咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >A Controlled Quantum Dialogue ... 收藏

A Controlled Quantum Dialogue Protocol Based on Quantum Walks

作     者:Jinqiao Dai Shibin Zhang Yan Chang Xueyang Li Tao Zheng Jinyue Xia 

作者机构:Chengdu University of Information TechnologyChengdu610225China International Business Machines Corporation(IBM)New York10421USA 

出 版 物:《Computers, Materials & Continua》 (计算机、材料和连续体(英文))

年 卷 期:2020年第64卷第8期

页      面:1247-1260页

核心收录:

学科分类:0831[工学-生物医学工程(可授工学、理学、医学学位)] 0808[工学-电气工程] 0809[工学-电子科学与技术(可授工学、理学学位)] 07[理学] 0805[工学-材料科学与工程(可授工学、理学学位)] 070201[理学-理论物理] 0701[理学-数学] 0801[工学-力学(可授工学、理学学位)] 0812[工学-计算机科学与技术(可授工学、理学学位)] 0702[理学-物理学] 

基  金:This work is supported by the National Natural Science Foundation of China(Nos.61572086 and 61402058) the Key Research and Development Project of Sichuan Province(Nos.20ZDYF2324,2019ZYD027 and 2018TJPT0012) the Innovation Team of Quantum Security Communication of Sichuan Province(No.17TD0009) the Academic and Technical Leaders Training Funding Support Projects of Sichuan Province(No.2016120080102643) the Application Foundation Project of Sichuan Province(No.2017JY0168) the Science and Technology Support Project of Sichuan Province(Nos.2018GZ0204 and 2016FZ0112) 

主  题:Quantum cryptography controlled quantum dialogue quantum walks quantum teleportation 

摘      要:In order to enable two parties to exchange their secret information equally,we propose a controlled quantum dialogue protocol based on quantum walks,which implements the equal exchange of secret information between the two parties with the help of the controller *** secret information is transmitted via quantum walks,by using this method,the previously required entangled particles do not need to be prepared in the initial phase,and the entangled particles can be produced spontaneously via quantum ***,to resist TP’s dishonest behavior,we use a hash function to verify the correctness of the secret *** protocol analysis shows that it is safe and reliable facing some attacks,including intercept-measure-resend attack,entanglement attack,dishonest controller’s attack and participant *** has a slightly increasing efficiency comparing with the previous *** that the proposed protocol may be feasible because quantum walks prove to be implemented in different physical systems and experiments.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分