共查询到20条相似文献,搜索用时 15 毫秒
1.
This work proposes a quantum dialogue (QD) based on single photons, which not only allows two communicants to exchange their secret messages simultaneously via a one-step quantum transmission but also can confirm the message integrity. Moreover, the proposed QD protocol is free from information leakage. Compared with the previous QDs, the proposed QD protocol is more efficient. It is also secure against several well-known attacks. 相似文献
2.
In this paper, the new protocol for quantum private comparison of equality (QPCE) is investigated. Instead of using the entanglement, we only utilize the single photon to efficiently realize the comparison of secret information. Furthermore, a more feasible QPCE protocol, which can be successfully performed via the collective amplitude damping channel, is put forward. In our QPCE protocols, a semi-honest third party (TP) is involved. It is an appealing advantage in the practical implementation of protocol. Our QPCE protocols can resist various kinds of attacks from both the outside eavesdroppers and the inside participants, even the semi-honest TP. 相似文献
3.
为进一步提高量子秘密共享协议的效率和安全性,结合量子Grove搜索算法提出一种基于极化单光子的量子秘密共享协议.效率分析结果表明,该方案可以将全部量子态用于密钥共享,理论效率为100%.在方案的安全性证明中,借助量子Grove算子和量子纠缠特性得出方案能够有效抵抗中间人攻击,同时该方案利用辅助量子态进行监视,能够以高概率检测特洛伊木马攻击.通过对Grove算子进行高维推广,证明了方案推广到(n,n)的可行性和实用性. 相似文献
4.
Bin Liu Di Xiao Wei Huang Heng-Yue Jia Ting-Ting Song 《Quantum Information Processing》2017,16(7):180
As a typical quantum cryptographic task between distrustful participants, quantum private comparison (QPC) has attracted a lot of attention in recent years. Here we propose two QPC protocols employing single-photon interference, a typical and interesting technology for quantum communications. Compared with the previous QPC protocols employing normal single states or entangled states, the proposed protocols achieve lower communication complexity utilizing the characteristics of single-photon interference. And we also proved the security of the proposed protocols in theory. 相似文献
5.
Wen-Jie Liu Hai-Bin Wang Gong-Lin Yuan Yong Xu Zhen-Yu Chen Xing-Xing An Fu-Gao Ji Gnim Tchalim Gnitou 《Quantum Information Processing》2016,15(2):869-879
In this study, a novel multiparty quantum sealed-bid auction protocol using the single photons as the message carrier of bids is proposed, followed by an example of three-party auction. Compared with those protocols based on the entangled states (GHZ state, EPR pairs, etc.), the present protocol is more economic and feasible within present technology. In order to guarantee the security and the fairness of the auction, the decoy photon checking technique and an improved post-confirmation mechanism with EPR pairs are introduced, respectively. 相似文献
6.
Based on EPR pairs, this paper proposes a different quantum private comparison (QPC) protocol enabling two parties to compare the equality of their information without revealing the information content. Due to the use of quantum entanglement of Bell state as well as one-way quantum transmission, the new protocol provides easier implementation as well as better qubit efficiency (near 50%) than the other QPCs. It is secure against Trojan horse attack and other well-known attacks. 相似文献
7.
Aharon Blank 《Quantum Information Processing》2013,12(9):2993-3006
A theoretical spin-based scheme for performing a variety of quantum computations is presented. It makes use of an array of multiple identical “computer” vectors of phosphorus-doped silicon where the nuclei serve as logical qubits and the electrons as working qubits. The spins are addressed by a combination of electron spin resonance and nuclear magnetic resonance techniques operating at a field of $\sim $ 3.3 T and cryogenic temperatures with an ultra-sensitive surface microresonator. Spin initialization is invoked by a combination of strong pre-polarization fields and laser pulses, which shortens the electrons’ $T_{1}$ . The set of universal quantum gates for this system includes an arbitrary rotation of single qubits and c-NOT operation in two qubits. The efficient parallel readout of all the spins in the system is performed by high sensitivity induction detection of the electron spin resonance signals with one-dimensional imaging. Details of the suggested scheme are provided, which show that it is scalable to a few hundreds of qubits. 相似文献
8.
