CN104104500B - A kind of method and apparatus of quantum secure transmission - Google Patents

A kind of method and apparatus of quantum secure transmission Download PDF

Info

Publication number
CN104104500B
CN104104500B CN201310113350.4A CN201310113350A CN104104500B CN 104104500 B CN104104500 B CN 104104500B CN 201310113350 A CN201310113350 A CN 201310113350A CN 104104500 B CN104104500 B CN 104104500B
Authority
CN
China
Prior art keywords
epr
objects
confidentiality
bit
tangle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310113350.4A
Other languages
Chinese (zh)
Other versions
CN104104500A (en
Inventor
郑世慧
常利伟
郑强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Beijing University of Posts and Telecommunications
Original Assignee
Huawei Technologies Co Ltd
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd, Beijing University of Posts and Telecommunications filed Critical Huawei Technologies Co Ltd
Priority to CN201310113350.4A priority Critical patent/CN104104500B/en
Publication of CN104104500A publication Critical patent/CN104104500A/en
Application granted granted Critical
Publication of CN104104500B publication Critical patent/CN104104500B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The embodiment of the invention discloses a kind of quantum secure transmission method and device, it is related to security technology area, in quantum secure transmitting procedure, to reduce probability of the listener-in to the effective decoding of acquisition of information.Including:Sender and recipient share a string of EPR tangle pair and each EPR tangle to status information;Every EPR is tangled to being in any of two distinct types of Bell state any or at least three kinds Bell states at random;Generate the objects within confidentiality of quantum state;The objects within confidentiality of quantum state includes multiple secrecy bits;Using first key particle to secrecy bit encryption, the objects within confidentiality after being encrypted;Objects within confidentiality after encryption is sent to recipient, to cause recipient to be tangled according to EPR to present Bell state, the objects within confidentiality after the encryption received using the second key particle to it is decrypted and measured, and obtains the decryption object of classical state;The decryption object of the classical state includes multiple decryption bits.

Description

A kind of method and apparatus of quantum secure transmission
Technical field
The present invention relates to the method and apparatus of security technology area, more particularly to a kind of transmission of quantum secure.
Background technology
Cryptographic technique can be broadly divided into two classes:One class is traditional cryptographic technique based on mathematics, such as symmetric cryptography body System, asymmetric cryptosystem etc.;One class is the cryptographic technique of non-mathematics, such as quantum cryptography, DNA passwords etc..Quanta cryptology technique, It is the carrier using single quantum state as information, different quantum states represents different information, is then sent using communication network To recipient.The common expression-form of quantum state has | 0 >, | 1 > etc..Different quantum states illustrates different codings, for example | 0 > can represent 0, | 1 > can represent 1.
Based on quanta cryptology technique, in the prior art there is provided a kind of scheme that session key is encrypted.Specific bag Include following steps:
Sender produces a string of EPR (Einstein, Podolsky, Rosen, Einstein, Podolski, Luo Xun) and entangled Twine to (a1, b1), (a2, b2) ..., (am, bm, wherein (ai, bi) represent an EPR tangle to (1≤i≤m, m be greater than 0 it is whole Number), its state is a kind of Bell state (Bel's state) determined(a1, a2..., am) it is to send Square key-encrypting key (key that key is encrypted), (b1, b2..., bm) recipient key-encrypting key, send Side is by quantum channel by (b1, b2..., bm) recipient is sent to, this process is defined as the shared procedure of key-encrypting key.
After this, sender is tangled to session key using above-mentioned EPR;Recipient is to the session after encryption Key is decrypted, and completes the transmission of session key.
In the transmitting procedure of above-mentioned session key, it is possible to can be intercepted and captured by listener-in, once listener-in is known wherein One EPR tangle to Bell state, be also known that all EPR tangle to Bell state so that listener-in is relatively easily The session key that it is intercepted and captured is measured, causes the conversation key safety of transmission not high.
The content of the invention
Embodiments of the invention provide a kind of method and apparatus of quantum secure transmission, in quantum secure transmitting procedure In, reduction listener-in improves the security of transmission to the probability of the effective decoding of acquisition of information.
To reach above-mentioned purpose, embodiments of the invention are adopted the following technical scheme that:
First aspect there is provided a kind of method that quantum secure is transmitted, including:
Sender and recipient share a string of EPR tangle pair and each EPR tangle to status information;It is each described EPR is tangled to being in any of two distinct types of Bell state any or at least three kinds Bell states at random;Its In, the EPR tangle to including:One first key particle and a second key particle;
Sender generates the objects within confidentiality of quantum state;The objects within confidentiality of the quantum state includes multiple secrecy bits;
Sender utilizes the first key particle to the secrecy bit encryption, the objects within confidentiality after being encrypted, and Objects within confidentiality after the encryption is sent to recipient;To cause recipient to be tangled according to EPR to present Bell state, profit Objects within confidentiality after the encryption received with the second key particle to it is decrypted and measured, and obtains the decryption pair of classical state As;The decryption object of the classical state includes multiple decryption bits.
In the first mode in the cards, with reference in a first aspect, described sender utilizes the first key particle To the secrecy bit encryption, the objects within confidentiality after being encrypted, and the objects within confidentiality after the encryption is sent to recipient Including:
If a string of EPR tangle to length be more than or equal to the length of the objects within confidentiality, sender utilizes institute First key particle is stated to each secrecy bit encryption in the objects within confidentiality, the objects within confidentiality after being encrypted, and be sent to Recipient;Or,
If a string of EPR tangle to length be less than the objects within confidentiality length, sender using all first Encryption of the key particle to the privacy amplification bit in the objects within confidentiality, obtains the objects within confidentiality after Partial encryption, and send To recipient;Perform circulation:According to current EPR tangle to Bell state to currently used first key particle carry out it is extensive Multiple operation, EPR tangle to Bell state update after, and each EPR after recipient's Share update tangle to status information; The remaining secrecy bit in objects within confidentiality is encrypted using the first key particles for tangling centering of the EPR after renewal, obtained Objects within confidentiality after Partial encryption, and be sent to recipient, until the objects within confidentiality is fully completed encryption, and is sent to described Recipient.
In second of mode in the cards, with reference to the first mode in the cards, completing, one-time pad encryption is concurrent After sending, methods described also includes:
Perform eavesdropping testing process;The eavesdropping testing process includes:Utilize the classics of the secrecy bit of inspection positions State and decryption bit-detection are with the presence or absence of eavesdropping.
In the third mode in the cards, with reference to first aspect or first two mode in the cards, by described in Objects within confidentiality after encryption is sent to after recipient, and methods described also includes:Sender according to current EPR tangle to Bell State is to currently used first key particle carries out recovery operation;
EPR tangle to Bell state update after, and each EPR after recipient's Share update tangle to state letter Breath;
EPR after being updated using inspection positions tangles secrecy of the first key particle to the inspection positions of centering Bit is encrypted;
Secrecy bit after the inspection positions are encrypted is sent to recipient, to cause recipient according to the detection EPR after being updated at position tangles the second key particle that centering is tangled to the EPR after present Bell state and renewal, Secrecy bit after the inspection positions encryption received respectively to it is decrypted and measured, and obtains the inspection positions Decrypt bit;
Perform eavesdropping testing process;The eavesdropping testing process includes:Utilize the classics of the secrecy bit of inspection positions State and decryption bit-detection are with the presence or absence of eavesdropping.
In the 4th kind of mode in the cards, with reference to the first or the third mode in the cards, the basis is worked as Preceding EPR tangle to Bell state to currently used first key particle carries out recovery operation and included:
It is to present Bell state if current EPR is tangled | Φ+>, then to currently used first key particle DoRotation process;
It is to present Bell state if current EPR is tangled | Φ->, then to currently used first key particle DoRotation process;
It is to present Bell state if current EPR is tangled | Ψ+>, then to currently used first key particle DoRotation process;
It is to present Bell state if current EPR is tangled | Ψ->, then to currently used first key particle DoRotation process.
It is described to be entangled in EPR with reference to the first or the third mode in the cards in the 5th kind of mode in the cards Twine to Bell state update after, and each EPR after recipient's Share update tangle to status information include:
Sender is processed using a kind of operation for updating Bell state at random to first key particle, to cause described first EPR belonging to key particle is tangled to be updated to present Bell state, and each EPR after renewal is tangled to present Status information is sent to recipient;Or,
Each EPR after the renewal sent by recipient is received to tangle to present status information.
It is described with reference to first aspect or first five any mode in the cards of kind in the 6th kind of mode in the cards The objects within confidentiality of sender's generation quantum state includes:
Randomly generating needs the classical Bit String for issuing recipient, and the classical Bit String is converted into quantum bit string, It is used as the objects within confidentiality of the quantum state;Or,
The information for issuing recipient will be needed to be converted into quantum bit string, and radom insertion is extremely in the quantum bit string A few quantum bit, is used as the objects within confidentiality of the quantum state.
Second aspect there is provided a kind of method that quantum secure is transmitted, including:
Recipient and sender share a string of EPR tangle pair and each EPR tangle to status information;It is each described EPR is tangled to being in any of two distinct types of Bell state any or at least three kinds Bell states at random;Its In, the EPR tangle to including:One first key particle and a second key particle;
Recipient receives the objects within confidentiality after encryption, and is tangled according to EPR to present Bell state, utilizes described second Objects within confidentiality after the encryption that key particle is received to it is decrypted and measured, and obtains the decryption object of classical state;The encryption Objects within confidentiality afterwards is obtained by described sender utilizes the first key particle to the secrecy bit encryption;The warp The decryption object of allusion quotation state includes multiple decryption bits.
