咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Quantum Authentication Based o... 收藏

Quantum Authentication Based on the Lengthened String Scheme

Quantum Authentication Based on the Lengthened String Scheme

作     者:GUO Fen-zhuo~(1,2), WEN Qiao-yan~1, ZHU Fu-chen~3 1.School of Science, Beijing University of Posts and Telecommunications, Beijing 100876, P.R. China 2.State Key Laboratory of Integrated Services Network, Xidian University, Xi’an 710071, P.R. China 3.National Laboratory for Secure Communication, Chengdu 610041, P.R. China 

作者机构:School of Science Beijing University of Posts and Telecommunications Beijing 100876 P.R. China State Key Laboratory of Integrated Services Network Xidian University Xi'an 710071 P.R. China School of Science Beijing University of Posts and Telecommunications Beijing 100876 P.R. China National Laboratory for Secure Communication Chengdu 610041 P.R. China 

出 版 物:《The Journal of China Universities of Posts and Telecommunications》 (中国邮电高校学报(英文版))

年 卷 期:2004年第11卷第Z1期

页      面:14-17,25页

核心收录:

学科分类:11[军事学] 1105[军事学-军队指挥学] 0839[工学-网络空间安全] 08[工学] 110505[军事学-密码学] 110503[军事学-军事通信学] 

基  金:theNationalNaturalScienceFoundationofChina(No.60 3730 59) alsosupportedbyNationalLaboratoryforSecureCommunicationScienceFoundationofChina (No.51 4 360 2 0 1 0 3DZ40 0 1 ) ,andISNOpenFoundation 

主  题:quantum cryptography quantum authentication quantum key distribution LSS 

摘      要:Assuming there is a shared string between the users, we present a novel scheme, the lengthened string scheme (LSS), where the shared string is lengthened firstly by a specially designed algorithm, then some special treatments are applied on the lengthened one before it is used to authenticate. Based on the lengthened string scheme (LSS) we propose a quantum authentication protocol using entanglements. And the robustness of our protocol is discussed. In fact all the quantum key distribution protocols can do identification simultaneously based on the LSS.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分