首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 156 毫秒
1.
量子的独特性质使它在秘密共享方面有着很大的应用前景,但在现实情况下秘密代理者的数目会根据实际情况的不同而发生变化。本文利用五粒子或六粒子的纠缠量子态构造了五和六秘密代理者数目下的量子多方秘密共享方案,在此基础上将其拓展并构建了在n个秘密代理者情况下的秘密共享方案。这使得秘密共享者在秘密代理者数目发生变化时能够选取合适的量子秘密共享方案。此外,在每种秘密代理者数目情形下都使用基于量子纠缠的量子隐形传态的方式实现秘密共享,进一步增加了方案的可选择性。最后,对提出的量子多方秘密共享方案的安全性进行了分析。  相似文献   

2.
《计算机工程》2017,(8):169-172
基于中国剩余定理和Bell态,构造了一种可验证的秘密共享方案。在分发阶段,分发者Alice通过量子信道将秘密份额分发给参与者。在恢复阶段,Alice产生一个2 bit的Bell态,参与者与Alice对该Bell态进行一系列酉变换以重构秘密信息。分析结果表明,该方案能抵抗截获-重发攻击、纠缠-测量攻击、参与者攻击和特洛伊木马攻击。  相似文献   

3.
彭家寅 《计算机应用研究》2020,37(12):3731-3735
为了解决任意二量子通信问题,首先给出了五粒子和七粒子纠缠态的构造方法,并提供了它们的量子线路图。其次,以该五粒子纠缠态为量子信道,提出一个任意二粒子未知量子态的受控隐形传态协议。该协议在监察者Charlie的控制下,Alice进行四粒子投影测量和经典通信,Bob采用简单酉变换就能以100%的概率成功重构一个任意二粒子纠缠态。最后,利用七粒子纠缠态为量子信道,提出了任意二粒子纠缠态的联合受控远程制备方案。在此方案中,发送者Alice用自己掌握被制备态的部分信息构造测量基,发送者Bob采用前馈测量策略,接收者Diana在监控者Charlie的帮助下,通过简单幺正变换就能确定性地恢复原始态。  相似文献   

4.
提出传送任意三粒子纠缠态的三个方案,分别是利用三对二粒子纠缠态、单个三粒子最大纠缠态和利用两个EPR态作为量子通道实现三粒子纠缠态的传送。通过发送者(Alice)对需传送的三粒子纠缠态与属于自己的纠缠对中的粒子分别进行适当的Bell基测量,然后把结果通过经典通道告诉接收者(Bob),接收者根据这些信息对自己拥有的三粒子进行相应的联合幺正变换,就可以实现一定概率的隐形传态。这些方案都可以推广至N个粒子纠缠态的传送。  相似文献   

5.
利用多方控制代理的网络,提出了一个量子隐形传态多量子位的协议。协议中所使用的量子信道有别于已有协议中所使用的量子最大纠缠态。得到的研究结果是,只有在发送方和多方代理合作时,接受方才能得到概率隐形传态的量子信息。因为使用的量子信道是非最大纠缠态,所以该协议更具有实际意义。  相似文献   

6.
本文分别基于四粒子Cluster态和一个非对称的四粒子纠缠态,提出两个量子秘密共享的方案,其中共享的秘密是未知的单粒子态。秘密的发送者需要对手中的粒子进行Bell基测量,协助者需要对手中的粒子进行测量或者实施幺正操作,最后接收者通过对手中的粒子进行相应的幺正变换或者受控非门操作,就可以重构原始秘密。通过分析表明,任何一个代理者在其他两方协助下是可以恢复秘密的,所以我所提出的方案是高效且安全可靠的。  相似文献   

7.
基于量子纠缠交换理论,提出一种基于Bell态纠缠交换的量子盲签名方案。消息拥有者Alice将待签名消息发送给盲签名者Charlie,Charlie根据双方共享的量子密钥对消息进行盲化签名,加密后发送给消息验证者Bob。Bob收到盲化签名后,根据他与Charlie共享的量子密钥对签名进行验证。利用量子纠缠特性,实现了消息对签名者Charlie的盲化性。基于量子密钥分发和一次一密技术,保证了签名过程的绝对安全性。  相似文献   

8.
彭家寅 《计算机应用研究》2020,37(9):2802-2805,2814
为了解决多方量子通信问题,首先提出一种构造十粒子纠缠态的方法,并籍此构造出一个3◢n◣+1粒子纠缠态。其次,以十粒子纠缠态为量子信道,提出一个三方受控循环远程制备协议。该协议在监察者David的控制下,Alice能为Bob远程制备一个任意单粒子态,Bob能够在Charlie处远程制备一个任意单粒子态,Charlie也能为Alice远程制备任意单粒子态。进一步,借助3◢n◣+1粒子纠缠态,将此循环协议推广到任意◢n◣方受控循环远程态制备情形。在远程态制备过程中,每个发送者充分利用各自掌握的信息和前馈策略来构造恰当的测量基,通过经典通信和局域操作,就能成功实现任意单粒子态的远程制备。  相似文献   

9.
提出了一个基于团簇态的量子秘密共享方案,发送者通过Pauli操作将经典秘密信息编码在团簇态上进行分发,接收者通过联合测量实现秘密共享。协议插入EPR对作为诱骗态以防止窃听,通过安全性分析证明本协议是安全的,可以抵抗截获-测量、截获-重发和纠缠-测量攻击。此外,协议传输一个四粒子团簇态可以共享四个经典比特信息,量子比特效率达到100%。  相似文献   