In the first mode in the cards, with reference to second aspect, the recipient receives the objects within confidentiality after encryption, And tangled according to EPR to present Bell state, the secrecy pair after the encryption received using the second key particle to it As decrypting and measuring, obtaining the decryption object of classical state includes:
If a string of EPR tangle to length be more than or equal to the length of the objects within confidentiality, recipient once connects The objects within confidentiality after portion's encryption is received, and is tangled according to EPR to present Bell state, is added using the second key particle pair Objects within confidentiality after close is decrypted and measured, and obtains all decryption objects;
If a string of EPR tangle to length be less than the objects within confidentiality length, recipient's receiving portion encryption Objects within confidentiality afterwards, and being tangled according to EPR to present Bell state, using the second key particle to Partial encryption after Objects within confidentiality is decrypted and measured, and obtains part decryption object;Perform circulation:To currently used second key particle is carried out Recovery operation, EPR tangle to Bell state update after, and each EPR after sender's Share update tangle to state letter Breath, receives the objects within confidentiality after remainder encryption, after being tangled according to EPR after renewal to present Bell state, using renewal EPR tangles the second key particle of centering and the objects within confidentiality after the Partial encryption that is currently received is decrypted and measured, and obtains portion Close object is decomposed, until the objects within confidentiality after the encryption is fully completed decryption.
In second of mode in the cards, with reference to the first mode in the cards, complete once to decrypt and survey After amount, methods described also includes:
Perform eavesdropping testing process;The eavesdropping testing process includes:Utilize the classics of the secrecy bit of inspection positions State and decryption bit-detection are with the presence or absence of eavesdropping.
In the third mode in the cards, with reference to any mode in the cards of second aspect or first two, obtaining To after the decryption object of classical state, methods described also includes:
Recipient is to currently used second key particle carries out recovery operation;
EPR tangle to Bell state update after, and each EPR after sender's Share update tangle to state letter Breath;
Receive the secrecy bit after the inspection positions encryption that sender sends;
EPR after being updated according to inspection positions tangle to Bell state, the EPR after being updated using inspection positions tangled To the second key particle the inspection positions are encrypted after secrecy bit be decrypted and measure;
Perform eavesdropping testing process;The eavesdropping testing process includes:Utilize the classics of the secrecy bit of inspection positions State and decryption bit-detection are with the presence or absence of eavesdropping;
If eavesdropping is not present in detection, effective connection object is generated.
In the 4th kind of mode in the cards, with reference to the first or the third mode in the cards, the recipient To currently used second key particle progress recovery operation includes:
Recipient is to currently used second key particle is doneRotation Turn operation.
It is described to be entangled in EPR with reference to the first or the third mode in the cards in the 5th kind of mode in the cards Twine to Bell state update after, and each EPR after sender's Share update tangle to status information include:Receive by sending Each EPR after the renewal that side is sent is tangled to present status information;Or,
Recipient is processed using a kind of operation for updating Bell state at random to the second key particle, to cause described second EPR belonging to key particle is tangled to be updated to present Bell state, and each EPR after renewal is tangled to present Status information is sent to sender.
In the 6th kind of mode in the cards, with reference to the third mode in the cards, the secrecy pair of the quantum state As to randomly generate, the effective connection object of generation includes:The decryption ratio of inspection positions is removed from decryption object Spy, obtains effective connection object;Or,
The objects within confidentiality of the quantum state inserts quantum bit for sender in the information for needing to issue recipient and obtained , the test position inserts the position of quantum bit at least one, and the effective connection object of generation includes:Decryption pair The decryption bit gone as at the position of the sub- bit of insertion unless each, obtains effective connection object.
The third aspect there is provided the device that a kind of quantum secure is transmitted, including:
Shared cell, for recipient share a string of EPR tangle pair and each EPR tangle to status information;Often EPR described in one is tangled to being in appointing in any or at least three kinds Bell states of two distinct types of Bell state at random It is a kind of;Wherein, the EPR tangle to including:One first key particle and a second key particle;
Generation unit, the objects within confidentiality for generating quantum state;The objects within confidentiality of the quantum state includes multiple secrecy Bit;
Ciphering unit, for utilizing the first key particle to the secrecy bit encryption, the secrecy after being encrypted Object;
Transmitting element, for the objects within confidentiality after the encryption to be sent into recipient;To cause recipient to be entangled according to EPR Twine to present Bell state, the objects within confidentiality after the encryption received using the second key particle to it is decrypted and surveyed Amount, obtains the decryption object of classical state;The decryption object of the classical state includes multiple decryption bits.
In the first mode in the cards, with reference to the third aspect, if a string of EPR tangle to length be more than or Equal to the length of the objects within confidentiality, then the ciphering unit is for utilizing the first key particle in the shared cell to institute State generation unit and generate each secrecy bit encryption in objects within confidentiality, the objects within confidentiality after being encrypted;Or,
If a string of EPR tangle to length be less than the objects within confidentiality length, the ciphering unit be used for profit The privacy amplification bit in objects within confidentiality is generated to the generation unit with whole first key particles in the shared cell Encryption, obtain the objects within confidentiality after Partial encryption;Perform circulation:According to current EPR tangle to Bell state to currently Used first key particle carries out recovery operation, EPR tangle to Bell state update after, and after recipient's Share update Each EPR tangle to status information, tangle the first key particle of centering to the generation unit institute using the EPR after renewal Remaining secrecy bit in generation objects within confidentiality is encrypted, and obtains the objects within confidentiality after Partial encryption, until the secrecy pair As being fully completed encryption.
In second of mode in the cards, with reference to the first mode in the cards, in addition to:First detection eavesdropping Unit, for performing eavesdropping testing process;The eavesdropping testing process includes:Utilize the classics of the secrecy bit of inspection positions State and decryption bit-detection are with the presence or absence of eavesdropping.
In the third mode in the cards, with reference to any mode in the cards of the third aspect or first two, also wrap Include:Second detection eavesdropping unit, for according to current EPR tangle to Bell state to currently used first key particle Carry out recovery operation;EPR tangle to Bell state update after, and each EPR after recipient's Share update tangle to shape State information;EPR after being updated using inspection positions tangles secrecy of the first key particle to the inspection positions of centering Bit is encrypted;Secrecy bit after the inspection positions are encrypted is sent to recipient, to cause recipient according to institute State the EPR after inspection positions update and tangle the second key that centering is tangled to the EPR after present Bell state and renewal Particle, the secrecy bit after the inspection positions encryption received respectively to it is decrypted and measured, and obtains the detecting position Put the decryption bit at place;Perform eavesdropping testing process;The eavesdropping testing process includes:Utilize the secrecy bit of inspection positions Classical state and decryption bit-detection with the presence or absence of eavesdropping.
It is described with reference to any mode in the cards of the third aspect or first three in the 4th kind of mode in the cards Generation unit, the classical Bit String for issuing recipient is needed for randomly generating, and the classical Bit String is converted into quantum ratio Spy's string, is used as the objects within confidentiality of the quantum state;Or,
For the information for issuing recipient will to be needed to be converted into quantum bit string, and with the machine transplanting of rice in the quantum bit string Enter at least one quantum bit, be used as the objects within confidentiality of the quantum state.
Fourth aspect there is provided the device that a kind of quantum secure is transmitted, including:
Shared cell, for sender share a string of EPR tangle pair and each EPR tangle to status information;Often EPR described in one is tangled to being in appointing in any or at least three kinds Bell states of two distinct types of Bell state at random It is a kind of;Wherein, the EPR tangle to including:One first key particle and a second key particle;
Receiving unit, for receiving the objects within confidentiality after encryption;
Decryption unit, is tangled to present Bell state for the EPR in shared cell, utilizes second key Objects within confidentiality after the encryption that particle is received to the receiving unit is decrypted and measured, and obtains the decryption object of classical state;Institute The objects within confidentiality after encryption is stated obtained by described sender utilizes the first key particle to the secrecy bit encryption; The decryption object of the classical state includes multiple decryption bits.
In the first mode in the cards, with reference to fourth aspect, if a string of EPR tangle to length be more than or Equal to the length of the objects within confidentiality, then the objects within confidentiality that the receiving unit is used for after the whole encryptions of once reception;The solution Close unit is used to be tangled to present Bell state according to EPR, using the second key particle to the objects within confidentiality after encryption Decrypt and measure, obtain all decryption objects;Or,
If a string of EPR tangle to length be less than the objects within confidentiality length, the receiving unit be used for extremely Objects within confidentiality after few encryption of receiving portion twice;The decryption unit is used for, and is tangled according to EPR to present Bell state, Objects within confidentiality after the Partial encryption received using the second key particle to first time is decrypted and measured, and obtains part solution Close object;Perform circulation:To currently used second key particle carries out recovery operation, EPR tangle to Bell state After renewal, and each EPR after sender's Share update tangle to status information, tangled according to EPR after renewal to present Bell state, tangle using EPR after renewal the second key particle of centering to the secrecy pair after the Partial encryption that is currently received As decrypting and measuring, part decryption object is obtained, until the objects within confidentiality after the encryption is fully completed decryption.
In second of mode in the cards, with reference to the first mode in the cards, in addition to:First detection eavesdropping Unit, for after completing once to decrypt and measure, performing eavesdropping testing process;The eavesdropping testing process includes:Utilize The classical state and decryption bit-detection of the secrecy bit of inspection positions are with the presence or absence of eavesdropping.
