首页 | 本学科首页   官方微博 | 高级检索  
   检索      

基于极化单光子和量子计算的量子秘密共享
引用本文:王伟,李宏欣.基于极化单光子和量子计算的量子秘密共享[J].国防科技大学学报,2011,33(5):167-170.
作者姓名:王伟  李宏欣
作者单位:解放军外国语学院基础部,河南洛阳,471003
基金项目:国家自然科学基金资助项目(60403004)
摘    要:结合量子计算算子提出一种基于极化单光子的量子秘密共享协议.该方案可以将全部量子态用于密钥共享,借助量子置换算子和量子纠缠特性证明了方案能够有效抵抗中间人攻击,利用辅助量子态进行监视,方案能够以高概率检测特洛伊木马攻击.通过对置换算子进行高维推广,证明了方案推广到(n,n)的可行性和实用性.

关 键 词:量子秘密共享  置换算子  极化单光子  中间人攻击  特洛伊木马攻击
收稿时间:2010/11/25 0:00:00

A Quantum Secret Sharing Scheme Based on Polarized Single Photons and Quantum Computation
WANG Wei and LI Hongxin.A Quantum Secret Sharing Scheme Based on Polarized Single Photons and Quantum Computation[J].Journal of National University of Defense Technology,2011,33(5):167-170.
Authors:WANG Wei and LI Hongxin
Institution:WANG Wei,LI Hong-xin(Department of Basis,PLA University of Foreign Languages,Luoyang 471003,China)
Abstract:With the help of quantum computation operator,a quantum secret sharing scheme based on polarized single photons is proposed.Efficiency analysis indicates that all qubits can be used in the secret sharing.With the permutation operator and quantum entanglement,the protocol can resist the middleman attack effectively.By using the auxiliary qubit,the protocol can detect the Trojan horse attack with high probability.The extension of the permutation operator shows the scheme which contains n pairs is feasible and...
Keywords:quantum secret sharing  permutation operator  polarized single photons  middleman attack  Trojan horse attack  
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《国防科技大学学报》浏览原始摘要信息
点击此处可从《国防科技大学学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号