Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Qin Su-Juan is active.

Publication


Featured researches published by Qin Su-Juan.


Physical Review A | 2011

Cryptanalysis of the arbitrated quantum signature protocols

Gao Fei; Qin Su-Juan; Guo Fenzhuo; Wen Qiaoyan

As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the senders signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.


Chinese Physics B | 2012

Fault tolerant quantum secure direct communication with quantum encryption against collective noise

Huang Wei; Wen Qiao-Yan; Jia Heng-Yue; Qin Su-Juan; Gao Fei

We present two novel quantum secure direct communication (QSDC) protocols over different collective-noise channels. Different from the previous QSDC schemes over collective-noise channels, which are all source-encrypting protocols, our two protocols are based on channel-encryption. In both schemes, two authorized users first share a sequence of EPR pairs as their reusable quantum key. Then they use their quantum key to encrypt and decrypt the secret message carried by the decoherence-free states over the collective-noise channel. In theory, the intrinsic efficiencies of both protocols are high since there is no need to consume any entangled states including both the quantum key and the information carriers except the ones used for eavesdropping checks. For checking eavesdropping, the two parties only need to perform two-particle measurements on the decoy states during each round. Finally, we make a security analysis of our two protocols and demonstrate that they are secure.


Chinese Physics Letters | 2011

Cryptanalysis of Quantum Secure Direct Communication and Authentication Scheme via Bell States

Gao Fei; Qin Su-Juan; Guo Fen-Zhuo; Wen Qiao-Yan

The security of the quantum secure direct communication (QSDC) and authentication protocol based on Bell states is analyzed. It is shown that an eavesdropper can invalidate the authentication function, and implement a successful man-in-the-middle attack, where he/she can obtain or even modify the transmitted secret without introducing any error. The particular attack strategy is demonstrated and an improved protocol is presented.


Communications in Theoretical Physics | 2010

Robust Quantum Secure Direct Communication over Collective Rotating Channel

Qin Su-Juan; Gao Fei; Wen Qiao-Yan; Zhu Fu-Chen

A quantum secure direct communication protocol over a collective rotating channel is proposed. The protocol encodes logical bits in noiseless subspaces, and so it can function over a quantum channel subjected to an arbitrary degree of collective rotating noise. Although entangled states are used, both the sender and receiver are only required to perform single-particle product measurement or Pauli operations. The protocol is feasible with present-day technique.


Chinese Physics Letters | 2008

Cryptanalysis of Multiparty Quantum Secret Sharing of Quantum State Using Entangled States

Qin Su-Juan; Wen Qiao-Yan; Zhu Fu-Chen

Security of a quantum secret sharing of quantum state protocol proposed by Guo et al. [Chin. Phys. Lett. 25 (2008) 16] is reexamined. It is shown that an eavesdropper can obtain some of the transmitted secret information by monitoring the classical channel or the entire secret by intercepting the quantum states, and moreover, the eavesdropper can even maliciously replace the secret message with an arbitrary message without being detected. Finally, the deep reasons why an eavesdropper can attack this protocol are discussed and the modified protocol is presented to amend the security loopholes.


Chinese Physics B | 2010

Improving the security of secure deterministic communication scheme based on quantum remote state preparation

Qin Su-Juan; Wen Qiao-Yan

The security of the quantum secure deterministic communication scheme [Chin. Phys. 16 (2007) 2549] is reexamined. A security loophole is pointed out. Taking advantage of this loophole, an eavesdropper can steal all the secret messages without being detected by an intercept-and-resend attack strategy. Furthermore, a possible improvement on this protocol is presented. It makes the modified protocol secure against this kind of attack.


Chinese Physics B | 2011

General description of discriminating quantum operations

Zhang Ke-Jia; Zhu Ping; Gao Fei; Guo Fen-Zhuo; Qin Su-Juan; Wen Qiao-Yan

The discrimination of quantum operations plays a key role in quantum information and computation. Unlike discriminating quantum states, it has some special properties which can be carried out in practice. In this paper, we provide a general description of discriminating quantum operations. Concretely speaking, we describe the distinguishability between quantum operations using a measure called operator fidelity. It is shown that, employing the theory of operator fidelity, we can not only verify some previous results to discriminate unitary operations, but also exhibit a more general discrimination condition. We further apply our results to analysing the security of some quantum cryptographic protocols and discuss the realization of our method using well-developed quantum algorithms.


Wuhan University Journal of Natural Sciences | 2006

Eavesdropping on the Orderly-Encrypting Multiparty Quantum Secret Sharing Protocols

Qin Su-Juan; Wen Qiao-Yan; Zhu Fu-Chen

We discuss the security of the kind of multiparty quantum secret sharing protocols encrypting in series. It is secure against the eavesdroppers outside. However it is weak to withstand the attack of insider with a fake signal and cheating. An idiographic attack strategy is given based on the protocol. Furthermore, we conclude the key leak of the protocols and present a possible way to prevent the dishonest agents from stealing the secret.


Physical Review A | 2011

Comment on ''Secure multiparty computation with a dishonest majority via quantum means''

Wen Qiaoyan; Qin Su-Juan


Chinese Physics Letters | 2010

Cryptanalysis and Improvement of Two GHZ-State-Based QSDC Protocols

Guo Fen-Zhuo; Qin Su-Juan; Wen Qiao-Yan; Zhu Fu-Chen

Collaboration


Dive into the Qin Su-Juan's collaboration.

Top Co-Authors

Avatar

Wen Qiao-Yan

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Gao Fei

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Guo Fen-Zhuo

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Du Jian-Zhong

University of Science and Technology Beijing

View shared research outputs
Top Co-Authors

Avatar

Guo Fenzhuo

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Huang Wei

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Jia Heng-Yue

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Liu Tai-lin

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Sun Ying

Beijing University of Posts and Telecommunications

View shared research outputs
Researchain Logo
Decentralizing Knowledge