In the third mode in the cards, with reference to any mode in the cards of fourth aspect or first two, also wrap Include:Second detection eavesdropping unit, for after the decryption object of classical state is obtained, to currently used second key grain Son carries out recovery operation;EPR tangle to Bell state update after, and each EPR after sender's Share update tangle to Status information;Receive the secrecy bit after the inspection positions encryption that sender sends;EPR after being updated according to inspection positions Tangle to Bell state, the EPR after being updated using inspection positions tangle to the second key particle to the inspection positions Secrecy bit after encryption is decrypted and measured;Perform eavesdropping testing process;The eavesdropping testing process includes:Utilize detection The decryption bit-detection that the classical state and the decryption unit of secrecy bit at position are obtained is with the presence or absence of eavesdropping;
Result unit is generated, in the case of eavesdropping is not present in the described second detection eavesdropping unit detection, generation has The connection object of effect.
In the 4th kind of mode in the cards, with reference to the third mode in the cards, the generation result unit is used In the decryption bit that inspection positions are removed from decryption object, effective connection object is obtained;Or,
The objects within confidentiality of the quantum state inserts quantum bit for sender in the information for needing to issue recipient and obtained , the test position is the position of at least one insertion quantum bit, the generation result unit, for from decryption object The decryption bit gone at the position of the sub- bit of insertion unless each, obtains effective connection object.
A kind of method and apparatus of quantum secure transmission provided in an embodiment of the present invention, are shared by sender and recipient A string of EPR are tangled pair and each EPR tangle to Bell state status information, every EPR tangled to random in two kinds of inhomogeneities Any of the Bell state of type any or at least three kinds Bell states, and utilize this EPR in random Bell state Tangle and objects within confidentiality is encrypted, and the objects within confidentiality after encryption is transferred to recipient;Due to EPR tangle to Bell shapes State is random, so, even if listener-in intercepts the objects within confidentiality after encryption, can not determine which kind of Bell state sender uses EPR tangle to be encrypted implement additional particles tangle attack, so as to reduce the hearer that is stolen to the effective decoding of objects within confidentiality Probability, improves the security of transmission.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be in embodiment or description of the prior art The required accompanying drawing used is briefly described, it should be apparent that, drawings in the following description are only some realities of the present invention Example is applied, for those of ordinary skill in the art, on the premise of not paying creative work, can also be according to these accompanying drawings Obtain other accompanying drawings.
Fig. 1 is a kind of flow chart of quantum secure transmission method provided in an embodiment of the present invention;
Fig. 2 is the flow chart of another quantum secure transmission method provided in an embodiment of the present invention;
Fig. 3 is a kind of structured flowchart of quantum secure transmitting device provided in an embodiment of the present invention;
Fig. 4 is the structured flowchart of another quantum secure transmitting device provided in an embodiment of the present invention;
Fig. 5 is the structured flowchart of another quantum secure transmitting device provided in an embodiment of the present invention;
Fig. 6 is the structured flowchart of another quantum secure transmitting device provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
The method and apparatus that quantum secure provided in an embodiment of the present invention is transmitted are described in detail below in conjunction with the accompanying drawings. The equipment for performing this method can be quantum computer, and it can handle quantum bit.Than " 0 " and " 1 " in traditional computer Bit, quantum bit can store more information, thus the performance of quantum computer will beyond tradition computer significantly.Certainly not Be limited to this, perform this method equipment can also include it is multiple, for example:The preparation (i.e. the generation of Entangled State) of Entangled State, can be with Completed by system etc. of tangling of nonlinear optical system, Eurytrema coelomatium system, ion trap and atomic group;Key particle Recovery operation can be completed by quantum rotation door gear, specifically, manufacture Quantum logic gates need to design a series of laser arteries and veins Punching, carries out data processing, then read result of calculation by another laser pulse to manipulate beryllium ion.
In all embodiments of the invention, the object referred to as objects within confidentiality of transmission is needed in quantum secure transmitting procedure, should The active sender of objects within confidentiality is referred to as sender, and the passive recipient of the objects within confidentiality is referred to as recipient.General ability Field technique personnel generally represent sender with Alice recipient is represented with Bob, and listener-in is represented with Eve.In addition, quantum state Expression-form have a variety of, use in embodiments of the present invention but be not limited to common quantum state expression-form | 0 >, | 1 > etc., Classical state refers to 0,1 coding, with | 0 > correspondences 0 in each embodiment, | exemplified by 1 > correspondences 1.Example, sender and recipient are equal It can be quantum computer mentioned above.
As shown in figure 1, the embodiment of the present invention provides a kind of method of quantum secure transmission, comprise the following steps:
Shared a string of the EPR of S101, Alice and Bob (Einstein, Podolsky, Rosen, Einstein, ripple Dorr this Base, Luo Xun) tangle pair and each EPR tangle to status information.
A string of EPR are tangled to that can be expressed as (a1, b1), (a2, b2) ... (ai, bi) ..., (am, bm), wherein (ai, bi) represent an EPR to (1≤i≤m, m are greater than 0 integer, represent to tangle for a string to length).Any EPR is tangled pair (ai, bi) include:One first key particle aiWith a second key particle bi, aiFor Alice ciphering process, biFor Bob decrypting process.
In fact, being tangled for the EPR comprising two particles for, its any that may be in four kinds of Bell states Kind;These four Bell states are respectively:|Φ+>, | Φ->, | Ψ+> and | Ψ->;
Wherein,
Four kinds of above-mentioned Bell states are divided into two types according to its degree of correlation, wherein | Φ+>, | Φ-> belongs to a species Type, | Ψ+> and | Ψ-> belongs to another type.
Optionally, a string of above-mentioned EPR tangle every EPR of centering and tangled to can be at random in two distinct types of Bell state it is any;Example, can be at random | Φ+> and | Ψ+Any Bell states of >, or | Φ+> and | Ψ- Any Bell states of >, or | Φ-> and | Ψ+Any Bell states of >, or | Φ-> and | Ψ-Any Bell states of >. So, whole a string of EPR tangle the combinations of all Bell states of centering and just occur 2mPossibility so that improve transmission security.
Optionally, a string of above-mentioned EPR tangle every EPR of centering and tangled to can be at random in three kinds of Bell states It is any;Example, can be at random | Φ+>, | Φ-> and | Ψ+Any Bell states of >, or | Φ+>, | Φ-> and |Ψ-Any Bell states of >, or | Ψ+>, | Ψ-> and | Φ+Any Bell states of >, or | Ψ+>, | Ψ-> and | Φ-Any Bell states of >.So, whole a string of EPR tangle the combinations of all Bell states of centering and just occur 3mPossibility, make Transmission security must be improved.
It is preferred that, every EPR that a string of above-mentioned EPR tangle centering is tangled to that can be at random | Φ+>, | Φ->, | Ψ+> and | Ψ-Any Bell states of >.So, whole a string of EPR tangle the combinations of all Bell states of centering and just occur 4m's May so that improve transmission security.
If in addition, being also in more kinds of, such as more than five kinds shapes for tangling for comprising multiple particles State, then be preferably herein, it is each to tangle to any of this more than five kinds states are at random.
Below to Alice and Bob share a string of EPR tangle to and each EPR tangle to Bell state process it is detailed Illustrate.
Alice randomly generates a string of EPR and tangled to (a1, b1), (a2, b2) ... (ai, bi) ..., (am, bm), will be therein The second particle string (b that second key particle is constituted1, b2..., bm) Bob is sent to by quantum channel, and by above-mentioned a string EPR tangles centering each EPR and tangled to residing Bell state by classical channel Send the order of the second key particle) it is sent to Bob so that and Bob knows all second key particles and each second key The corresponding Bell state of particle.In general, first carry out quantum channel transmission carries out classical transmission again, i.e., this two parts can not Simultaneous transmission.Wherein, classical channel refers to 0,1 encoding channel.
Since needs send each EPR using classical channel and tangled to residing Bell state, it is necessary to tangle EPR to institute The Bell state at place is represented with 0,1.Example, | Φ+>, | Φ->, | Ψ+> and | Ψ-> uses 00,01,10,11 tables successively Show, so as to which each Bell state is sent by classical channel.Certainly, a kind of this table is not limited in embodiments of the present invention Show mode, for example, it is also possible to represent each Bell state using the bit of more than three.
It should be noted that Alice at least needs to obtain by first key grain molecular the in above-mentioned shared procedure One particle string (a1, a2..., am), Bob at least needs to obtain by the molecular second particle string (b of the second key grain1, b2..., bm), and both are required for knowing that every EPR is tangled to present Bell state.
Based on this consideration, a string of EPR in above-mentioned shared procedure are tangled to that can be randomly generated by Alice, but not It is limited to such a mode.For example, can by other EPR equipment (can produce EPR tangle to equipment) randomly generate, afterwards, by The EPR equipment utilizations quantum channel is by (a1, a2..., am) Alice is issued, by (b1, b2..., bm) Bob is issued, and utilize warp Allusion quotation channel by each EPR tangle to Bell state be sent respectively to Alice and Bob.
S102, Alice generate the objects within confidentiality of quantum state.
The objects within confidentiality of above-mentioned quantum state includes multiple (at least two) secrecy bits.
