Qin Su-Juan
Beijing University of Posts and Telecommunications
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Qin Su-Juan.
Physical Review A | 2011
Gao Fei; Qin Su-Juan; Guo Fenzhuo; Wen Qiaoyan
As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the senders signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.
Chinese Physics B | 2012
Huang Wei; Wen Qiao-Yan; Jia Heng-Yue; Qin Su-Juan; Gao Fei
We present two novel quantum secure direct communication (QSDC) protocols over different collective-noise channels. Different from the previous QSDC schemes over collective-noise channels, which are all source-encrypting protocols, our two protocols are based on channel-encryption. In both schemes, two authorized users first share a sequence of EPR pairs as their reusable quantum key. Then they use their quantum key to encrypt and decrypt the secret message carried by the decoherence-free states over the collective-noise channel. In theory, the intrinsic efficiencies of both protocols are high since there is no need to consume any entangled states including both the quantum key and the information carriers except the ones used for eavesdropping checks. For checking eavesdropping, the two parties only need to perform two-particle measurements on the decoy states during each round. Finally, we make a security analysis of our two protocols and demonstrate that they are secure.
Chinese Physics Letters | 2011
Gao Fei; Qin Su-Juan; Guo Fen-Zhuo; Wen Qiao-Yan
The security of the quantum secure direct communication (QSDC) and authentication protocol based on Bell states is analyzed. It is shown that an eavesdropper can invalidate the authentication function, and implement a successful man-in-the-middle attack, where he/she can obtain or even modify the transmitted secret without introducing any error. The particular attack strategy is demonstrated and an improved protocol is presented.
Communications in Theoretical Physics | 2010
Qin Su-Juan; Gao Fei; Wen Qiao-Yan; Zhu Fu-Chen
A quantum secure direct communication protocol over a collective rotating channel is proposed. The protocol encodes logical bits in noiseless subspaces, and so it can function over a quantum channel subjected to an arbitrary degree of collective rotating noise. Although entangled states are used, both the sender and receiver are only required to perform single-particle product measurement or Pauli operations. The protocol is feasible with present-day technique.
Chinese Physics Letters | 2008
Qin Su-Juan; Wen Qiao-Yan; Zhu Fu-Chen
Security of a quantum secret sharing of quantum state protocol proposed by Guo et al. [Chin. Phys. Lett. 25 (2008) 16] is reexamined. It is shown that an eavesdropper can obtain some of the transmitted secret information by monitoring the classical channel or the entire secret by intercepting the quantum states, and moreover, the eavesdropper can even maliciously replace the secret message with an arbitrary message without being detected. Finally, the deep reasons why an eavesdropper can attack this protocol are discussed and the modified protocol is presented to amend the security loopholes.
Chinese Physics B | 2010
Qin Su-Juan; Wen Qiao-Yan
The security of the quantum secure deterministic communication scheme [Chin. Phys. 16 (2007) 2549] is reexamined. A security loophole is pointed out. Taking advantage of this loophole, an eavesdropper can steal all the secret messages without being detected by an intercept-and-resend attack strategy. Furthermore, a possible improvement on this protocol is presented. It makes the modified protocol secure against this kind of attack.
Chinese Physics B | 2011
Zhang Ke-Jia; Zhu Ping; Gao Fei; Guo Fen-Zhuo; Qin Su-Juan; Wen Qiao-Yan
The discrimination of quantum operations plays a key role in quantum information and computation. Unlike discriminating quantum states, it has some special properties which can be carried out in practice. In this paper, we provide a general description of discriminating quantum operations. Concretely speaking, we describe the distinguishability between quantum operations using a measure called operator fidelity. It is shown that, employing the theory of operator fidelity, we can not only verify some previous results to discriminate unitary operations, but also exhibit a more general discrimination condition. We further apply our results to analysing the security of some quantum cryptographic protocols and discuss the realization of our method using well-developed quantum algorithms.
Wuhan University Journal of Natural Sciences | 2006
Qin Su-Juan; Wen Qiao-Yan; Zhu Fu-Chen
We discuss the security of the kind of multiparty quantum secret sharing protocols encrypting in series. It is secure against the eavesdroppers outside. However it is weak to withstand the attack of insider with a fake signal and cheating. An idiographic attack strategy is given based on the protocol. Furthermore, we conclude the key leak of the protocols and present a possible way to prevent the dishonest agents from stealing the secret.
Physical Review A | 2011
Wen Qiaoyan; Qin Su-Juan
Chinese Physics Letters | 2010
Guo Fen-Zhuo; Qin Su-Juan; Wen Qiao-Yan; Zhu Fu-Chen