首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到17条相似文献,搜索用时 15 毫秒
1.
Quantum sealed-bid auction (QSA) has been widely studied in quantum cryptography. For a successful auction, post-confirmation is regarded as an important mechanism to make every bidder verify the identity of the winner after the auctioneer has announced the result. However, since the auctioneer may be dishonest and collude with malicious bidders in practice, some potential loopholes could exist. In this paper, we point out two types of collusion attacks for a particular post-confirmation technique with EPR pairs. And it is not difficult to see that there exists no unconditionally secure post-confirmation mechanism in the existing QSA model, if the dishonest participants have the ability to control multiparticle entanglement. In the view of this, we note that some secure implementation could exist if the participants are supposed to be semi-quantum, i.e., they can only control single photons. Finally, two potential methods to design post-confirmation mechanism are presented in this restricted scenario.  相似文献   

2.
A feasible, secure and collusion attack-free quantum sealed-bid auction protocol is proposed using a modified scheme for multiparty circular quantum key agreement. In the proposed protocol, the set of all (n) bidders is grouped into l subsets (sub-circles) in such a way that only the initiator (who prepares the quantum state to be distributed for a particular round of communication and acts as the receiver in that round) is a member of all the subsets (sub-circles) prepared for a particular round, while any other bidder is part of only a single subset. All n bidders and auctioneer initiate one round of communication, and each of them prepares l copies of a \(\left( r-1\right) \)-partite entangled state (one for each sub-circle), where \(r=\frac{n}{l}+1\). The efficiency and security of the proposed protocol are critically analyzed. It is shown that the proposed protocol is free from the collusion attacks that are possible on the existing schemes of quantum sealed-bid auction. Further, it is observed that the security against collusion attack increases with the increase in l, but that reduces the complexity (number of entangled qubits in each entangled state) of the entangled states to be used and that makes the scheme scalable and implementable with the available technologies. The additional security and scalability are shown to arise due to the use of a circular structure in place of a complete-graph or tree-type structure used earlier.  相似文献   

3.
This work proposes a quantum dialogue (QD) based on single photons, which not only allows two communicants to exchange their secret messages simultaneously via a one-step quantum transmission but also can confirm the message integrity. Moreover, the proposed QD protocol is free from information leakage. Compared with the previous QDs, the proposed QD protocol is more efficient. It is also secure against several well-known attacks.  相似文献   

4.
He  Li-Bao  Huang  Liu-Sheng  Yang  Wei  Xu  Rui  Han  Dian-Qi 《Quantum Information Processing》2012,11(6):1359-1369

We investigate the quantum sealed-bid auction protocol proposed by Zhao et al. (Opt Commun 283:1394, 2010). It uses M groups n-particle GHZ states to represent bids and a post-confirmation mechanism to guarantee the honesty of the quantum sealed-bid auction. However, in our opinion the protocol still does not complete the task of a sealed-bid auction fairly. It is shown that a large group of dishonest bidders can collude to obtain all the other one’s secret bids before the opening phase of the auction with a probability polynomially close to one. Moreover, a simple feasible improvement of the protocol is proposed.

  相似文献   

5.
In the literature He et?al. (Quantum Inf Process, 2011) performed the cryptanalysis about the protocol of secure quantum auction with post-confirmation, and proposed the melioration algorithm in order to defeat the collusion among some malicious bidders in Zhao et?al.??s protocol (Zhao et?al. in Opt Commun 283:3194, 2010). But unfortunately, this protocol can??t defeat the collusion among some malicious bidders either. In this paper, we will analyze the security of He et?al.??s protocol and point out the potential loophole. Furthermore, we propose an improved protocol which can defeat the collusion among malicious bidders effectively.  相似文献   

6.
Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. That is, a secure QKA protocol can not only prevent the outside attackers from stealing the key, but also resist the attack from inside participants, i.e. some dishonest participants determine the key alone by illegal means. How to resist participant attack is an aporia in the design of QKA protocols, especially the multi-party ones. In this paper we present the first secure multiparty QKA protocol against both outside and participant attacks. Further more, we have proved its security in detail.  相似文献   

7.
许盛伟  康婕 《计算机应用》2022,42(1):157-161
集体噪声对量子密码协议的影响不可忽视,然而可抵抗集体噪声的多方量子密钥协商(MQKA)协议还很少。为了抵抗集体噪声的影响,分别针对可抗集体退相位噪声的逻辑单粒子和可抗集体旋转噪声的逻辑单粒子提出了两组逻辑酉算符,使得将其作用在逻辑单粒子上后,其中两个酉算符不改变测量基,而另外两个会改变测量基。基于此性质提出一个MQKA协议。首先,每个参与者传输逻辑单粒子给下一位;然后,该逻辑单粒子经过其他所有参与者的加密重新回到这个参与者,形成一个“环形”;最后,通过测量来获取共享密钥。安全性分析证明,该协议能够抵抗截取重发攻击、纠缠测量攻击以及参与者攻击;效率分析表明,该协议具有较高的量子比特效率。  相似文献   

8.
Two efficient quantum private comparison (QPC) protocols are proposed, employing single photons and collective detection. In the proposed protocols, two distrustful parties (Alice and Bob) compare the equivalence of information with the help of a semi-honest third party (TP). Utilizing collective detection, the cost of practical realization is reduced greatly. In the first protocol, TP gains the result of the comparison. While in the second protocol, TP cannot get the comparison result. In both of our protocols, Alice and Bob only need be equipped with unitary operation machines, such as phase plates. So Alice and Bob need not to have the expensive quantum devices, such as qubit generating machine, quantum memory machine and quantum measuring machine. Security of the protocols is ensured by theorems on quantum operation discrimination.  相似文献   

