@inproceedings{bd15513e4dd740f68986c13fb364d75e,
title = "Quantum circuits and quantum message integrity",
abstract = "In the wireless communication networks, quantum message integrity can be applied with quantum authentication and quantum signature if the source and destination are indirect communication. Eavesdroppers and malicious nodes may exist in the routing path from the source to the destination. There is major threat in the indirect communication. Based on quantum nature, we design quantum permutation model to verify quantum transmission sequence of a quantum transmission frame if an attacker wants to crack the content of a quantum transmission frame. Quantum permutation model can determine the real position of data qubits and verification qubits. However, Eves is not able to obtain the position of date qubits because quantum permutation switching cannot be owned by Eve. So quantum transmission sequence can be reserved. The receiver has the capability to verify it and obtains the content of data qubits.",
keywords = "eavesdropper, Indirect communication, quantum nature, quantum permutation model, quantum transmission frame",
author = "Lin, \{Tien Sheng\} and Chang, \{Ting Hsu\} and Chien, \{Chia Hung\} and Kuo, \{Sy Yen\}",
year = "2011",
doi = "10.1109/CCST.2011.6095928",
language = "英语",
isbn = "9781457709029",
series = "Proceedings - International Carnahan Conference on Security Technology",
booktitle = "2011 Carnahan Conference on Security Technology, ICCST 2011",
note = "2011 IEEE International Carnahan Conference on Security Technology, ICCST 2011 ; Conference date: 18-10-2011 Through 21-10-2011",
}