eavesdropping detection
Recently Published Documents


TOTAL DOCUMENTS

10
(FIVE YEARS 3)

H-INDEX

4
(FIVE YEARS 1)

Entropy ◽  
2022 ◽  
Vol 24 (1) ◽  
pp. 111
Author(s):  
Dianjun Lu ◽  
Zhihui Li ◽  
Jing Yu ◽  
Zhaowei Han

In this paper, we present a verifiable arbitrated quantum signature scheme based on controlled quantum teleportation. The five-qubit entangled state functions as a quantum channel. The proposed scheme uses mutually unbiased bases particles as decoy particles and performs unitary operations on these decoy particles, applying the functional values of symmetric bivariate polynomial. As such, eavesdropping detection and identity authentication can both be executed. The security analysis shows that our scheme can neither be disavowed by the signatory nor denied by the verifier, and it cannot be forged by any malicious attacker.


2021 ◽  
Vol 21 (7&8) ◽  
pp. 563-576
Author(s):  
Yuan Tian ◽  
Jian Li ◽  
Kai-Guo Yuan ◽  
Chao-Yang Li ◽  
Heng-Ji Li ◽  
...  

Quantum key distribution cannot satisfy some users without quantum capability, so semi-quantum key distribution emerges as the times required. Semi-quantum key distribution protocol is described as Alice has quantum ability to prepare and measure qubits with an arbitrary basis, while Bob only measures qubits with the computational basis or reflects qubits to Alice. However, most existing semi-quantum key distribution protocols have been performed with low eavesdropping detection probability. In this paper, we present an innovative semi-quantum key distribution protocol with high efficiency based on EPR and single-particle hybridization, in which the specific contents of {\scriptsize CTRL} or {\scriptsize SIFT} operations have been newly defined. Then, the security analysis indicates the proposed protocol is asymptotically secure with more high eavesdropping detection probability against individual eavesdropping attacks. Moreover, the efficiency analysis shows that the presented protocol is more efficient than similar literatures.


Electronics ◽  
2019 ◽  
Vol 8 (2) ◽  
pp. 146 ◽  
Author(s):  
Li Xu ◽  
Jiaqi Chen ◽  
Ming Liu ◽  
Xiaoyi Wang

The increasing Internet-of-Things (IoT) applications will take a significant share of the services of the fifth generation mobile network (5G). However, IoT devices are vulnerable to security threats due to the limitation of their simple hardware and communication protocol. Massive multiple-input multiple-output (massive MIMO) is recognized as a promising technique to support massive connections of IoT devices, but it faces potential physical layer breaches. An active eavesdropper can compromises the communication security of massive MIMO systems by purposely contaminating the uplink pilots. According to the random matrix theory (RMT), the eigenvalue distribution of a large dimensional matrix composed of data samples converges to the limit spectrum distribution that can be characterized by matrix dimensions. With the assistance of RMT, we propose an active eavesdropping detection method in this paper. The theoretical limit spectrum distribution is exploited to determine the distribution range of the eigenvalues of a legitimate user signal. In addition the noise components are removed using the Marčenko–Pastur law of RMT. Hypothesis testing is then carried out to determine whether the spread range of eigenvalues is “normal” or not. Simulation results show that, compared with the classical Minimum Description Length (MDL)-based detection algorithm, the proposed method significantly improves active eavesdropping detection performance.


2017 ◽  
Vol 15 (01) ◽  
pp. 1750002 ◽  
Author(s):  
Milad Nanvakenari ◽  
Monireh Houshmand

In this paper, a three-party controlled quantum secure direct communication and authentication (QSDCA) protocol is proposed by using four particle cluster states via a quantum one-time pad and local unitary operations. In the present scheme, only under the permission of the controller, the sender and the receiver can implement secure direct communication successfully. But under any circumstances, Charlie cannot obtain the secret message. Eavesdropping detection and identity authentication are achieved with the help of the previously shared reusable base identity strings of users. This protocol is unconditionally secure in both ideal and practical noisy cases. In one transmission, a qubit of each four particle cluster state is used as controller’s permission and the same qubit with another qubit are used to recover two classical bits of information. In the proposed scheme, the efficiency is improved compared with the previous works.


2015 ◽  
Vol 21 (2) ◽  
pp. 107-112
Author(s):  
何敏 HE Min ◽  
王衍波 WANG Yan-bo ◽  
朱勇 ZHU Yong ◽  
徐智勇 XU Zhi-yong ◽  
张志永 ZHANG Zhi-yong

1985 ◽  
Vol 112 ◽  
pp. 335-339
Author(s):  
Stephen H. Knowles

Detection of other civilizations by “eavesdropping” on accidental radiation from television and other self-oriented signals is proposed. One-bit spectral analysis techniques to implement this are discussed. These can utilize existing general-purpose computers, and provide flexibility of strategy in the analysis. The first derivative of doppler shift from an unknown planet can be compensated for with increased integration times possible.


Sign in / Sign up

Export Citation Format

Share Document