9.
为进一步提高量子秘密共享协议的效率和安全性,结合量子Grove搜索算法提出一种基于极化单光子的量子秘密共享协议.效率分析结果表明,该方案可以将全部量子态用于密钥共享,理论效率为100%.在方案的安全性证明中,借助量子Grove算子和量子纠缠特性得出方案能够有效抵抗中间人攻击,同时该方案利用辅助量子态进行监视,能够以高概率检测特洛伊木马攻击.通过对Grove算子进行高维推广,证明了方案推广到(n,n)的可行性和实用性.  相似文献   

10.
We simplified our previously proposed quantum bit commitment (QBC) protocol based on the Mach–Zehnder interferometer, by replacing symmetric beam splitters with asymmetric ones. It eliminates the need for random sending time of the photons; thus, the feasibility and efficiency are both improved. The protocol is immune to the cheating strategy in the Mayers-Lo-Chau no-go theorem of unconditionally secure QBC, because the density matrices of the committed states do not satisfy a crucial condition on which the no-go theorem holds.  相似文献   

11.
研制了一种新的可更新荧光免疫流动体系用于补体3(C3)的测定.用纳米TiO2颗粒为固定抗体的载体,辣根过氧化物酶标记C3(HRP-C3),以HRP-C3与待测C3发生竞争免疫反应.辣根过氧化物酶(HRP)催化荧光底物3,3'5,5'-四甲基联苯胺(TMB)转化为无荧光物质,待测C3的浓度可由底物溶液的荧光降低值间接测定.通过简单的处理后,固定抗体的载体表面可以得到有效的再生.荧光响应与C3补体在6.5μg/L到75μg/L之间呈准线性关系.该方法检测限较低,重复性好,可满足临床检测的要求.  相似文献   

12.
以6-甲氧基-β-(5-乙烯基-2-奎宁环基)-4-喹啉甲醇(奎尼丁,Qd)为单体合成了一种pH敏感荧光高分子聚N-异丙基丙烯酰胺(NIP)-奎尼丁-N,N,-二甲基氨丙基甲基丙烯酰胺(DMAPM)[P(NIP-DMAPM-Qd)].采用共聚法将布氏杆菌抗原(BrAg)与P(NIP-DMAPM-Qd)连接,制备了P(N...  相似文献   

13.
We study use of non-maximally entangled states (NME) in quantum teleportation (QT) of single qubit. We find that if NME states are written in the form ${| E \rangle =\sum_{j,k} {E_{jk} | j \rangle | k \rangle}}$ , where (j, k) = 0 and 1, and maximally entangled Bell-basis is used in measurement by the sender, the ??Minimum Assured Fidelity?? (the minimum value of fidelity for all possible information states) for QT is 2C/(1?+?C), where C is the concurrence of ${| E \rangle }$ given by C?=?2|det (E)| and E is the matrix defined by the coefficients E jk . We also find the average of fidelity over various results of Bell-state measurement and its minimum value over all possible information states and discuss it for some special cases. We also show that, to evaluate quality of imperfect QT, minimum assured fidelity is a better measure than concurrence or minimum average fidelity.  相似文献   

14.
Quantum dot (QD) functionalized graphene sheets (GS) were prepared and used as labels for the preparation of sandwich-type electrochemical immunosensors for the detection of a cancer biomarker (i.e., prostate specific antigen (PSA)). The primary anti-PSA antibody was also immobilized onto the GS. The immunosensor displayed a wide range of linear response (0.005-10 ng/mL), low detection limit (3 pg/mL), and good reproducibility, selectivity and stability. The immunosensor was used to detect PSA in patient serum samples with satisfactory results. Thus, this unique immunosensor may provide many applications in clinical diagnosis.  相似文献   

15.
We present a scheme for joint remote implementation of an arbitrary single-qubit operation following some ideas in one-way quantum computation. All the senders share the information of implemented quantum operation and perform corresponding single-qubit measurements according to their information of implemented operation. An arbitrary single-qubit operation can be implemented upon the remote receiver’s quantum system if the receiver cooperates with all the senders. Moreover, we study the protocol of multiparty joint remote implementation of an arbitrary single-qubit operation with many senders by using a multiparticle entangled state as the quantum channel.  相似文献   

16.
孟强  梅大成  秦勃  叶强 《微型机与应用》2012,31(17):57-59,62
为了将单片机加入到SIEMENS S7-200系列PLC的PPI(点对点协议)通信网络中,就需要分析PPI通信协议格式。本文利用CommMonitor6.0(串口监视精灵)工具,监控PLC与PLC之间的通信,通过总结分析出其数据格式,然后编写相应的单片机C51程序,使PLC能够使用NetR/NetW(网络读写命令)与单片机进行数据交换。  相似文献   

17.
A new method for the determination of lysozyme with high sensitivity based on Resonance Rayleigh scattering (RRS) by using Cd doped ZnSe quantum dots (QDs) as a probe was proposed in this experiment. Cd doped ZnSe QDs capped with glutathione were prepared in the water phase. Further, the RRS spectrum, transmission electron microscope, and absorption spectrum of the QDs-lysozyme system have been characterized. In addition, the effects of several factors on scattering intensities were investigated, including pH value of solution, amount of QDs, mixing sequence of each reagent and the coexisting substances. Moreover, the possible mechanism for the RRS enhancement of Cd doped ZnSe QDs-lysozyme system was preliminary discussed. The RRS method for the determination of lysozyme has good sensitivity with the detection limits 6.5 × 10−10 g mL−1. The contents of lysozyme were determined with recoveries of 97.1-101.6% and relativity standard deviation of 2.5-3.1%, respectively. It proved that the method established in our study is very sensitive, rapid, convenient and tolerant for the determination of lysozyme in synthetically and chicken egg white.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号