In this paper, two multi-party quantum private comparison (MQPC) protocols are proposed in distributed mode and traveling mode, respectively. Compared with the first MQPC protocol, which pays attention to compare between arbitrary two participants, our protocols focus on the comparison of equality for \(n\) participants with a more reasonable assumption of the third party. Through executing our protocols once, it is easy to get if \(n\) participants’ secrets are same or not. In addition, our protocols are proved to be secure against the attacks from both outside attackers and dishonest participants. 相似文献
9.
In this paper, a novel quantum private comparison protocol with \(l\)-party and \(d\)-dimensional entangled states is proposed. In the protocol, \(l\) participants can sort their secret inputs in size, with the help of a semi-honest third party. However, if every participant wants to know the relation of size among the \(l\) secret inputs, these two-participant protocols have to be executed repeatedly \(\frac{l(l-1)}{2}\) times. Consequently, the proposed protocol needs to be executed one time. Without performing unitary operation on particles, it only need to prepare the initial entanglement states and only need to measure single particles. It is shown that the participants will not leak their private information by security analysis. 相似文献
10.
Shih-Min Hung Sheng-Liang Hwang Tzonelih Hwang Shih-Hung Kao 《Quantum Information Processing》2017,16(2):36
This study explores a new security problem existing in various state-of-the-art quantum private comparison (QPC) protocols, where a malicious third-party (TP) announces fake comparison (or intermediate) results. In this case, the participants could eventually be led to a wrong direction and the QPC will become fraudulent. In order to resolve this problem, a new QPC protocol is proposed, where a second TP is introduced to monitor the first one. Once a TP announces a fake comparison (or intermediate) result, participants can detect the fraud immediately. Besides, due to the introduction of the second TP, the proposed protocol allows strangers to compare their secrets privately, whereas the state-of-the-art QPCs require the involved clients to know each other before running the protocol. 相似文献
11.
As an important branch of quantum cryptography, quantum private comparison (QPC) has recently received a lot of attention. In this paper we study the security of previous QPC protocols with a semi-honest third party (TP) from the viewpoint of secure multi-party computation and show that the assumption of a semi-honest TP is unreasonable. Without the unreasonable assumption of a semi-honest TP, one can easily find that the QPC protocol (Tseng et al. in Quantum Inf Process, 2011, doi:10.1007/s11128-011-0251-0) has an obvious security flaw. Some suggestions about the design of QPC protocols are also given. 相似文献
12.
Recently, a quantum private comparison (QPC) protocol with a dishonest third party (TP) (Yang et al. in Quantum Inf Process, 2012. doi:10.1007/s11128-012-0433-4) was proposed, which pointed out that the assumption of semi-honest third party (TP) is unreasonable. Here we find this protocol is not so secure as it was expected, and then we give some improvement strategies, which ensure that both players’ secrets will not be leaked to anyone. We also discuss the assumption for TP in QPC protocls, which gives a constructive suggestions for the design of a new QPC protocol. 相似文献
13.
Ke-Jia Zhang Leong-Chuan Kwek Chun-Guang Ma Long Zhang Hong-Wei Sun 《Quantum Information Processing》2018,17(2):38
Quantum sealed-bid auction (QSA) has been widely studied in quantum cryptography. For a successful auction, post-confirmation is regarded as an important mechanism to make every bidder verify the identity of the winner after the auctioneer has announced the result. However, since the auctioneer may be dishonest and collude with malicious bidders in practice, some potential loopholes could exist. In this paper, we point out two types of collusion attacks for a particular post-confirmation technique with EPR pairs. And it is not difficult to see that there exists no unconditionally secure post-confirmation mechanism in the existing QSA model, if the dishonest participants have the ability to control multiparticle entanglement. In the view of this, we note that some secure implementation could exist if the participants are supposed to be semi-quantum, i.e., they can only control single photons. Finally, two potential methods to design post-confirmation mechanism are presented in this restricted scenario. 相似文献
14.
