the fidelity of cat states.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号