Optionally, this step is:Alice, which is randomly generated, needs the classical Bit String for issuing Bob, by the classical Bit String Quantum bit string is converted into, the objects within confidentiality (c of quantum state is used as1, c2..., cn), wherein n represents the length of objects within confidentiality.This Place n and m (above-mentioned a string of EPR tangle to length) are without specific restriction relation:If m > n, then it can utilize above-mentioned a string The part that EPR tangles centering is encrypted to objects within confidentiality, decrypted;If m=n, then it can be tangled using above-mentioned a string of EPR The whole of centering is encrypted to objects within confidentiality, decrypted correspondingly;If m < n, then optionally, above-mentioned one is repeatedly utilized String EPR is tangled to being encrypted, decrypting to privacy amplification object, in order to strengthen the security of transmission, it is preferred that first with above-mentioned A string of EPR are tangled to being encrypted, decrypting to privacy amplification object, Posterior circle recover and update this string of EPR tangle to State, and tangled using the EPR after renewal to being encrypted, decrypting to remaining objects within confidentiality.On how encrypting and decrypting can also It is described in detail below.
Above-mentioned Bit String can be key, example, and Alice is randomly generated (to pass through as the classical Bit String of key The Bit String of allusion quotation state), and the classical Bit String is converted into quantum bit string (i.e. the Bit String of quantum state), it is used as the quantum The objects within confidentiality of state.
Because Bit String is randomly generated in itself, and in embodiments of the present invention, use is in different Bell states at random EPR, which is tangled, to be encrypted and decrypted, and both, which are combined, can further enhance the transmission security of objects within confidentiality.
Optionally, if Alice needs to be sent to the information of Bob determinations, the information is typically using classical coding, and this step can Think:Alice will need the information for issuing recipient to be converted into quantum bit string, and the radom insertion in the quantum bit string At least one quantum bit, is used as the objects within confidentiality (c of the quantum state1, c2..., cn)。
Example, the method that classical bit is converted into quantum bit can be:0 → | 0 >, 1 → | 1 >.
Because Alice needs what the information for being sent to Bob was typically to determine in itself, and in embodiments of the present invention with the machine transplanting of rice Enter quantum bit, enhance the uncertainty of information to be transmitted, and in embodiments of the present invention using random in difference The EPR of Bell state is tangled to being encrypted and decrypted, and can further enhance the security for the objects within confidentiality that need to be transmitted.
Certainly, this step can also be realized using other modes.Example, can be that Alice directly generates quantum bit String, using the quantum bit string as quantum state objects within confidentiality.
S103, Alice utilize the first key particle respectively to the secrecy bit encryption, the secrecy after being encrypted Object.
Example, Alice is successively with (a1, a2..., am) in first key particle as control bit, with above-mentioned (c1, c2..., cn) in secrecy bit as target position, do CNOT operation (the controlled not operations of controlled-NOT), thus to protect Close object encryption, the objects within confidentiality (c ' after being encrypted1, c '2... c 'n)。
Wherein CNOT operation concrete meaning is:If control bit is | 0 >, target invariant position, if control bit is | 1 >, then target bit flipping.
If m > n, sender can utilize (a1, a2..., am) in part first key particle to the objects within confidentiality In each secrecy bit encryption, the objects within confidentiality (c ' after being encrypted1, c '2... c 'n), then perform step S104.Example, Sender can utilize (a1, a2..., am) in preceding n first key particle, to (c1, c2..., cn) in n secrecy ratio Special one-to-one encryption.
If m=n, sender can utilize (a1, a2..., am) in m first key particle, to (c1, c2..., cn) in n secrecy bit encrypt correspondingly, the objects within confidentiality (c ' after being encrypted1, c '2... c 'n), then perform step Rapid S104.
If m < n, sender is through could repeatedly occur to exemplified by the objects within confidentiality after all encryptions.
First, sender can utilize (a the 1st time1, a2..., am) in m first key particle, to (C1, c2..., cn) in preceding m secrecy bit encryption, obtain the objects within confidentiality (c ' after Partial encryption1, c '2... c 'm);
Afterwards, following steps are circulated:
In order to clearly describe this circulation, it is assumed that to encrypt secrecy bits whole in objects within confidentiality, D (D >=2) need to be encrypted altogether It is secondary, now (D-1) * m < n≤D*m, wherein, D represents it is this time which time encryption.(represented for any time therein with i, i >=2) circulate for:
(a1) recipient decrypt after the completion of, sender according to current EPR tangle to Bell state to currently used First key particle carry out recovery operation.
Because the process of encryption can cause the change of first key particle, so sender uses when needing to preceding one-time pad encryption The first key particle crossed carries out recovery operation.If it should be noted that in the absence of eavesdropping, then recovery operation can be by first Key particle reverts to the first key particle before encryption.
This step is specifically as follows:
It is to present Bell state if current EPR is tangled | Φ+>, then to currently used first key particle DoRotation process;
It is to present Bell state if current EPR is tangled | Φ->, then to currently used first key particle DoRotation process;
It is to present Bell state if current EPR is tangled | Ψ+>, then to currently used first key particle DoRotation process;
It is to present Bell state if current EPR is tangled | Ψ->, then to currently used first key particle DoRotation process.
But recovery operation is not limited to a kind of this mode of above-mentioned offer, reverts to first key particle as long as ensure that First key particle before encryption.
, further, can also be in time to Alice and Bob institute instantly for the security of enhancing quantum secure transmission A string of shared EPR are tangled to be updated to residing Bell state, is referred to (a2).
(a2) EPR tangle to Bell state update after, and each EPR after recipient's Share update tangle to state Information.
Optionally, each instantly shared to Alice and Bob both sides Alice first key particle, be actually pair (a1) the first key particle after recovering in, is processed using a kind of operation for updating Bell state at random respectively, described to cause EPR belonging to first key particle is tangled to be updated to present Bell state;And tangle each EPR after renewal to institute The status information being in is sent to Bob.Accordingly, Bob need to only receive each EPR after the renewal sent by Alice and tangle pair Present status information.
Example, updating the operation of Bell state, there is following Z, I, X, tetra- kinds of Yi, Alice first key particle is implemented The change of caused Bell state is referring to table 1 after these four operations.
Table 1
The above-mentioned four kinds of operations simply enumerated, because the information entrained by Bell state is non-local, it is impossible to pass through office Domain operation is extracted, and mutually conversion is not while change the locality of system between four kinds of operations of the above can realize four kinds of Bell states Matter.Aforesaid operations are the operation that above-mentioned condition is met known to current quantum mechanics, as quantum mechanics develops, however not excluded that exist Other meet the possibility of the operation of above-mentioned condition.
In addition, each EPR after the renewal tangle present Bell state can be used for objects within confidentiality encryption and Decryption.
Optionally, EPR tangle to renewal can also be completed by Bob.Specifically, Bob both sides are shared each second Key particle, is actually to the second key particle after recovery in S105 described below (b1), respectively at random using a kind of The operation for updating Bell state is processed, and present Bell state is obtained with causing the EPR belonging to the second key particle to tangle To update;And each EPR after renewal is tangled Alice is sent to present status information.And Alice need to only receive by Each EPR after the renewal that Bob is sent is tangled to present status information.
(a3) sender is maintained secrecy using the first key particles for tangling centering of the EPR after renewal to the residue in objects within confidentiality Bit is encrypted, and obtains the objects within confidentiality after Partial encryption.
If specifically, i < D (i.e. this encrypts non-last time), each of centering is tangled using m EPR after renewal Individual first key particle is to (i-1) * m+1 in objects within confidentiality, (i-1) * m+2 ... i*m, common m secrecy bit is carried out This encryption, obtains the objects within confidentiality (c ' after Partial encryption(i-1)*m+1, c '(i-1)*m+2... c 'i*m);
If i=D (this is encrypted as last time), (i-1) * of n- before centering m are tangled using m EPR after renewal First key particle is to (i-1) * m+1 in objects within confidentiality, (i-1) * m+2 ... n, common n- (i-1) * m secrecy bits This encryption is carried out, the objects within confidentiality (c ' after Partial encryption is obtained(i-1)*m+1, c '(i-1)*m+2... c 'n)。
Obtained secrecy bit is encrypted by above-mentioned D times, can be performed step S104 after each encryption terminates, divide D times Complete.
Objects within confidentiality after the encryption is sent to Bob by S104, Alice.
Example, Alice is by quantum channel by the objects within confidentiality (c ' after encryption1, c '2... c 'n) it is sent to Bob.
It should be noted that for above-mentioned m > n, m=n both of these case, can obtain whole objects within confidentiality (c′1, c '2... c 'n) after, it is then forwarded to Bob.However, for m < n such cases, being preferably, in encryption completion every time Afterwards, the privacy amplification object after encryption is just sent to Bob at once, until being sent.
Accordingly, Bob receives the objects within confidentiality (c ' after the encryption sent by Alice1, c '2... c 'n).Equally, for Above-mentioned m > n, m=n both of these case, can once receive the objects within confidentiality (c ' after all encryptions1, c '2... c 'n)。 However, for m < n such cases, being preferably, Bob is by multiple reception.
Ignore interference and unrelated to the invention other behaviour of the transmission channel to channel information in embodiments of the present invention Make, the objects within confidentiality that the objects within confidentiality that Alice is sent is received with Bob is represented using identical symbol.
S105, Bob are tangled to present Bell state according to each current EPR, utilize (b1, b2..., bm) in second Objects within confidentiality after the encryption that key particle is received to it is decrypted and measured, and obtains the decryption object of classical state.
The decryption object of the classical state includes multiple decryption bits.
