检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:YANG YuGuang1,2,WEN QiaoYan3 & ZHANG Xing4,5 1 College of Computer Science and Technology,Beijing University of Technology,Beijing 100022,China 2 State Key Laboratory of Information Security (Graduate University of the Chinese Academy of Sciences),Beijing 100049,China 3 School of Science,Beijing University of Posts and Telecommunications,Beijing 100876,China 4 Institute of Electronic Technology,Information Engineering University,Zhengzhou 450004,China 5 Trusted Computing Laboratory,Beijing University of Technology,Beijing 100022,China
出 处:《Science China(Physics,Mechanics & Astronomy)》2008年第3期321-327,共7页中国科学:物理学、力学、天文学(英文版)
基 金:the National Basic Research Program of China (973 Program) (Grant No. 2007CB311100);the National High Technology Research and Development Program of China (Grant Nos. 2006AA01Z419 and 20060101Z4015);the Major Research Plan of the National Natural Science Foundation of China (Grant No. 90604023);the Scientific Research Common Program of Beijing Municipal Commission of Education (Grant No. KM200810005004);the Scientific Research Foundation for the Youth of Beijing University of Technology (Grant No. 97007016200701);the National Research Foundation for the Doctoral Program of Higher Education of China (Grant No. 20040013007);the National Laboratory for Modern Communications Science Foundation of China (Grant No. 9140C1101010601);the Doctor Scientific Research Activation Foundation of Beijing University of Technology (Grant No. 52007016200702)
摘 要:Two multiparty simultaneous quantum identity authentication (MSQIA) protocols based on secret sharing are presented. All the users can be authenticated by a trusted third party (TTP) simultaneously. In the first protocol,the TTP shares a random key K with all the users using quantum secret sharing. The ith share acts as the authentication key of the ith user. When it is necessary to perform MSQIA,the TTP generates a random number R secretly and sends a sequence of single photons encoded with K and R to all the users. According to his share,each user performs the corresponding unitary operations on the single photon sequence sequentially. At last,the TTP can judge whether the impersonator exists. The sec-ond protocol is a modified version with a circular structure. The two protocols can be efficiently used for MSQIA in a network. They are feasible with current technol-ogy.Two multiparty simultaneous quantum identity authentication (MSQIA) protocols based on secret sharing are presented. All the users can be authenticated by a trusted third party (TTP) simultaneously. In the first protocol, the TTP shares a random key K with all the users using quantum secret sharing. The ith share acts as the authentication key of the ith user. When it is necessary to perform MSQIA, the TTP generates a random number R secretly and sends a sequence of single photons encoded with K and R to all the users. According to his share, each user performs the corresponding unitary operations on the single photon sequence sequentially. At last, the TTP can judge whether the impersonator exists. The second protocol is a modified version with a circular structure. The two protocols can be efficiently used for MSQIA in a network. They are feasible with current technology.
关 键 词:QUANTUM IDENTITY authentication SECRET SHARING QUANTUM CRYPTOGRAPHY
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.15