完美量子封印的攻击策略(英文)
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:An Attack Strategy for the Perfect Quantum Seal
  • 作者:黄江 ; 詹强 ; 林妹平 ; 王世洪 ; 黄荣 ; 巫慧娴
  • 英文作者:HUANG Jiang;ZHAN Qiang;LIN Meiping;WANG Shihong;HUANG Rong;WU Huixian;College of Electronics and Information Engineering,Guangdong Ocean University;
  • 关键词:量子封印 ; 攻击策略 ; 窃听
  • 英文关键词:quantum seals;;attack strategy;;wiretap
  • 中文刊名:JSDN
  • 英文刊名:Journal of Jishou University(Natural Sciences Edition)
  • 机构:广东海洋大学电子与信息工程学院;
  • 出版日期:2019-01-25
  • 出版单位:吉首大学学报(自然科学版)
  • 年:2019
  • 期:v.40;No.143
  • 基金:Natural Science Foundation of Guangdong Province(2015A030310354);; Enhancing School with Innovation of Guangdong Ocean University(GDOU2017052504);Enhancing School with Innovation of Guangdong Ocean University(GDOU2016050220,CXXL2016080,CXXL2017127,CXXL2018177);; Innovative Young Talents of Guangdong Province Education Department(2015KQNCX059);; Excellent-Young-Backbone Teacher of Guangdong Ocean University(HDYQ2017005)
  • 语种:英文;
  • 页:JSDN201901010
  • 页数:5
  • CN:01
  • ISSN:43-1253/N
  • 分类号:44-48
摘要
提出了一个完美量子封印的攻击策略,利用该策略能成功逃脱系统的监测.构造2个完整的项目操作符,在没有给定基础的情况下可以解码密封消息,并擦除窃听动作.攻击策略在测量过程前后都没有带来任何变化.
        For a perfect quantum seals,an attack strategy is found,which can escape detection successfully.By constructing two complete project operators,the sealing message can be decoded without the given basis and the wiretap action can be erased.The attack strategy does not bring any change before and after the measure process.
引文
[1]BREUER HEINZ-PETER,PETRUCCIONE FRANCESCO.The Theory of Open Quantum Systems[M].Oxford:Oxford University Press,2007:30-39.
    [2]BENNETT C H,FUCHS C A,SMOLIN J A.Communication,Computing and Measurement[M].Oxford:Oxford University Press,1980:132-136.
    [3]HE Guangping.Quantum Information Made Easy[M].Beijing:Science Press,2012:82-89.
    [4]BENNETT CHARLES,BRASSARD GILLES.Quantum Cryptography:Public Key Distribution and Coin Tossing[C].Proceedings of the IEEE International Conference on Computers,System and Signal Processing.Bangalore,1984:175-179.
    [5]BENNETT CHARLLES H,BRASSARD GILLES,JOZSA RICHARD,et al.Reduction of Quantum Entropy by Reversible Extraction of Classical Information[J].Journal of Modern Optics,1993,41(12):2 307-2 314.
    [6]HSU JUNG-LUN,CHONG SONG-KONG,HWANG TZONELIH,et al.Dynamic Quantum Secret Sharing[J].Quantum Information Processing,2013,12(1):331344.
    [7]SINGH SUDHIR KUMAR,SRIKANTH R.Quantum Seals[J].Physica Scripta,2005,71(5):433-435.
    [8]HE Guangping.Upper Bounds of a Class of Imperfect Quantum Sealing Protocols[J].Physical Review A,2005,71:362-366.
    [9]PEGRAM LAUREL M,RECORD M THOMAS.Thermodynamic Origin of Hofmeister Ion Effects[J].Journal of Physical Chemistry B,2008,112(31):9 428-9 436.
    [10]CHAU H F.Reply to"Comment on'Quantum String Seal is Insecure'"[J].Physical Review A,2007,76(5):Article ID056 302.
    [11]HE Guangping.Quantum Bit Commitment is Weaker Than Quantum Bit Seals[J].European Physical Journal D,2014,68(5):1-7.
    [12]HE G P,WANG Z D,BAI Y K.Quantum Secret Sharing Based on Smolin States Alone[J].Journal of Physics A:Mathematical&Theoretical,2008,41(41):3 958-3 964.
    [13]PANG Shengshi,WU Shengjun.Comparison of Mixed Quantum States[J].Physical Review A,2011,84(1):911-916.
    [14]ZHANG Sheng,WANG Jian,TANG Chaojing.Security Proof of Counterfactual Quantum Cryptography Against General Intercept-Resend Attacks and Its Vulnerability[J].Chinese Physics B,2012,21(6):33-40.
    [15]WEI Jianqiang,ZHANG Zhaoqi,HAN Rui,et al.Microwave Reflection Properties of Planar Anisotropy Fe50Ni50Powder/Paraffin Composites[J].Chinese Physics B,2012,21(3):Article ID 037 601.
    [16]YU Lizhi,SUN Shaoxin.Teleportation of Three-Qubit State via Six-Qubit Cluster State[J].International Journal of Theoretical Physics,2015,54(5):1 600-1 603.
    [17]CHENG Rongjun,GE Hongxia.Element-Free Galerkin(EFG)Method for a Kind of Two-Dimensional Linear Hyperbolic Equation[J].Chinese Physics B,2009,18(10):4 059-4 064.
    [18]YIN Zhenqiang,LI Hongwei,YAO Yao,et al.Counterfactual Quantum Cryptography Based on Weak Coherent States[J].Physical Review A,2012,86(2):Article ID 022 313.
    [19]SUN Shihai,JIANG Musheng,LIANG Linmei.Single-Photon-Detection Attack on the Phase-Coding Continuous-Variable Quantum Cryptography[J].Physical Review A,2013,86(1):4 916-4 926.
    [20]WEI Huang,WEN Qiaoyan,LIU Bin,et al.Quantum Key Agreement with EPR Pairs and Single-Particle Measurements[J].Quantum Information Processing,2014,13(3):649-663.
    [21]LUO Yi,ZHAO Zhiwen,ZHAO Zhangji,et al.The Loophole of the Improved Secure Quantum Sealed-Bid Auction with Post-Confirmation and Solution[J].Quantum Information Processing,2013,12(1):295-302.