跳到主要內容

臺灣博碩士論文加值系統

(44.192.49.72) GMT+8:2024/09/17 21:36
Font Size: Enlarge Font   Word-level reduced   Reset  
Back to format1 :::

Browse Content

 
twitterline
Author:吳崇弦
Author (Eng.):Chong-Xian Wu
Title:植基於量子隱形傳輸之安全快速驗證機制
Title (Eng.):A robust authentication scheme based on quantum teleportation
Advisor:何金山何金山 author reflink鄭錦楸鄭錦楸 author reflink郭文中郭文中 author reflink
advisor (eng):Chin-Shan HoChin Chiu ChengWen-Chung Kuo
degree:Master
Institution:南台科技大學
Department:資訊工程系
Narrow Field:工程學門
Detailed Field:電資工程學類
Types of papers:Academic thesis/ dissertation
Publication Year:2006
Graduated Academic Year:94
language:Chinese
number of pages:36
keyword (chi):量子隱形傳輸量子糾纏驗證金鑰交換協定
keyword (eng):Quantum teleportationQuantum entanglementAuthenticated Key Exchange
Ncl record status:
  • Cited Cited :0
  • HitsHits:380
  • ScoreScore:system iconsystem iconsystem iconsystem iconsystem icon
  • DownloadDownload:97
  • gshot_favorites title msgFav:1
1984,Bennett及Brassard引用量子具有無法複製之特性,提出量子金鑰交換協定(BB84)。不久之後,該協定被Shor和Preskill証明可達到絕對安全之目的。此後,越來越多學者專家投入量子密碼之研究。因為BB84具有絕對安全之特性,所以許多網路傳輸協定採用BB84。但是BB84協定屬於機率式的金鑰分配協定且平均每次完成時可能要浪費一半左右的量子位元。為改善上述的缺點本論文採用Bennett的量子隱形傳輸機制,來設計了兩種快速的驗證機制。再與BB84做一比較,發現本論文所提之機制除可達到絕對安全之外,並能提高傳輸準確度。
1984, the famous quantum key exchange scheme (BB84) is proposed by Bennett and Brassard. However, they can not prove the security characteristic of BB84 scheme. Since then, more and more scholars invested the research of the quantum cryptography. Until 2000, Shor and Preskill proposed a simple proof method to prove that BB84 scheme has the unconditional security. To provide the unconditional security, BB84 protocol will waste about half of quantum bits to authenticate the identify each other. In order to improve the above drawback, two quantum key agreement protocols based on quantum teleportation are proposed in this paper. These proposed schemes are not only to reach the same security level as BB84 but also to improve the accuracy of transmitting.
目 次
摘要…………………………………………………………………………iv
Abstract……………………………………………………………………v
誌謝…………………………………………………………………………vi
目次…………………………………………………………………………vii
表目錄………………………………………………………………………ix
圖目錄………………………………………………………………………x
第一章 前言 ………………………………………………………………1
第二章 傳統密碼與量子密碼介紹 ………………………………………3
2.1符號說明 ………………………………………………………………3
2.2 古典密碼理論…………………………………………………………5
2.3 雜湊函數………………………………………………………………5
2.4 量子計算………………………………………………………………6
2.5 量子密碼學……………………………………………………………10
2.6 量子量測………………………………………………………………11
2.7 量子糾纏態……………………………………………………………12
2.8 量子不可複製性………………………………………………………12
2.9量子單向函數 …………………………………………………………13
2.10 Bell基底或EPR對……………………………………………………14
第三章 量子金鑰分配 ……………………………………………………17
3.1 BB84傳輸理論與架構…………………………………………………17
3.1.1 BB84通訊協定………………………………………………………18
3.1.2 範例說明……………………………………………………………19
3.2量子隱形傳輸 …………………………………………………………21
3.2.1 隱形傳輸的方法……………………………………………………24
第四章 植基於量子隱形傳輸之安全快速金鑰交換協定 ………………27
4.1植基於量子隱形傳輸之金鑰交換協定一 ……………………………27
4.2植基於量子隱形傳輸之金鑰交換協定二 ……………………………28
第五章 分析與討論 ………………………………………………………31
第六章 結論與未來發展 …………………………………………………33
參考文獻……………………………………………………………………34
1. H.Barnum, C.Crepeau, D.Gottesman, A.Smith and A.Tapp,” Authentication of Quantum Messages,” CoRR quant-ph/0205128 , 2002.

