Ting-Hsu Chang's research while affiliated with National Taiwan University and other places

Publications (9)

Article
In the distributed network, quantum teleportation can teleport a quantum state from one quantum device to a remote site by using quantum entangled particles. Quantum entangled particles have the correlation among sharing party of distributed node to form a special relation for transmitting quantum message and classical message. In the paper, we der...
Article
Quantum circuit is a reversible circuit that can be designed the control module to derive the correlation between quantum input sequence and quantum output sequence. In addition, in this paper we use the control module of the quantum circuit to verify the equivalence of the quantum state such that quantum blind signature can achieve the security re...
Conference Paper
This paper proposes a quantum switching on crossed cube, the diameter of the crossed cube is almost half of that of the hypercube, to execute quantum walks. Quantum walks can be implemented in the hypercube and general graphs. Hypercube is a regular graph. According to quantum walk algorithm, the system can preserve unitary property of quantum walk...
Conference Paper
This paper designs quantum testing circuit to detect intermediate malicious node and achieve message integrity in the distributed quantum computing. The proposed mechanism has several improvements shown as follows. The random key generation between Alice and Bob such that an attack cannot break this deriving process. Local unitary operations and qu...
Conference Paper
Quantum walks can be implemented in the hypercube and general graphs, where hypercube is a regular graph. According to quantum walk algorithm, unitary property of quantum walks can be preserved. In the regular graph, to develop quantum walks algorithm is focused on quantum search algorithm. Quantum switching is the reversible and parallel computati...
Article
For vehicular networks, the security and privacy face two major challenges. One is the open wireless medium and the other is the high-speed mobility of the vehicles. For the open wireless medium, eavesdropping and man-in-the-middle attacks may exist in the communication path. This is called an unsafe routing path. Based on quantum nature, quantum c...
Article
In the wireless communication networks, quantum message integrity can be applied with quantum authentication and quantum signature if the source and destination are indirect communication. Eavesdroppers and malicious nodes may exist in the routing path from the source to the destination. There is major threat in the indirect communication. Based on...
Article
This paper proposes a novel work to design reversible quantum circuits. The function of this circuit is to investigate quantum transmission integrity in the quantum communication networks. This work is to verify quantum transmission sequence of a quantum frame by using reversible quantum model. This model designs control module to derive the correl...
Article
In this paper, we use the technique of entanglement swapping to exchange quantum message among sharing parties. For Bell measurements, quantum teleportation can provide long-distance quantum transmission when sharing parties are disconnected. The proposed mutual authentication protocol has the capability to securely identify each other under an uns...

Citations

... This work just not only protect the system from quantum attacks but also eliminated the need of trusted third party. A scheme by Lin T, Yanlin Chen also uses quantum blind signature to propose quantum circuit which could become a perfect candidate to be used in development of electronic payment as well as electronic voting system [34]. Also, protocol by Minghui-Zhang, Huifang-Li, Yun-Zhou, Xiaoyi-Feng, Zhengwen-Cao, Jinye-Peng [35] uses entangled state for quantum blind signature in order to provide traceability, unforgeability etc. ...
... This work gave an elementary model to sign a quantum message. In the following year, many QDS schemes have been put forward [3,4,5,6]. This paper investigated a new QDS scheme based on finite automata and showed its security against the existing attacks. ...
... In recent 20 years, many quantum authentication schemes have been proposed [7][8][9][10][11][12][13][14][15][16]. Unfortunately, these schemes are all single-party authentication, i.e., the verifier can only verify one user in an authentication process. ...