We present a (t, .n) threshold multiparty controlled quantum teleportation protocol of an arbitrary m-qubit quantum state between two remote parties. The unknown m-qubit quantum state can be recovered by the receive...
详细信息
We present a (t, .n) threshold multiparty controlled quantum teleportation protocol of an arbitrary m-qubit quantum state between two remote parties. The unknown m-qubit quantum state can be recovered by the receiver under control of a subset of the n controllers if the number of the subset is larger than or equal to a threshold, say, t, but not for any t - 1 or fewer controllers. Our scheme seems to be more practical and more flexible than other existing protocols. The quantum resource required is just m Einstein-Podolsky-Rosen (EPR) pairs plus some single photons. The techniques required are only Bell state measurement, single-qubit unitary operation and yon Neumann measurement. So our scheme is also feasible with present-day technique.
For stream ciphers which use binary linear feedback shift registers as stream generators, fast correlation attack is one of the most important attacks. Aiming at the shortcomings of serial algorithm, the proposed tech...
详细信息
ISBN:
(纸本)9780769537443
For stream ciphers which use binary linear feedback shift registers as stream generators, fast correlation attack is one of the most important attacks. Aiming at the shortcomings of serial algorithm, the proposed technique is based on parallel computing. This kind of attack divides the initial state into several parts, uses multiprocessor to recover all parts of the initial state synchronously. Comparing with previous results, this kind of attack shows low complexity and high attack efficiency.
Identity-based cryptosystem has a property that a user's public key can be easily calculated from his identity by a publicly available function, and can be hence a good alternative for certificate-based public key...
详细信息
In a group signature scheme, a group member signs messages anonymously on behalf of the group. However, in the case of a dispute, the actual group signer's identity can be revealed by a designated entity. In this ...
详细信息
Shamir proposed the first (t, n) threshold secret sharing scheme. Shamir's scheme is ideal and perfect. In this paper, we propose two modifications of Shamir's secret sharing scheme. In our first modification,...
详细信息
Quantum secret sharing (QSS) which is based on the laws of quantum mechanics, instead of mathematical assumptions can share the information unconditionally securely, according to the form of sharing information, quant...
详细信息
Quantum secret sharing (QSS) which is based on the laws of quantum mechanics, instead of mathematical assumptions can share the information unconditionally securely, according to the form of sharing information, quantum secret sharing can be divided into QSS of classical messages and QSS of quantum information, QSS of classical messages can be divided into QSS of classical messages based on entanglement and QSS of classical messages without entanglement, the representative protocols in three main branches of the quantum secret sharing schemes and its latest development were introduced, also prospect analysis of the schemes' future development was given.
In this paper, by converse using blind signature, we propose a practical electronic payment scheme for electronic commerce. This scheme is different from the existing schemes used widely in the internet at present and...
详细信息
With the increasing requirement of resource sharing, security has become a crucial item of application system. In order to improve the secure assurance of resource sharing, many researches have been carried out. Aimin...
详细信息
The differential fault attack is a kind of side channel attacks. This paper proposes a differential fault analysis on the AES key schedule and shows how an entire 128-bit AES key can be retrieved. In the workshop at F...
详细信息
Border access control, networksecurity mechanism and system access control are three separately access control procedures when user accessing the resource on network. network access control mechanism, which adding th...
详细信息
暂无评论