For the sake of clarity, the objects within confidentiality after encryption Bob received is referred to as receiving object, is still indicated as (c '1, c ′2... c 'n), wherein, any one c 'j(1≤j≤n) is referred to as receiving bit.
Because n and m size does not have specific restriction relation, so point situation considers that the second key particle compares with receiving Special corresponding relation.
If m > n, recipient can be tangled to present Bell state according to each current EPR, utilize (b1, b2..., bm) in preceding n the second key particles, to (c '1, c '2... c 'n) in n receive bit decrypt correspondingly, obtain Whole decryption objects;
If m=n, recipient can be tangled to present Bell state according to each current EPR, utilize (b1, b2..., bm) in m the second key particles, to (c '1, c '2... c 'n) in n receive bit and decrypt correspondingly, obtain complete The decryption object in portion;
If m < n, so that recipient can just receive through D times and all receive object as an example.
First, the 1st receiving portion of recipient receives object (comprising the secrecy bit after m encryption), and according to current EPR is tangled to present Bell state, and the 1st solution is carried out to the objects within confidentiality after Partial encryption using m the second key particles It is close and measure, obtain part decryption object;
Posterior circle following steps:
In order to clearly describe this circulation, it is assumed that decrypting all reception objects, need to decrypt D (D >=2) altogether secondary, now (D- 1) * m < n≤D*m, wherein, D represents it is this time which time decryption.For it is therein it is any time (represented with i, the circulation of i >=2) and Speech:
(b1) recipient is to currently used second key particle carries out recovery operation.
This step is specifically as follows:
Bob is to currently used second key particle is doneRotation Turn operation.
But recovery operation be not limited to it is above-mentioned this is a kind of, it is any to ensure that the reverted to the second key particle before decryption Two key particles.
(b2) EPR tangle to Bell state update after, and each EPR after sender's Share update tangle to state Information.
This step may be referred to above-mentioned step (a2), be not added with repeating herein.
(b3) the second key that centering is tangled to present Bell state, using EPR after renewal is tangled according to EPR after renewal Particle is decrypted and measured to the objects within confidentiality after Partial encryption, obtains part decryption object.
If specifically, i < D (i.e. this decrypts non-last time), the of centering is tangled using m EPR after renewal The m reception bit (c ' that two key particles are received to ith(i-1)*m+1, c '(i-1)*m+2... c 'i*m) be decrypted and survey Amount, obtains part decryption object;
If i=D (this decryption for last time), (i-1) * of n- before centering m individual the are tangled using m EPR after renewal N- (i-1) the * m that two key particles are received to ith receive bit (c '(i-1)*m+1, c '(i-1)*m+2... c 'n) carry out this Secondary decryption is simultaneously measured, and obtains part decryption object.
Example, if using CNOT operation in the ciphering process of Alice in step s 103, Bob decrypting processes are such as Under:
Bob is to receiving object (c '1, c '2... c 'n) in each receive bit be done as follows respectively:
If receiving bit c 'jCorresponding EPR is tangled to (aj, bj) residing for Bell state be | Φ±>, example, if Bob By classical channel receive in each Bell state to should receive bit for 00 or 01, then Bob is with the second key particle bjMake Control bit, receives bit c 'jMake target position, do CNOT operation, recover the initial quantum state c of Alice transmissionsj(regardless of whether depositing In eavesdropping, all represent that Bob can decrypt obtained quantum state herein), and measure, obtain cjCorresponding classical bit.
If receiving bit c 'jCorresponding EPR is tangled to (aj, bj) residing for Bell state be | Ψ±>, example, if Bob By classical channel receive in each Bell state to should receive bit for 10 or ll, then Bob is with the second key particle bjMake Control bit, receives bit c 'jMake target position, do non-CNOT operation, this non-CNOT operation concrete meaning is:If control bit is | 0 >, then target bit flipping, if control bit is | and 1 >, target invariant position, recover the initial quantum state of the transmission of sender cj, and measure, obtain cjCorresponding classical bit.
If above-mentioned classical bit be converted into the method for quantum bit for 0 → | 0 >, 1 → | 1 >, then above-mentioned measuring method For | 0 >, | 1 > } base measurement, for quantum bit to be changed into classical bit.
A kind of method of quantum secure transmission provided in an embodiment of the present invention, it is shared a string by sender and recipient EPR is tangled pair and each EPR tangle to status information, every EPR tangled to being in two distinct types of Bell state at random Any of any or at least three kinds Bell states, and tangled using this EPR in random Bell state to secrecy Object is encrypted, and the objects within confidentiality after encryption is transferred into recipient;Due to EPR tangle to Bell state be it is random, So, even if listener-in intercepts the objects within confidentiality after encryption, additional particles can not be implemented and tangle attack, be stolen so as to reduce Hearer improves the security of transmission to the probability of the effective decoding of objects within confidentiality.
The transmission of objects within confidentiality can be completed by above-mentioned steps, but now Alice and Bob is not known in above-mentioned mistake With the presence or absence of eavesdropping in journey.If in the absence of eavesdropping, Bob can generate effective connection object;If conversely there is eavesdropping, solve Close object invalidation, above-mentioned decryption object can be abandoned by Bob and Alice resends objects within confidentiality, can with both it is temporary transient in Open close letter etc..
With reference to Fig. 2, the embodiments of the invention provide a kind of quantum secure transmission method for being capable of detecting whether eavesdropping.
S201, Alice and Bob share a string of EPR tangle pair and each EPR tangle to Bell state.
Due to the circulation for detecting eavesdropping can be related in embodiments of the present invention, so, a string of EPR entangle in this step Twine to being expressed asWhereinRepresent an EPR to (1≤i≤ M, m are greater than 0 integer, represent to tangle for a string to length, superscript 1 is used to represent to be used in the 1st circulation EPR to).Any EPR is tangled pairIncluding:One first key particleWith a second key particleFor Alice ciphering process,Decrypting process for Bob.
In addition to above-mentioned expression symbol is different, others refer to above-mentioned steps S101, therefore are not added with repeating.
S202, Alice generate the objects within confidentiality (c of quantum state1, c2..., cn)。
This step is not added with repeating with above-mentioned steps S102.
Circulation for detecting eavesdropping needs to carry out step S203- step S207, and the circulation at least performs once, and with Represent which time performs this circulation in lower step with L, and regard L as the upper angle of all kinds of physical quantitys in embodiments of the present invention Mark.Wherein, it is necessary to which all secrecy bits in the objects within confidentiality generated to Alice are transmitted during L=1;And during L >=2, It is to check the operation eavesdropped to perform, it is only necessary to the guarantor corresponding to test position (bit position i.e. for detecting eavesdropping) Close bit is transmitted, and this is accomplished by Alice and Bob and shared for detecting the bit position (referring to step S208) eavesdropped, one As step S208 can the 1st time circulate after, and the 2nd time circulation start before perform, but not limited to this order, for example, also Can be in the 1st cyclic process before step S206.
S203, Alice are to secrecy bit encryption.
If the 1st time performs this and circulate, i.e. L=1, then this step refers to above-mentioned steps S103, i.e. Alice and utilizes first Key particleSuccessively to the secrecy bit in objects within confidentialityEncryption, until all secrecy bits all complete encryption, is added Objects within confidentiality after close
During same m > n or m=n, the objects within confidentiality after can once being encrypted, then perform step S204.During m < n, Need just access the objects within confidentiality after all encryptions D times, step S204 is carried out after each encryption, need to perform D altogether Secondary step S204.
If the 2nd time and performing this circulation with last time, i.e. during L >=2, then this step using inspection positions through step S208 After renewal EPR tangle centering first key particle corresponding secrecy bit is carried out this encryption.For the mistake how to encrypt Journey, still may be referred to step S103.
Wherein, test position can thus be only needed to open in the 2nd circulation in each cyclic process of L >=2 with identical Before beginning, Alice and Bob share one-time detection position;Certainly, test position also may be used in each cyclic process of L >=2 With difference, so it is accomplished by when each circulation starts, Alice and Bob share this test position utilized.
The method of test position is shared for Alice and Bob, no matter objects within confidentiality is randomly generated, or it is determined that Information in addition quantum bit obtain, can be in the following way:
Optionally, Alice determines all test positions at random, and the test position of its determination is sent by classical channel To Bob;
Or it is optional, Bob determines all test positions at random, and the test position of its determination is sent out by classical channel Give Alice;
Or optional, Alice random determining section point test positions, the test position of its determination is sent out by classical channel Bob is given, the test position of its determination is sent to Alice by Bob random determining section point test positions by classical channel, Alice and Bob regard all unduplicated test positions as all test positions respectively.
If objects within confidentiality be it is determined that information in addition quantum bit obtain, this is preferably a step:Alice remembers The position of record at least one quantum bit, and it is sent to Bob as the test position.
In addition, the recovery operation to first key particle will be described in detail in following steps S206.
Each secrecy bit after encryption is sent to Bob by S204, Alice, accordingly, and Bob receives the encryption of Alice transmissions Each secrecy bit afterwards.
Describe for convenience, being collectively referred to as of the secrecy bit after all encryptions that will be received by Bob receives object, Secrecy bit after each is encrypted is referred to as receiving bit.
If L=1, in the case of m > n or m=n, the reception object that Bob is received isIn m < n In the case of, Bob, which divides D times, receives the reception object.
If the entirety that the reception object that L >=2, Bob is received is made up of the reception bit of inspection positions.