2. C.Barnum ,D.Gottesman and A.Smith, “Authentication of Quantum Messages,”In Proceedings of 43rd Annual IEEE Symposium on the Foundations of Computer Science, Vancouver, pp. 449-458, 2002.

3. C. H. Bennett, F. Bessette, G. Brassard, L. Salvail and J. Smolin, "Experimental
Quantum Cryptography," Journal of Cryptology, vol.5, no.1, pp.3-2,1992.

4. C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing” Pro. IEEE Conf. on computers, Systems and signal processing (Bangalore, India) (Piscataway, NJ: IEEE), pp.175-179, 1984.

5. C. H. Bennett and G. Brassard, Proc. IEEE Int. “Conference on Computer’s Systems and Signal Processing”, IEEE, New York, pp.175-179, 1984.

6. Biham, E. and T. Mor, “Bounds on Information and the Security of Quantum Cryptography,”Phys. Rev. Lett.79, pp.4034-4037, 1997.

7. Biham, E. and T. Mor, “Security of quantum cryptography against collective attacks,”Phys. Rev. Lett.78, pp.2256-2259, 1997.

8. Goong Chen, Ranee K. Brylinski. ,”Mathematics of quantum computation”,Boca Raton : CRC Press, 2002.

9. W.Diffie and M. E.Hellman,“New Directions in Cryptography,”IEEE Trans. on Information Theory, Vol.22, No.11,pp644-654, 1976.

10. A. Einstein and B. Podolsky and N. Rosen “Can quantum-Mechanical description of Physical Reality be considered complete”, Phys. Rev. 47, 777–780, 1935.

11. H. -K. Lo and H. F. Chau, "Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long Distances," Science, vol. 283, pp.2050-2056, 1999.

12. Michael A. Nielsen and L. Isaac, “Chuang Quantum Computation and Quantum Information.” Cambridge, 2000

13. P.W. Shor and J. Preskill. “Simple Proof of Security of the BB84 Quantum Key Distribution Protocol.” Phys. Rev. Lett. 85, 441-444, 2000.

14. N. Zhou, G. Zeng and J. Xiong,”Quantum key agreement rotocol”,ELECTRONICS LETTERS 2nd Vol. 40 No.18 , pp.1149-1150, 2004.

15. 真野正 , 資料結構:使用C語言 教學範本 , 博碩, 2003.

16. 量子資訊教材 http://nsc.cs.nthu.edu.tw/QIS/index.htm
17. 賴溪松、韓亮、張真誠 , 近代密碼學及其應用(第三版) .旗標出版社, 2002..
Link to school's url:Link url
Link record message
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
First Page Prev Page Next Page Last Page top
1. Data Hiding Techniques based on RSA and Difference for Digital Image
2. Studies on price promotion of manufacturer’s national brand and hyper-market’s private brand influencing consumer purchase behavior- An example based on barbecue sauce
3. Synthesis of the core/shell and hollow types magnetic nanocomposite by ionic polymer
4. A Study of Multi-response Optimization with Regression Analysis and Grey Decision System: An Example of the Aquatic Feed Production Process
5. Optimum Process Mean Setting For A Multi-stage Serial Production System Under Considering Quality Loss Function
6. The Study Of Applying The Rectifying Inspection Plan In Determining The Optimum Process Mean
7. A Study of Simulation of Quantum Cryptology on the Traditional Computer
8. The Cost-Effective Influential Study of Implementing Postponement Strategies in Manufacturers and Distribution Centers― A Case Study of Clothing Industry
9. Negotiation Power and Conflicts on Distribution Channels-Feed Industry
10. A Model of Deriving RFID in Industry-An Application on Combining with Change Management
11. Male Image on Print Ads of 《Men's Uno》Magazine
12. A Study of the Influence of Leadership, Professional Commitments, and WorkValues on Job Satisfaction-In the Case of Hospitals’Staff Nurses in TaiwanA Study of the Influence of Leadership, Professional Commitments, and WorkValues on Job Satisfaction-In
13. Calibration study for PWV measurement platform
14. 企業成長策略與核心能力間關係之研究-以螺絲帽產業為例
15. Study of Characteristics of Quantum-Dot Devices
 
system icon system icon