Entity

Time filter

Source Type


Qin S.-J.,Beijing University of Posts and Telecommunications | Gao F.,Beijing University of Posts and Telecommunications | Wen Q.-Y.,Beijing University of Posts and Telecommunications | Zhu F.-C.,National Laboratory for Modern Communications
Optics Communications | Year: 2010

The security of quantum secure direct communication by entangled qutrits and entanglement swapping [Y.B. Zhan et al., Opt. Commun. 282 (2009) 4633] is analyzed. It is shown that an eavesdropper can obtain all the secret without being found by a simple intercept-and-resend attack. Finally, a possible improvement to resist this attack is proposed. © 2009 Elsevier B.V. All rights reserved.


Gao F.,Beijing University of Posts and Telecommunications | Qin S.-J.,Beijing University of Posts and Telecommunications | Wen Q.-Y.,Beijing University of Posts and Telecommunications | Zhu F.-C.,National Laboratory for Modern Communications
Optics Communications | Year: 2010

We analyze the security of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger (GHZ) state. It is shown that the receiver, using a special property of GHZ state, can illegally obtain 33.3% of the sender's secret without any controller's permission. The attack strategy is demonstrated in detail and an improvement of this protocol is discussed. The idea of this attack might be instructive for the cryptanalysis of quantum cryptographic protocols. © 2009 Elsevier B.V. All rights reserved.


Sun Y.,Beijing University of Posts and Telecommunications | Sun Y.,Xidian University | Wen Q.-y.,Beijing University of Posts and Telecommunications | Zhu F.-c.,National Laboratory for Modern Communications
Optics Communications | Year: 2010

The security of the multiparty quantum secret sharing protocol presented by Zhang [Z.J. Zhang, Physica A, 361 (2006) 233] is analyzed. It is shown that this protocol is vulnerable to the insider attack since eavesdropping detection is performed only when all states arrive at the last agent. We propose an attack strategy and give an improved version of the original protocol. The improved protocol is robust and has the same traits with the original one. © 2009 Elsevier B.V. All rights reserved.


Huang W.,Beijing University of Posts and Telecommunications | Guo F.-Z.,Beijing University of Posts and Telecommunications | Huang Z.,Beijing University of Posts and Telecommunications | Wen Q.-Y.,Beijing University of Posts and Telecommunications | Zhu F.-C.,National Laboratory for Modern Communications
Optics Communications | Year: 2011

The research on decoherence-free subspace has both theoretical and practical significance. DFS is a subspace of quantum system states which is robust against a specific form of decoherence. The method of constructing DFS based algebra, which is different from the way based on the special Bell states, is introduced. Then a three-particle QKD protocol against collective-bit flipping noise is presented according to this method. Finally, we make a security analysis of our protocol. © 2010 Elsevier B.V. All rights reserved.


Wang T.-Y.,Beijing University of Posts and Telecommunications | Wang T.-Y.,Luoyang Normal University | Wen Q.-Y.,Beijing University of Posts and Telecommunications | Zhu F.-C.,National Laboratory for Modern Communications
Optics Communications | Year: 2011

The security of multiparty quantum secret sharing with Bell states and Bell measurements [R.H. Shi et al., Opt. Commun. 283 (2010) 2476] is analyzed. It is shown that the first agent and the last one can gain access to the dealer's secret if they collaborate in this protocol. Therefore, this protocol does not satisfy the security requirement of quantum secret sharing. © 2010 Elsevier B.V. All rights reserved.

Discover hidden collaborations