文章摘要
Hala Hamdoun,Alaa Sagheer.[J].重庆邮电大学新办英文刊,2020,(4):463-470
下载全文  View/Add Comment  Download reader
Information security through controlled quantum teleportation networks
Received: October 03, 2018  Revised: February 11, 2020
DOI:https://doi.org/10.1016/j.dcan.2020.04.009
中文关键词: 
英文关键词: nformation security;Machine-to-machine communication;Intelligent secure systems;Quantum teleportation;Quantum networks
基金项目:
AuthorInstitutionE-mail
Hala Hamdoun Center for Artificial Intelligence and RObotics (CAIRO), Department of Computer Science, Aswan University, Aswan, Egypt hala@aswu.edu.eg 
Alaa Sagheer Center for Artificial Intelligence and RObotics (CAIRO), Department of Computer Science, Aswan University, Aswan, Egypt;Department of Computer Science, College of Computer Science and Information Technology, King Faisal University, Saudi Arabia asagheer@kfu.edu.sa 
Hits: 14
Download times: 23
中文摘要:
      
英文摘要:
      Information security is the backbone of current intelligent systems,such as the Internet of Things (IoT),smart grids,and Machine-to-Machine(M2M) communication.The increasing threat of information security requires new models to ensure the safe transmission of information through such systems. Recently, quantum systems have drawn much attention since they are expected to have a significant impact on the research in information security. This paper proposes a quantum teleportation scheme based on controlled multi-users to ensure the secure information transmission among users. Quantum teleportation is an original key element in a variety of quantum information tasks as well as quantum-based technologies, which plays a pivotal role in the current progress of quantum computing and communication. In the proposed scheme, the sender transmits the information to the receiver under the control of a third user or controller. Here, we show that the efficiency of the proposed scheme depends on the properties of the transmission channel and the honesty of the controller. Compared with various teleportation scheme presented recently in the literature, the most important difference in the proposed scheme is the possibility of suspicion about the honesty of the controller and, consequently, taking proper precautions.