S205, Bob are decrypted and measured to the secrecy bit after the encryption that receives.
If L=1, this step is identical with step 105, in the case of m > n or m=n, obtains the solution of all classical states Close object, includes the decryption bit of n classical state;In the case of m < n, divide D times and can obtain whole decryption objects.
If L >=2, this step is the Bell state according to inspection positions EPR error correction pair, using inspection positions through S208 EPR, which tangles the second key particle of centering this is carried out to the secrecy bit after corresponding encryption, after renewal decrypts and measures.Its In specific decrypt can also refer to step S105 with the process of measurement.In addition, to the recovery operation of the second key particle will with It is described in detail in lower step S207.
S206, Alice are to currently used first key particle carries out recovery operation.
Specifically, for L (L >=1) secondary circulation, Alice according to current EPR tangle to Bell state to currently Recovery operation is carried out through used (i.e. in step S203 used) first key particle.Work as that is, this step is basis Preceding EPR tangle to Bell state, carry out recovery operation to used first key particle in the L times cyclic process, it is recovered after First key particle will next time (the L+1 times) circulation in encryption.
Example, be to present Bell state if current EPR is tangled | Φ+>, then to used in the L times circulation First key particle is doneRotation process;
It is to present Bell state if current EPR is tangled | Φ->, then to the first key used in the L times circulation Particle is doneRotation process;
It is to present Bell state if current EPR is tangled | Ψ+ >, then to the first key used in the L times circulation Particle is doneRotation process;
It is to present Bell state if current EPR is tangled | Ψ->, then to the first key used in the L times circulation Particle is doneRotation process.
S207, Bob are to currently used second key particle carries out recovery operation.
Specifically, for L (L >=1) secondary circulation, Bob is to currently used (i.e. in step S205 used ) the progress recovery operation of the second key particle;That is, this step is to used second key in the L times cyclic process Particle carries out recovery operation.
Example, Bob is done to used second key particle in the L times cyclic process Rotation process.
By above S206, S207, at any (i-th) positionCirculated with the L times at the positionBoth present states are identical when without eavesdropping, and (herein identical is theoretic, have ignored the interference in transmission Etc. factor, can actually there is a certain degree of error), may be different when there is eavesdropping.
S208, sender or recipient update EPR tangle to Bell state, and each EPR after Share update tangles pair Status information.
This step specifically may be referred to (a2) in above-described embodiment S103.
The first key particle that EPR after renewal tangles centering is used for the encryption of subsequent cycle, and the EPR after renewal is tangled pair In the second key particle be used for subsequent cycle decryption.
It should be noted that during due to above-mentioned multiple circulation, Bob is decrypted in step S205 and measures what is obtained As a result the detection eavesdropping process after being used for, so last time circulation need not proceed to S208, it is only necessary to go to step S205 and either step afterwards.
S209, Alice and Bob perform eavesdropping testing process.
Wherein, the eavesdropping testing process includes:Utilize the classical state and decryption bit of the secrecy bit of inspection positions Detect whether there is eavesdropping.
Optionally, 1 circulation is if desired carried out, then in the case of m > n or m=n, can be performed after S205 is completed This step.Specifically:After the completion of encrypting and decrypting, Alice and Bob perform eavesdropping testing process, terminate if eavesdropping is detected; If not detecting eavesdropping now it is determined that for without eavesdropping.However, it is necessary to D encrypting and decrypting ability in the case of m < n Transmission can be completed, can be with if eavesdropping is not detected at this point it is possible to after the completion of encrypting and decrypting each time, perform this step Proceed encrypting and decrypting next time, terminate if eavesdropping is detected.
Optionally, in order that testing result it is more accurate, can be with more than 2 times circulations.If desired pass through more than 2 times Circulation, then after all circulations are completed, Alice and Bob perform eavesdropping testing process, terminate if eavesdropping is detected;If following After ring is complete, eavesdropping is still not detected by, then performs S210.
Example, it is assumed that n=m=100, cycle-index are that 10, test position is all adopted for 50 totally in each cyclic process With this 50, then bit is corresponding with the classical state of secrecy bit respectively compares for obtain 50 decryption during latter 9 times are circulated, and obtains 9*50 comparative result, if the consistent degree shown by this 9*50 comparative result is more than 95%, it is determined that in the absence of surreptitiously Listen;It is on the contrary, it is determined that to there is eavesdropping.
And example, the classical state pair of the 50 decryption bits obtained during can also 10 times be circulated respectively with secrecy bit It should compare, obtain 10*50 comparative result, if the consistent degree shown by this 10*50 comparative result is more than 95%, It is determined that in the absence of eavesdropping;It is on the contrary, it is determined that to there is eavesdropping.
It is above-mentioned simply to list several optional modes, not limited to this of the embodiment of the present invention.
It can be used and mode for how Alice and Bob performs eavesdropping testing process:
Optionally, the classical state of the secrecy bit of inspection positions is sent to Bob, the secrecy that Bob is received by Alice The classical state of bit and the decryption bit of inspection positions are compared, and Bob determines whether there is eavesdropping according to comparative result.
Optionally, the decryption bit of inspection positions is sent to Alice, the test position that Alice is received by Bob The classical state of the decryption bit at place and the secrecy bit of inspection positions is compared, and Alice determines whether according to comparative result In the presence of eavesdropping.
If there is eavesdropping, terminate;Step S210 is performed if in the absence of eavesdropping.
If S210, detection are without listener-in's presence is found, Bob generates effective connection object.
Above-mentioned effective connection object refers to that Alice needs to inform Bob connection object originally.
Optionally, if what Alice needed to be sent to Bob connection objects in above-mentioned S202 is classical state that it is randomly generated Bit String, then in this step, in the case where eavesdropping is not present in detection, the decryption object that Bob is obtained after only the 1st time need to be circulated The middle decryption bit for removing all inspection positions, obtains effective connection object.
Optionally, if Alice needs to be sent to the information being to determine of Bob connection objects, this step in above-mentioned S202 In, in the case where eavesdropping is not present in detection, Bob will need to be only gone at the position of the sub- bit of insertion unless each in decryption object Bit is decrypted, effective connection object is obtained.Currently this premise is:Test position inserts the position of quantum bit at least one Put.
If Eve carries out tangling attack, make auxiliary particle together with C particle entangleds, now auxiliary particle and GHZ states are entangled Tangle up constructs new Entangled State.On the one hand, if listener-in measures auxiliary particle, whole Entangled State is necessarily caused to collapse Contracting, now situation is as direct measurement above.
, further, can be with for the security of enhancing quantum secure transmission on the basis of any of the above-described embodiment A string of in time instantly shared with Bob to Alice EPR are tangled to be updated to residing Bell state.It is specific updated Journey may be referred to (a2) in above-described embodiment step S103, be not added with repeating herein.
Wherein, a string of EPR after the renewal tangle centering each EPR and tangled can be used for it to present Bell state The encryption and decryption of his objects within confidentiality.It is, of course, also possible to do other purposes as needed.
It is further to note that just each step is numbered for clarity of description in the embodiment of the present invention, but It is not intended as the restriction of order.
Safety analysis for above-mentioned technology is as follows, and analysis below is tangled to present Bell state as four kinds using EPR Exemplified by type:
Assuming that channel key shared procedure is safe, then:
(1) intercept and capture measurement or intercept and capture multi-sending attack:Listener-in Eve is intercepted and captured and is sent to by Alice in Bob objects within confidentiality Quantum bit is that it is measured, and the particle after measurement is issued into Bob or new personation quantum bit is sent to Bob.
Assuming that channel key isQuantum bit is | 0 >, by by Control non-door operation (cryptographic operation) new state be
When listener-in is not present, Alice and Bob mutual trust entropy are IAB=S (A ' B ':C)=S (A ' B ')+S (C ')-S (A ' B ' C ')=2, Alice and Eve mutual trust entropy is IAE=0.In the presence of listener-in, then Alice and Bob mutual trust entropy is IAB=0, Alice and Eve mutual trust entropy are IAE=2.
Thus, in the presence of eavesdropping, using the circulate operation of detection eavesdropping, listener-in can be found.Specifically, Eve It is found, is sent out during T S bit detection eavesdropping with 1/2 probability during once (bit) detection eavesdropping Existing probability is 1- (1/2) T*S.
(2) additional quantum bit tangles attack:Listener-in Eve tangles additional quantum bit in being sent to Bob's by Alice Quantum bit, and be expected that by measuring additional quantum bit, obtain the information that Alice issues Bob.
It is in the state at shared key particle | Φ+During >, odd number wheel can obtain information, and even number wheel can not be obtained Win the confidence breath.Because EPR is tangled to employing four kinds of Bell states | Φ+>, | Φ->, | Ψ+> and | Ψ->, and by above-mentioned S109 updates to the Bell state residing for shared key particle so that Eve obtains correct information in odd number wheel with 1/2 probability. Thus design safety of the present invention.
Assuming that channel key shared procedure is dangerous, then:
Attack strategies:In the shared procedure of first key particle and the second key particle, tangled with EPR to by Alice Exemplified by generation, if Eve intercepts and captures the second key particle that Bob is sent to by Alice, retain the particle, oneself random selection one Individual Bell state, and retain one of particle another particle is sent to Bob.Objects within confidentiality process after transmission encryption In, Eve intercepts and captures the objects within confidentiality after the encryption of quantum channel transmission, implements the operation as Bob and measures to be maintained secrecy Quantum bit in object.Meanwhile, the particle retained with oneself is made the quantum bit in control bit, the objects within confidentiality of intercepting and capturing and makees mesh Mark, does a CNOT operation, the qubit after aforesaid operations are handled is to Bob.
