首页> 外文期刊>Modern Physics Letters, B. Condensed Matter Physics, Statistical Physics, Applied Physics >Comment on 'Cryptanalysis and improvement of multiparty semiquantum secret sharing based on rearranging orders of qubits'
【24h】

Comment on 'Cryptanalysis and improvement of multiparty semiquantum secret sharing based on rearranging orders of qubits'

机译:评论“基于重新排列QUBITS重新排列的多派半核心分享的密码分析与改进”

获取原文
获取原文并翻译 | 示例
           

摘要

Recently, Yin and Fu(1) pointed out that Gao et al.'s multiparty semiquantum secret sharing scheme(2) is vulnerable to their proposing attack strategy (hereafter called the YF attack). However, in this paper, we comment that the YF attack fails to attack Gao et al.'s scheme. Next, let us give a brief description of the YF attack which is implemented by the two dishonest agents, Bob(m-i) and Bob(m-1) which is as follows: Step 1. After receiving t sequence,(3,4) Bob(m-i) selects (5 qubits in each group and tells Bob(m), the positions of selected qubits and the rearranging orders(5) of qubit t. Step 2. After Bob?, receives t sequence from Bob,n_i, he rearranges orders of qubit t in each group and uses the Z basis to measure it. Next, Bob(m), prepares fresh qubits in the same states that he obtained after measuring, and inserts the prepared fresh qubits into the positions of measured qubits. Obviously, the fresh qubits form a fake t sequence and Bob(m), entirely knows the states of qubits in the fake t sequence. Then he sends the fake t sequence to Alice. Step 3. After receiving the sequence, Alice picks out K groups in N groups to check eavesdropping. She requires Bob(1), Bob(2),, Bob(m), to publish the rearranged orders of qubit tin each K group and qubit t is measured. When Bob(m), publishes the measured qubits t,
机译:最近,尹和福(1)指出了高级半核心分享计划(2)易受他们提出的攻击战略(以下称为YF攻击)。但是,在本文中,我们评论YF攻击无法攻击高电平。的计划。接下来,让我们介绍由两个不诚实的药剂,鲍勃(Mi)和鲍勃(M-1)实现的YF攻击的简要说明,如下:步骤1.接受T序列后,(3,4) Bob(MI)选择(每个组中的5个QUBits,并告诉Bob(M),所选QUBITS的位置和Qubit T的重新安排订单(5)。步骤2.在鲍勃2之后,从Bob,N_I接收T序列,他重新排列每个组中的Qubit T的订单,并使用Z基础来测量它。接下来,鲍勃(M),在测量后的同一状态下准备新的Qubits,并将准备的新鲜距离插入测量Qubits的位置。显然,新鲜的Qubits形成假T序列和鲍勃(M),完全了解假T序列中的Qubits状态。然后他向Alice发送假T序列。步骤3.在收到序列后,Alice挑选出K. N组中的组来检查窃听。她需要Bob(1),Bob(2),, Bob(M),以发布Qubit TiN的重新排列的Qubit k组和qubit t测量。当Bob(m)时,发布测量的Qubits T,

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号