期刊文献+

一种基于改进乒乓协议的量子隐写术 被引量:2

A Quantum Steganography Based on Improved Bostrm-Felbinger Protocol
下载PDF
导出
摘要 为降低噪声对秘密信息传输效率的影响,提出一种基于改进乒乓协议的量子隐写协议。利用量子纠缠的特性,通过受控非门实现秘密信息传输。以嵌入过秘密信息的粒子作为载体协议的初始粒子,在执行载体协议步骤的同时传输秘密信息。分析结果表明,该协议具有较好的抗噪声稳健性、隐蔽性和安全性。 In order to reduce the influence of noise on the efficiency of secret information transmission,a quantum steganographic protocol based on Improved Bostr m-Felbinger protocol(IBF)is proposed.The protocol effectively utilizes the characteristics of quantum entanglement and realizes secret information transmission by Controlled non gate(CNOT gate).Among them,the particle embedded with secret information is used as the initial particle of carrier protocol to transmit secret information while executing carrier protocol steps.Analysis results show that the protocol has better anti-noise robustness,concealment and security.
作者 王金伟 朱天成 瞿治国 WANG Jinwei;ZHU Tiancheng;QU Zhiguo(Jiangsu Engineering Center of Network Monitoring,Nanjing 210044,China;School of Computer and Software,Nanjing University of Information Science and Technology,Nanjing 210044,China)
出处 《计算机工程》 CAS CSCD 北大核心 2018年第12期18-22,共5页 Computer Engineering
基金 国家自然科学基金(61772281 61272421)
关键词 量子隐写术 改进乒乓协议 受控非门 BELL态 量子纠缠 抗噪声稳健性 quantum steganography Improved Bostr m-Felbinger protocol(IBF) Controlled non gate(CNOT gate) Bell state quantum entanglement anti-noise robustness
  • 相关文献

参考文献7

二级参考文献28

  • 1[1] SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22:612~613. 被引量:1
  • 2[2] BLAKLEY G R.Safeguarding cryptographic keys[A].Proc AFIPS 1979 National Computer Conference[C].1979.313~317. 被引量:1
  • 3[3] SCHNEIER B.Applied Cryptography[M].John Wiley & Sons,Inc,1994. 被引量:1
  • 4[4] STINSON D R.Decomposition constructions for secret sharing schemes[J].IEEE Trans on Inform Theory,1994, 40:118~125. 被引量:1
  • 5[5] LAIH C-S,HARN L,LEE J Y,et al.Dynamic threshold scheme based on the definition of cross-product in an N-dimensional linear space[A].Proc Crypto'89[C].1990.286~297. 被引量:1
  • 6[6] BEIMEL A,CHOR B.Secret sharing with public reconstruction[A].Advances in Cryptology-Crypto'95[C].1995.353~366. 被引量:1
  • 7[7] BLUNDO C,GRESSTI A,SANTIS A D,et al.Fully dynamic secret sharing schemes[A].Proc Crypto'93[C].1994.110~125. 被引量:1
  • 8[8] BLUNDO C,SANTIS A D,CRESCENZO G D,et al.Multi-secret sharing schemes[A].Proc Crypto'94[C].1994.150~163. 被引量:1
  • 9Schneier B 吴世忠(译).应用密码学[M].北京:机械工业出版社,2000.. 被引量:11
  • 10A Shamir.How to share a secret[J].Communications of the ACM,1979,22(11):612-613. 被引量:1

共引文献144

同被引文献19

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部