共查询到20条相似文献,搜索用时 62 毫秒
1.
经过40多年的发展,量子计算已处在一个从实验室到实际场景的应用阶段,意味着量子技术时代即将来临。量子计算的巨大优势就是其指数级增长的算力,它将为信息技术带来革命性的变化,但也为现有信息安全体系带来挑战。 相似文献
2.
文中对信息安全和量子保密通信的技术现状进行了介绍,对量子保密通信在数据传输安全方面的重要作用进行分析,对量子保密通信发展趋势和应用前景进行了分析和探讨。 相似文献
3.
4.
在互联网及信息化的发展大背景下,数据信息的价值越来越高。为了有效保障信息安全,合理设置信息安全等级保护措施,有效利用后量子密码体制提高安全等级保护的有效性势在必行。在信息安全保障过程中,密码体制属于非常关键核心的技术手段,在合理应用后量子密码体制等手段的基础上,计算机系统当中的信息安全能够得到有效保障。鉴于此,文章从后量子密码体制的基本内容入手进行分析,结合密码体制在等级保护应用过程中的实际落实需求,针对性提出行之有效的后量子密码体制应用策略。 相似文献
5.
量子计算作为一项前沿颠覆性技术,已经引起世界主要国家和地区的广泛关注.文中系统梳理了美国、欧盟、俄罗斯、日本等世界主要国家和地区在量子计算领域的战略布局;结合近年来国内外研究成果,总结了量子硬件、量子算法、混合量子计算等核心技术的发展现状及趋势;基于军方的最新研究部署,分析了量子计算的军事应用动向;围绕IBM、Goog... 相似文献
6.
7.
侯晓凯;詹天宇;王晓霆 《通信技术》2025,(3):255-261
随着量子计算技术的快速发展,传统密码系统的安全性正面临严峻挑战。作为一种基于量子力学原理的新型计算模型,量子计算利用叠加、纠缠等特性实现对信息的并行处理,能够高效求解密码系统依赖的某些数学难题。系统性综述了适用于密码分析的量子计算技术的发展现状,分析了量子算法对传统密码体系安全性的影响,讨论了量子计算在典型后量子密码系统分析中的研究应用,以期为构建量子计算时代的安全密码体系提供理论参考和实践指导。 相似文献
8.
9.
量子计算及量子计算机 总被引:5,自引:0,他引:5
介绍了量子计算和量子计算机的基本概念,分析了量子计算比之经典计算的特点,讨论了量子计算机物理上的几种可能实现方法,最后展望了量子计算机的应用前景. 相似文献
10.
11.
Eli Biham Michel Boyer P. Oscar Boykin Tal Mor Vwani Roychowdhury 《Journal of Cryptology》2006,19(4):381-439
We prove the security of theoretical quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages such that their security is also unaffected in the future. 相似文献
12.
Information security is the backbone of current intelligent systems, such as the Internet of Things (IoT), smart grids, and Machine-to-Machine(M2M) communication. The increasing threat of information security requires new models to ensure the safe transmission of information through such systems. Recently, quantum systems have drawn much attention since they are expected to have a significant impact on the research in information security. This paper proposes a quantum teleportation scheme based on controlled multi-users to ensure the secure information transmission among users. Quantum teleportation is an original key element in a variety of quantum information tasks as well as quantum-based technologies, which plays a pivotal role in the current progress of quantum computing and communication. In the proposed scheme, the sender transmits the information to the receiver under the control of a third user or controller. Here, we show that the efficiency of the proposed scheme depends on the properties of the transmission channel and the honesty of the controller. Compared with various teleportation scheme presented recently in the literature, the most important difference in the proposed scheme is the possibility of suspicion about the honesty of the controller and, consequently, taking proper precautions. 相似文献
13.
随着云计算应用逐步深化和云计算技术在成本节省、效率提升等方面的优势,云计算已成为信息系统建设的新阶段。但在信息安全设计方面,存在安全建设标准滞后问题,现有标准在制定时主要面向的是静态具有固定边界的系统环境。本文结合项目经验,从成熟度、可行性角度出发,研究云计算环境下信息安全建设所面临的新安全风险,并对比现有等级保护技术要求,探索研究出了一种新的云计算信息安全体系架构,并在现有安全技术标准基础上提出针对云安全的补充建设方案,为云计算信息安全设计提供参考。 相似文献
14.
15.
We devise a simple modification that essentially doubles the efficiency of
the BB84 quantum key distribution scheme proposed by Bennett and Brassard.We also
prove the security of our modified scheme against the most general eavesdropping attack
that is allowed by the laws of physics. The first major ingredient of our scheme
is the assignment of significantly different probabilities to the different polarization
bases during both transmission and reception, thus reducing the fraction of discarded
data. A second major ingredient of our scheme is a refined analysis of accepted data:
We divide the accepted data into various subsets according to the basis employed and
estimate an error rate for each subset separately. We then show that such a refined data
analysis guarantees the security of our scheme against the most general eavesdropping
strategy, thus generalizing Shor and Preskills proof of security of BB84 to our
new scheme. Until now, most proposed proofs of security of single-particle type quantum key distribution schemes have relied heavily upon the fact that the bases are
chosen uniformly, randomly, and independently. Our proof removes this symmetry
requirement. 相似文献
16.
文章通过对信息安全概念的诠释,结合实例应用以系统的观点,从全新的角度提出了相应的信息安全策略,并进一步明确了制定信息安全策略应遵守的普遍原则。 相似文献
17.
18.
19.
20.
量子神经计算模型研究 总被引:14,自引:1,他引:14
量子神经计算(Quantum Neural Computation)是传统神经计算与量子理论相结合而产生的一种新的计算模式,本文论述了量子神经计算出现的原因及其特征,着重分析了几种典型的计算模型,并就其中存在的问题提出相应的解决方案,最后进行相关讨论。 相似文献