《Information and Computation》2007,205(7):967-981
We present a divide and conquer based algorithm for optimal quantum compression/decompression, using O(n(log4n)log log n) elementary quantum operations. Our result provides the first quasi-linear time algorithm for asymptotically optimal (in size and fidelity) quantum compression and decompression. We also outline the quantum gate array model to bring about this compression in a quantum computer. Our method uses various classical algorithmic tools to significantly improve the bound from the previous best known bound of O(n3) for this operation. 相似文献
15.
Collins and Popescu realized a powerful analogy between several resources in classical and quantum information theory. The Collins?CPopescu analogy states that public classical communication, private classical communication, and secret key interact with one another somewhat similarly to the way that classical communication, quantum communication, and entanglement interact. This paper discusses the information-theoretic treatment of this analogy for the case of noisy quantum channels. We determine a capacity region for a quantum channel interacting with the noiseless resources of public classical communication, private classical communication, and secret key. We then compare this region with the classical-quantum-entanglement region from our prior efforts and explicitly observe the information-theoretic consequences of the strong correlations in entanglement and the lack of a super-dense coding protocol in the public-private-secret-key setting. The region simplifies for several realistic, physically-motivated channels such as entanglement-breaking channels, Hadamard channels, and quantum erasure channels, and we are able to compute and plot the region for several examples of these channels. 相似文献
16.
A recent Quantum Private Set Intersection (QPSI) scheme is crypt-analyzed. The original claimed communication overhead is shown to be not accurate. And the original security definition is passive and not fair. To ensure fairness, a passive third party is introduced. It is also shown that unconditional fairness of QPSI protocol is impossible. Since otherwise, it would violate a well-known impossible quantum cryptography result. 相似文献
17.
Selçuk K?l?nç Author Vitae U?ur Çam Author Vitae 《Computers & Electrical Engineering》2005,31(6):391-401
A new voltage-mode filter configuration is proposed. The presented topology uses single operational transresistance amplifier (OTRA) and can realize first-order allpass, second-order allpass and notch filtering functions. The proposed circuits are insensitive to parasitic capacitances and resistances due to internally grounded input terminals of OTRA. Low output impedance of the configuration enables the circuits to be cascaded without additional buffers. The theoretical results are verified with PSPICE simulations using a CMOS realization of OTRA. Experimental work is also carried out. The feasibility of the proposed first-order allpass filter is illustrated on the design of a quadrature oscillator. 相似文献
18.
Efficient and robust shot change detection 总被引:6,自引:0,他引:6
In this article, we deal with the problem of shot change detection which is of primary importance when trying to segment and
abstract video sequences. Contrary to recent experiments, our aim is to elaborate a robust but very efficient (real-time even
with uncompressed data) method to deal with the remaining problems related to shot change detection: illumination changes,
context and data independency, and parameter settings. To do so, we have considered some adaptive threshold and derivative
measures in a hue-saturation colour space. We illustrate our robust and efficient method by some experiments on news and football
broadcast video sequences.
相似文献
Nicole VincentEmail: |
19.
Mark M. Wilde 《Quantum Information Processing》2017,16(10):264
The classical-input quantum-output (cq) wiretap channel is a communication model involving a classical sender X, a legitimate quantum receiver B, and a quantum eavesdropper E. The goal of a private communication protocol that uses such a channel is for the sender X to transmit a message in such a way that the legitimate receiver B can decode it reliably, while the eavesdropper E learns essentially nothing about which message was transmitted. The \(\varepsilon \)-one-shot private capacity of a cq wiretap channel is equal to the maximum number of bits that can be transmitted over the channel, such that the privacy error is no larger than \(\varepsilon \in (0,1)\). The present paper provides a lower bound on the \(\varepsilon \)-one-shot private classical capacity, by exploiting the recently developed techniques of Anshu, Devabathini, Jain, and Warsi, called position-based coding and convex splitting. The lower bound is equal to a difference of the hypothesis testing mutual information between X and B and the “alternate” smooth max-information between X and E. The one-shot lower bound then leads to a non-trivial lower bound on the second-order coding rate for private classical communication over a memoryless cq wiretap channel. 相似文献
20.
Multimedia Tools and Applications - Saliency in a scene describes those facets of any stimulus that makes it stand out from the masses. Saliency detection has attracted numerous algorithms in... 相似文献