透過您的圖書館登入
IP:13.59.218.147

並列摘要


When it became known that quantum computers could break the RSA (named for its creators-Rivest. Shamir, and Adleman) encrypt ion algorithm within a polynomial-time, quantum cryptography began to he actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between commnunicators have been proposed. providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not he simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can he used for classical encryption after the authentication has succeeded. The proposed protocol can he implemented with the current technologies we introduce in tins paper.

被引用紀錄


Chen, T. Y. (2015). 基於虛擬水與沙之二維數位藝術創作系統 [master's thesis, National Chiao Tung University]. Airiti Library. https://doi.org/10.6842/NCTU.2015.00875
劉政旻 (2011). 鑲嵌固體且具不可延展特性的布料模擬 [master's thesis, National Chiao Tung University]. Airiti Library. https://doi.org/10.6842/NCTU.2011.00585
Chen, L. N. (2015). 刺激應答靜電紡絲奈米纖維之製備、結構分析及感測應用 [doctoral dissertation, National Taiwan University]. Airiti Library. https://doi.org/10.6342/NTU.2015.00093
Chang, K. W. (2011). 利用1993年至2009年台灣強震網(TSMIP)波形資料逆推點源地震矩 [master's thesis, National Taiwan University]. Airiti Library. https://doi.org/10.6342/NTU.2011.01656
Lin, T. S. (2010). 量子間接通訊之安全傳遞機制 [doctoral dissertation, National Taiwan University]. Airiti Library. https://doi.org/10.6342/NTU.2010.03179

延伸閱讀