10.
提出了一种基于量子秘密共享的盲签名方案。其中量子秘密共享中用到了Bell纠缠和诱骗光子;盲签名使用的是异或操作和Hash函数。Bell纠缠是纠缠态中最简单的纠缠,而异或操作也是简单易操作;诱骗光子和Hash函数保证了安全性,将这些结合的本方案简单安全易实现,同时还保证了信息的盲性、签名消息的不可否认和不可伪造性。  相似文献   

11.
We present a three-party quantum secret sharing (QSS) scheme via the entangled Greenberger–Horne–Zeilinger state. In this scheme, the sender Alice encodes her arbitrary secret information by means of preparing a single-particle quantum state. The agent Bob obtains his shared information according to his hobby, while Charlie can easily calculate his shared information. The proposed scheme is secure. It is shown that even a dishonest agent, who may avoid the security checking, cannot obtain any useful information. Moreover, we further investigate the multi-party QSS scheme which allows most agents to predetermine their information.  相似文献   

12.
By using a generalized Greenberger–Horne–Zeilinger (GHZ) state in which is locally unitarily connected with standard GHZ state as a communication channel, semi-quantum key distribution is extended to study semi-quantum information splitting protocols for secret sharing of quantum information. In our scheme, quantum Alice splits arbitrary two, three and N-qubit states with two classical parties, Bob and Charlie, in a way that both parties are sufficient to reconstruct Alice’s original states only under the condition of which she/he obtains the help from another one, but one of them cannot. The presented protocols are helpful for both secure against certain eavesdropping attacks and economical in processing of quantum information.  相似文献   

13.
针对量子秘密共享的量子态局限于最大纠缠态的问题,提出一种实现任意N位量子态的秘密共享方案。该方案使用纠缠态作为量子信道,首先发送方对粒子进行Bell基测量,然后接收方Bob或Charlie使用单粒子测量,最后参与者根据Alice和单粒子测量得到的结果,选用合适的联合幺正变换对量子态进行相应的变换,这样可以实现任意N粒子量子态的秘密共享。该方案能够抵御外部窃听者和内部不诚实参与者的攻击,安全性分析表明此方案是安全的。  相似文献   

14.
In this paper, two theoretical schemes of the arbitrary single-qubit states via four-qubit cluster state are proposed. One is three-party quantum broadcast scheme, which realizes the broadcast among three participants. The other is multi-output quantum teleportation. Both allow two distant receivers to simultaneously and deterministically obtain the arbitrary single-qubit states, respectively. Compared with former schemes of an arbitrary single-qubit state, the proposed schemes realize quantum multi-cast communication efficiently, which enables Bob and Charlie to obtain the states simultaneously in the case of just knowing Alice’s measurement results. The proposed schemes play an important role in quantum information, specially in secret sharing and quantum teleportation.  相似文献   

15.
The idea of semiquantum secret sharing (SQSS) is that quantum Alice wants to share secret information with clients such as Bob and Charlie who have limited quantum capability. Neither Bob nor Charlie can reconstruct the secret information unless they collaborate together. In existing semiquantum secret sharing protocols, clients generally need the ability of quantum measurement in classical basis and quantum parties usually need to access quantum memory. In this paper, we propose a relatively efficient SQSS protocol where limited Bob and Charlie can realize secret sharing without making any measurements and quantum Alice does not have to access quantum memory.  相似文献   

16.
A deterministic multiparty quantum secret sharing scheme is put forward, in which Bell states in high-dimensional Hilbert space are used. Only by preforming High-dimensional Bell measurements, all agents can recover the secret according to the dealer??s announcement when collaborating with each other. It shows that unitary operation for encoding deterministic secret is unnecessary in quantum communication. The security of the transmission of the high-dimensional Bell states can be ensured by randomly using one of the two mutually unbiased bases for eavesdropping checking, and thus by which the proposed quantum secret sharing scheme is secure against usual attacks. In addition, the proposed scheme has three advantages: generality, high resource capacity and high security.  相似文献   

17.
By exploiting the entanglement correlation in quantum mechanics, two three-party remote state preparation (RSP) schemes are proposed. One is three-party remote preparation of a single-particle quantum state, and the other is three-party remote preparation of a two-particle entangled state. In the proposed schemes, the sender Alice knows the quantum states to be prepared, while the receivers Bob and Charlie do not know the quantum states; Alice performs measurement and unitary operations on her own particles with two three-particle GHZ states as the quantum channel. According to Alice’s measurement results, Bob and Charlie measure their own particles on the corresponding quantum measurement bases and perform unitary operations on the corresponding particles to reconstruct the quantum states, respectively. Compared with multiparty joint remote preparation and two-party RSP of a quantum state, the proposed schemes realize quantum multicast communication successfully, which enables Bob and Charlie to obtain the prepared quantum states simultaneously in the case of just knowing Alice’s measurement results, while Bob and Charlie do not know each other’s prepared quantum states. It is shown that only three classical bits are required for the two proposed RSP schemes when Bob and Alice introduce an auxiliary particle, respectively, and the proposed schemes are secure after the quantum channel authentication.  相似文献   

18.
In the paper, a scheme is proposed for hierarchical quantum information splitting with an unknown eight-qubit cluster state. The Boss Alice wants to distribute a quantum secret to seven distant agents who are divided into two grades. Three agents are in the upper grade and four agents are in the lower grade. Every agent of the upper grade only needs the collaboration of three of the other six agents to get the secret, but all the agents of the lower grade need the collaboration of all the other six agents. In other words, different agents in different grades have different authorities to recover Boss’ secret. And the agent in upper grade is more powerful than the one in the lower grades which needs more information to recover the secret.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号