引用本文: | 王伟,李宏欣.基于极化单光子和量子计算的量子秘密共享.[J].国防科技大学学报,2011,33(5):167-170.[点击复制] |
WANG Wei,LI Hongxin.A Quantum Secret Sharing Scheme Based on Polarized Single Photons and Quantum Computation[J].Journal of National University of Defense Technology,2011,33(5):167-170[点击复制] |
|
|
|
本文已被:浏览 6518次 下载 6350次 |
基于极化单光子和量子计算的量子秘密共享 |
王伟, 李宏欣 |
(解放军外国语学院 基础部,河南 洛阳 471003)
|
摘要: |
结合量子计算算子提出一种基于极化单光子的量子秘密共享协议。该方案可以将全部量子态用于密钥共享,借助量子置换算子和量子纠缠特性证明了方案能够有效抵抗中间人攻击,利用辅助量子态进行监视,方案能够以高概率检测特洛伊木马攻击。通过对置换算子进行高维推广,证明了方案推广到(n, n)的可行性和实用性。 |
关键词: 量子秘密共享 置换算子 极化单光子 中间人攻击 特洛伊木马攻击 |
DOI: |
投稿日期:2010-11-25 |
基金项目:国家自然科学基金资助项目(60403004) |
|
A Quantum Secret Sharing Scheme Based on Polarized Single Photons and Quantum Computation |
WANG Wei, LI Hongxin |
(Department of Basis, PLA University of Foreign Languages, Luoyang 471003, China)
|
Abstract: |
With the help of quantum computation operator, a quantum secret sharing scheme based on polarized single photons is proposed. Efficiency analysis indicates that all qubits can be used in the secret sharing. With the permutation operator and quantum entanglement, the protocol can resist the middleman attack effectively. By using the auxiliary qubit, the protocol can detect the Trojan horse attack with high probability. The extension of the permutation operator shows the scheme which contains n pairs is feasible and applicable. |
Keywords: quantum secret sharing permutation operator polarized single photons middleman attack Trojan horse attack |
|
|