Because shared key particle can choose four kinds of Bell states, so above-mentioned eavesdropping mode will be withProbability introduce mistake.
Visible by above-mentioned analysis, using above-mentioned technical proposal, can resist can resist intercepting and capturing measurement, intercept and capture multi-sending attack Attack is tangled with additional particles;Shared key particle can in time recover and easily update simultaneously.
The embodiment of the present invention additionally provides device corresponding with the above method, and the unit difference included in device For performing each step in the above method.
With reference to Fig. 3, the embodiments of the invention provide a kind of device 30 of quantum secure transmission, can as sender dress Put, including:
Shared cell 31, for sender and recipient share a string of EPR tangle pair and each EPR tangle to state Information;Each EPR tangles any or at least three kinds Bell states to being in two distinct types of Bell state at random Any of;The EPR tangle to including:One first key particle and a second key particle;
Generation unit 32, the objects within confidentiality for generating quantum state;The objects within confidentiality of the quantum state includes multiple protect Close bit;
Ciphering unit 33, for utilizing the first key particle in the shared cell 31 in the generation unit 32 Secrecy bit encryption, the objects within confidentiality after being encrypted;
Transmitting element 34, recipient is sent to for the objects within confidentiality after the encryption that obtains the ciphering unit 33;With So that recipient is tangled to present Bell state according to EPR, after the encryption received using the second key particle to it Objects within confidentiality decrypt and measure, obtain the decryption object of classical state;The decryption object of the classical state includes multiple decryption ratios It is special.
Optionally, the generation unit 32, the classical Bit String for issuing recipient is needed for randomly generating, by the warp Allusion quotation Bit String is converted into quantum bit string, is used as the objects within confidentiality of the quantum state.In the case of so, classical Bit String is random Produce, key can be used as.
Or optional, the generation unit 32, for the information for issuing recipient will to be needed to be converted into quantum bit string, And in the quantum bit string at least one quantum bit of radom insertion, be used as the objects within confidentiality of the quantum state.This feelings It is, by the information of determination, uncertain element to be added, with the security of enhancement information under condition.
A kind of device of quantum secure transmission provided in an embodiment of the present invention, it is shared a string by shared cell and recipient EPR is tangled pair and each EPR tangle to status information, every EPR tangled to being in two distinct types of Bell state at random Any of any or at least three kinds Bell states, ciphering unit is tangled using this EPR in random Bell state Objects within confidentiality is encrypted, the objects within confidentiality after encryption is transferred to recipient by transmitting element;Due to EPR tangle to Bell State be it is random, so, though listener-in intercept encryption after objects within confidentiality, can not the additional quantum bit of successful implementation entangle Attack is twined, so as to reduce probability of the hearer to the effective decoding of objects within confidentiality that be stolen, the security of transmission is improved.
Optionally, if a string of EPR tangle to length be more than or equal to the objects within confidentiality length, it is described plus Close unit 33 is used to generate objects within confidentiality to the generation unit 32 using the first key particle in the shared cell 31 In each secrecy bit encryption, the objects within confidentiality after being encrypted;Because now ciphering unit 33 once just completes to protect to all The encryption of close bit, so transmitting element 34 will once send the objects within confidentiality after all encryptions.
Or it is optional, if a string of EPR tangle to length be less than the length of the objects within confidentiality, the encryption Unit 33 is used to generate objects within confidentiality to the generation unit 32 using whole first key particles in the shared cell 31 In privacy amplification bit encryption, obtain the objects within confidentiality after Partial encryption;Perform circulation:According to current EPR tangle to Bell state to currently used first key particle carries out recovery operation, EPR tangle to Bell state update after, and connect Each EPR after debit's Share update tangle to status information, the first key particle of centering is tangled using the EPR after renewal The remaining secrecy bit generated to the generation unit 32 in objects within confidentiality is encrypted, and obtains the secrecy pair after Partial encryption As untill the objects within confidentiality is fully completed encryption.Because now ciphering unit 33 could be complete through multiple (at least twice) Objects within confidentiality after the encryption of paired all secrecy bits, the Partial encryption that ciphering unit 33 is obtained after each encryption is all Transmitting element 34 is transmitted to, so, the objects within confidentiality that transmitting element 34 need to be after it could repeatedly complete to send all encryptions.
Further, as shown in figure 4, said apparatus can also include:First detection eavesdropping unit 35, for performing eavesdropping Testing process;The eavesdropping testing process includes:Using secrecy bit in the generation unit 32 of inspection positions classical state and Recipient 40 decrypts obtained decryption bit-detection with the presence or absence of eavesdropping.
On the basis of any of the above-described device embodiment, as shown in figure 4, can also include:Second detection eavesdropping unit 36, For according to current EPR tangle to Bell state to currently used first key particle carries out recovery operation;Entangled in EPR Twine to Bell state update after, each EPR after Share update tangle to status information;After being updated using inspection positions The secrecy bit of the inspection positions is encrypted the first key particle that EPR tangles centering;By the inspection positions Secrecy bit after encryption is sent to recipient, is tangled pair with the EPR after causing recipient to be updated according to the inspection positions EPR after present Bell state and renewal tangles the second key particle of centering, the detection received respectively to it Secrecy bit after being encrypted at position is decrypted and measured, and obtains the decryption bit of the inspection positions;Perform eavesdropping detection stream Journey;The eavesdropping testing process includes:Classical state and recipient using secrecy bit in the generation unit 32 of inspection positions 40 decrypt obtained decryption bit-detection with the presence or absence of eavesdropping.
It should be noted that the first above-mentioned detection eavesdropping detection eavesdropping unit 36 of unit 35 and second can be set wherein Any one, can also two be respectively provided with.
Optionally, above-mentioned ciphering unit 33 and second detection eavesdropping unit 36 be used to according to current EPR tangle to Bell state to currently used first key particle carries out recovery operation, specifically for:
It is to present Bell state if current EPR is tangled | Φ+>, then to currently used first key particle DoRotation process;
It is to present Bell state if current EPR is tangled | Φ->, then to currently used first key particle DoRotation process;
It is to present Bell state if current EPR is tangled | Ψ+>, then to currently used first key particle DoRotation process;
It is to present Bell state if current EPR is tangled | Ψ->, then to currently used first key particle DoRotation process.
Optionally, above-mentioned ciphering unit 33 and second detection eavesdropping unit 36 be used to EPR tangle to Bell state more After new, each EPR after Share update tangle to status information, specifically for:
Optionally, for being processed at random using a kind of operation for updating Bell state to first key particle, to cause State the EPR belonging to first key particle and tangle and present Bell state is updated;And tangle each EPR after renewal pair Present status information is sent to recipient;
Optionally, tangled for receiving each EPR after recipient updates to present status information.
With reference to Fig. 5, the embodiment of the present invention additionally provides the device 40 of another quantum secure transmission, can be used as recipient Device, including:
Shared cell 41, for sender share a string of EPR tangle pair and each EPR tangle to status information; Each EPR is tangled to being at random in any or at least three kinds Bell states of two distinct types of Bell state It is any;Wherein, the EPR tangle to including:One first key particle and a second key particle;
Receiving unit 42, for receiving the objects within confidentiality after encryption;
Decryption unit 43, tangles to present Bell state for the EPR in shared cell 41, utilizes described second Objects within confidentiality after the encryption that key particle is received to the receiving unit 42 is decrypted and measured, and obtains the decryption pair of classical state As;Objects within confidentiality after the encryption utilizes the first key particle to the secrecy bit encryption institute by described sender 30 Obtain;The decryption object of the classical state includes multiple decryption bits.
A kind of device of quantum secure transmission provided in an embodiment of the present invention, it is shared a string by shared cell and recipient EPR is tangled pair and each EPR tangle to status information, every EPR tangled to being in two distinct types of Bell state at random Any of any or at least three kinds Bell states, so, even if listener-in intercepts the objects within confidentiality after encryption, Can not the additional quantum bit of successful implementation tangle attack, so as to reduce probability of the hearer to the effective decoding of objects within confidentiality that be stolen, Improve the security of transmission.
Optionally, if a string of EPR tangle to length be more than or equal to the objects within confidentiality length, it is described to connect Receiving unit 42 is used to once receive the objects within confidentiality after all encryptions;The decryption unit 43 is used to be tangled to residing according to EPR In Bell state, the objects within confidentiality after encryption is decrypted and measured using the second key particle, obtain all decryption objects.
Or it is optional, if a string of EPR tangle to length be less than the length of the objects within confidentiality, due to sender 30 send several times, so the objects within confidentiality that the receiving unit 42 is used for after receiving portion encryption at least twice;It is described Decryption unit 43 is used for, and is tangled according to EPR to present Bell state, using the second key particle to receiving unit 42 Objects within confidentiality after the Partial encryption once received is decrypted and measured, and obtains part decryption object;Perform circulation:To currently Carry out recovery operation through used second key particle, EPR tangle to Bell state update after, and after sender's Share update Each EPR tangle to status information, tangled and tangled to present Bell state, using EPR after renewal according to EPR after renewal Second key particle of centering is decrypted and measured to the objects within confidentiality after the Partial encryption that is currently received, obtains part decryption pair As untill the objects within confidentiality after the encryption is fully completed decryption.
