| 查看: 2199 | 回复: 1 | ||
| 本帖产生 1 个 LS-EPI ,点击这里进行查看 | ||
[求助]
求助EI检索号
|
||
|
Efficient multi-party quantum key agreement protocol based on new bell state encoding mode Zexi Li; Kefan Cheng; Yan Sun; Hongfeng Zhu DOI: 10.1504/IJICS.2024.142681 |
» 猜你喜欢
2026年申博-电池方向
已经有4人回复
2026年博士申请求捞
已经有5人回复
26年博士申请自荐-电催化
已经有9人回复
申博自荐
已经有9人回复
研究生做的很差,你们会让毕业吗?
已经有11人回复
求碳排放博导;方向是LCA、生命周期可持续发展以及碳排放
已经有7人回复
2026博士申请求助
已经有4人回复
2026博士或科研助理转27年博士
已经有7人回复
急招2026年9月份入学博士
已经有3人回复
国自科送审了吗
已经有11人回复
【答案】应助回帖
★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★
dandan413: 金币+30, ★★★★★最佳答案 2025-01-25 12:15:43
sunshan4379: LS-EPI+1, 感谢应助 2025-02-22 08:56:35
dandan413: 金币+30, ★★★★★最佳答案 2025-01-25 12:15:43
sunshan4379: LS-EPI+1, 感谢应助 2025-02-22 08:56:35
|
以下是这篇文章在EI数据库的检索信息 <RECORD 1> Accession number:20244817454237 Title:Efficient multi-party quantum key agreement protocol based on new bell state encoding mode Authors:Li, Zexi (1); Cheng, Kefan (1); Sun, Yan (1); Zhu, Hongfeng (1) Author affiliation 1) Software College, Shenyang Normal University, No. 253, Huang He Bei Street, Huang Gu District, Shenyang; 110034, China Corresponding author:Zhu, Hongfeng(zhuhongfeng1978@163.com) Source title:International Journal of Information and Computer Security Abbreviated source title:Int. J. Inf. Comput. Secur. Volume:25 Issue:1-2 Issue date:2024 Publication year:2024 Pages:18-30 Language:English ISSN:17441765 E-ISSN:17441773 Document type:Journal article (JA) Publisher:Inderscience Publishers Abstract:<div data-language="eng" data-ev-field="abstract">Although there are many quantum key agreement protocols currently in existence, they cannot be merged in terms of resource utilisation, efficiency, security, and other aspects, and there are also significant differences in the nature of two and more parties. Therefore, it is necessary to design a quantum key agreement protocol that can balance efficiency and security and is suitable for multiple participants. In view of this, this paper proposes a multi-party quantum key agreement protocol based on a new coding mode of bell state: temporary session keys are negotiated between adjacent participants, and then shared keys for all participants are negotiated through the exchange, conversion, and computation of quantum resources. During the implementation of the protocol, not only can the identity of the participants be authenticated, but also the quantum resources used are single, and the quantum operations performed are simple. Moreover, efficiency is fixed and does not decrease due to the increase of participants or quantum resources. In addition, the protocol also allows participants to dynamically join and leave. In terms of security, the protocol can resist most common quantum attacks. Under the existing quantum technology, this protocol is completely feasible.<br/></div> Copyright © 2024 Inderscience Enterprises Ltd. Number of references:25 Main heading:Authentication Protocol Controlled terms:Authentication - Encoding (symbols) - Quantum cryptography - Quantum efficiency - Quantum electronics - Quantum optics Uncontrolled terms:Bell state - Bell state encoding - Key agreement - Key agreement protocol - Multi-party - QKA - Quantum key - Quantum key agreement - Quantum resources - State encoding Classification code:1106.2 - 1106.3 - 1108.1 - 1108.2 - 1301.1.4 - 741.1 Light/Optics DOI:10.1504/IJICS.2024.142681 Database:Compendex Compilation and indexing terms, Copyright 2024 Elsevier Inc. |

2楼2024-12-20 16:58:48












回复此楼
1) Software College, Shenyang Normal University, No. 253, Huang He Bei Street, Huang Gu District, Shenyang; 110034, China