24小时热门版块排行榜    

CyRhmU.jpeg
查看: 1540  |  回复: 1
本帖产生 1 个 LS-EPI ,点击这里进行查看

dandan413

新虫 (初入文坛)

[求助] 求助EI检索号

Efficient multi-party quantum key agreement protocol based on new bell state encoding mode

Zexi Li; Kefan Cheng; Yan Sun; Hongfeng Zhu

DOI: 10.1504/IJICS.2024.142681
回复此楼
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖

泛Berlin

铜虫 (初入文坛)

【答案】应助回帖

★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★
dandan413: 金币+30, ★★★★★最佳答案 2025-01-25 12:15:43
sunshan4379: LS-EPI+1, 感谢应助 2025-02-22 08:56:35
以下是这篇文章在EI数据库的检索信息
<RECORD 1>

Accession number:20244817454237
Title:Efficient multi-party quantum key agreement protocol based on new bell state encoding mode
Authors:Li, Zexi (1); Cheng, Kefan (1); Sun, Yan (1); Zhu, Hongfeng (1)
Author affiliation1) Software College, Shenyang Normal University, No. 253, Huang He Bei Street, Huang Gu District, Shenyang; 110034, China
Corresponding author:Zhu, Hongfeng(zhuhongfeng1978@163.com)
Source title:International Journal of Information and Computer Security
Abbreviated source title:Int. J. Inf. Comput. Secur.
Volume:25
Issue:1-2
Issue date:2024
Publication year:2024
Pages:18-30
Language:English
ISSN:17441765
E-ISSN:17441773
Document type:Journal article (JA)
Publisher:Inderscience Publishers
Abstract:<div data-language="eng" data-ev-field="abstract">Although there are many quantum key agreement protocols currently in existence, they cannot be merged in terms of resource utilisation, efficiency, security, and other aspects, and there are also significant differences in the nature of two and more parties. Therefore, it is necessary to design a quantum key agreement protocol that can balance efficiency and security and is suitable for multiple participants. In view of this, this paper proposes a multi-party quantum key agreement protocol based on a new coding mode of bell state: temporary session keys are negotiated between adjacent participants, and then shared keys for all participants are negotiated through the exchange, conversion, and computation of quantum resources. During the implementation of the protocol, not only can the identity of the participants be authenticated, but also the quantum resources used are single, and the quantum operations performed are simple. Moreover, efficiency is fixed and does not decrease due to the increase of participants or quantum resources. In addition, the protocol also allows participants to dynamically join and leave. In terms of security, the protocol can resist most common quantum attacks. Under the existing quantum technology, this protocol is completely feasible.<br/></div> Copyright © 2024 Inderscience Enterprises Ltd.
Number of references:25
Main heading:Authentication Protocol
Controlled terms:Authentication - Encoding (symbols) - Quantum cryptography - Quantum efficiency - Quantum electronics - Quantum optics
Uncontrolled terms:Bell state - Bell state encoding - Key agreement - Key agreement protocol - Multi-party - QKA - Quantum key - Quantum key agreement - Quantum resources - State encoding
Classification code:1106.2   - 1106.3   - 1108.1   - 1108.2   - 1301.1.4   - 741.1  Light/Optics
DOI:10.1504/IJICS.2024.142681

Database:Compendex
Compilation and indexing terms, Copyright 2024 Elsevier Inc.
乐于助人
2楼2024-12-20 16:58:48
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖
相关版块跳转 我要订阅楼主 dandan413 的主题更新
信息提示
请填处理意见