Further, it can also include on the basis of any of the above-described embodiment of recipient's device 40 as shown in Figure 6:The One detection eavesdropping unit 44, for after completing once to decrypt and measure, performing eavesdropping testing process;The eavesdropping detection stream Journey includes:Using the classical state and decryption bit-detection of the secrecy bit of inspection positions with the presence or absence of eavesdropping..
Further, it can also include on the basis of any of the above-described embodiment of recipient's device 40 as shown in Figure 6:The Two detection eavesdropping units 45, for after the decryption object of classical state is obtained, to currently used second key particle Carry out recovery operation;EPR tangle to Bell state update after, and each EPR after sender's Share update tangle to shape State information;Receive the secrecy bit after the inspection positions encryption that sender sends;EPR after being updated according to inspection positions entangles Twine to Bell state, the EPR after being updated using inspection positions tangle to the second key particle the inspection positions are added Secrecy bit after close carries out this and decrypts and measure;Perform eavesdropping testing process;The eavesdropping testing process includes:Utilize inspection The decryption bit-detection that the classical state and the decryption unit of the secrecy bit at the location place of putting are obtained is with the presence or absence of eavesdropping;
Result unit 46 is generated, it is raw in the case of eavesdropping is not present in the described second detection eavesdropping detection of unit 45 Into effective connection object.
It should be noted that the first above-mentioned detection eavesdropping detection eavesdropping unit 45 of unit 44 and second can be set wherein Any one, can also two be respectively provided with.
The optional generation result unit 46, the decryption bit for removing inspection positions from decryption object is obtained To effective connection object;
Or it is optional, the objects within confidentiality of the quantum state is sender's insertion in the information for needing to issue recipient What sub- bit was obtained, the test position inserts the position of quantum bit at least one, and the generation result unit 46 is used for The decryption bit at the position of the sub- bit of insertion unless each is removed from decryption object, effective connection object is obtained.
Above-mentioned decryption unit 43 and it is above-mentioned second detection eavesdropping unit 45 be used to according to current EPR tangle to Bell state To currently used second key particle carries out recovery operation;Specifically for:
To currently used second key particle is done Rotation process.
Above-mentioned decryption unit 43 and it is above-mentioned second detection eavesdropping unit EPR tangle to Bell state update after, share more Each EPR after new tangle to status information;Specifically for:
Optionally, a string of EPR after the renewal for receiving sender's transmission tangle centering each EPR and tangled to present Status information be sent to recipient;
Or it is optional, for each the second key particle to reservation, utilize a kind of renewal Bell state at random respectively Operation is processed, to cause a string of EPR tangle centering each EPR and tangled to be updated to present Bell state;And will A string of EPR after renewal tangle centering each EPR and tangled is sent to sender to present status information.
In addition, the embodiment of the present invention additionally provides a kind of device of the quantum secure transmission of sender side, including:
Memory, the processor being connected with the memory, and the transmitter being connected with processor;
Wherein, store that a string of EPR that sender and recipient share are tangled pair and each EPR entangles in the memory Twine to status information;Each EPR is tangled to being in two distinct types of Bell state any or at least at random Any of three kinds of Bell states;The EPR tangle to including:One first key particle and a second key particle;Also Batch processing code is stored, and the processor is used to call the program code stored in the memory, performs generation quantum The objects within confidentiality of state, the objects within confidentiality of the quantum state includes multiple secrecy bits, and utilizes the first key particle pair The secrecy bit encryption, the method for the objects within confidentiality after being encrypted;Transmitter is used for the encryption for obtaining the processor Objects within confidentiality afterwards is sent to recipient.
Optionally, the processor is additionally operable to call the program code stored in the memory, performs eavesdropping detection stream Journey;The eavesdropping testing process includes:Whether deposited using the classical state and decryption bit-detection of the secrecy bit of inspection positions In eavesdropping.
Optionally, the processor is additionally operable to call the program code stored in the memory, after by the encryption Objects within confidentiality be sent to after recipient, processor be used for according to current EPR tangle to Bell state to currently used First key particle carry out recovery operation;
The memory be additionally operable to be stored in EPR tangle to Bell state update after, each EPR after the renewal shared Tangle to status information;
Processor is used for the EPR after being updated using inspection positions and tangles the first key particle of centering to the detecting position The secrecy bit at the place of putting is encrypted;
Transmitter is used for the secrecy bit after the inspection positions are encrypted and is sent to recipient, to cause recipient's root EPR after being updated according to the inspection positions is tangled tangles the second of centering to the EPR after present Bell state and renewal Key particle, the secrecy bit after the inspection positions encryption received respectively to it is decrypted and measured, and obtains the inspection Location puts the decryption bit at place;
Processor is used to perform eavesdropping testing process;The eavesdropping testing process includes:Utilize the secrecy of inspection positions The classical state and decryption bit-detection of bit are with the presence or absence of eavesdropping.
Further, optionally, the processor is additionally operable to update Bell state using a kind of at random to first key particle Operation process, present Bell state is updated with causing the EPR belonging to the first key particle to tangle, and will Each EPR is tangled after renewal is sent to recipient to present status information.
Or it is optional, the device of described sender side also includes:Receiver, for receiving the renewal sent by recipient Each EPR afterwards is tangled to present status information, and by above-mentioned memory storage.
Optionally, above-mentioned processor needs the classical Bit String for issuing recipient specifically for randomly generating, will be described Classical Bit String is converted into quantum bit string, is used as the objects within confidentiality of the quantum state;Or, it would be desirable to issue the letter of recipient Breath is converted into quantum bit string, and at least one quantum bit of radom insertion in the quantum bit string, is used as the quantum The objects within confidentiality of state.
The invention provides the device that a kind of quantum secure of recipient side is transmitted, including:
Receiver, the memory being connected with the receiver, the processor being connected with the memory;
The memory is used to storing that a string of EPR that recipient shares with sender to be tangled pair and each EPR is tangled To status information;Each EPR is tangled to being in two distinct types of Bell state any or at least three at random Plant any of Bell state;It is additionally operable to store batch processing code;The EPR tangle to including:One first key particle With a second key particle;
The receiver is used to receive the objects within confidentiality after encryption;
The processor is used to call the program code stored in the memory, and execution is tangled to present according to EPR Bell state, the objects within confidentiality after the encryption received using the second key particle to it decrypted and measured, and obtains classics The method of the decryption object of state;Objects within confidentiality after the encryption utilizes the first key particle to described by described sender Obtained by secrecy bit encryption;The decryption object of the classical state includes multiple decryption bits.
Optionally, if a string of EPR tangle to length be more than or equal to the objects within confidentiality length, the reception Device is used to once receive the objects within confidentiality after all encryptions, and the processor is used to call the program generation stored in the memory Code, execution is tangled to present Bell state according to EPR, and the objects within confidentiality after encryption is decrypted using the second key particle And measure, the method for obtaining all decryption objects;
Or, optionally, if a string of EPR tangle to length be less than the objects within confidentiality length, it is described to connect Receiving device is used for the objects within confidentiality after receiving portion is encrypted;The processor is used to call the program generation stored in the memory Code, execution is tangled to present Bell state according to EPR, using the second key particle to the objects within confidentiality after Partial encryption Decrypt and measure, obtain part and decrypt the method for object, and perform circulation:
Processor is to currently used second key particle carries out recovery operation;
Memory be used to being stored in EPR tangle to Bell state update after, each EPR after the renewal shared is tangled pair Status information;
Receiver is used to receive the objects within confidentiality after remainder encryption,
Processor is used to be tangled to present Bell state according to EPR after renewal, the of centering is tangled using EPR after renewal Two key particles are decrypted and measured to the objects within confidentiality after the Partial encryption that is currently received, obtain part decryption object, until Objects within confidentiality after the encryption is fully completed decryption.
Optionally, the processor is additionally operable to call the program code stored in the memory, performs eavesdropping detection stream Journey;The eavesdropping testing process includes:Whether deposited using the classical state and decryption bit-detection of the secrecy bit of inspection positions In eavesdropping.
Or it is optional, the processor is additionally operable to call the program code stored in the memory, to currently Used second key particle carries out recovery operation;
The memory be used for sender or recipient update EPR tangle to Bell state after, storage update after it is each Individual EPR tangle to status information;
The receiver is used to receive the secrecy bit after the inspection positions encryption of sender's transmission;
The processor be used for updated according to inspection positions after EPR tangle to Bell state, utilize inspection positions EPR after renewal tangle to the second key particle the inspection positions are encrypted after secrecy bit be decrypted and survey Amount;
The processor is used to perform eavesdropping testing process;The eavesdropping testing process includes:Utilize inspection positions The classical state and decryption bit-detection of secrecy bit are with the presence or absence of eavesdropping;
If the processor, which is used to detect, is not present eavesdropping, effective connection object is generated.
Further, in the case that the processor in detection specifically for being not present eavesdropping, removed from decryption object The decryption bit of inspection positions, obtains effective connection object;Or, exist if the objects within confidentiality of the quantum state is sender Need to issue what insertion quantum bit in the information of recipient was obtained, and the test position is at least one insertion quantum bit Position, then remove the decryption bit at the position of the sub- bit of insertion unless each from decryption object, obtain effective transmission pair As.
For each EPR after Share update tangle to status information, optionally, the recipient can also receive transmission Each EPR after the renewal that side is sent is tangled to present status information;Or it is optional, the processor is additionally operable to the Two key particles are processed using a kind of operation for updating Bell state at random, to cause the EPR belonging to the second key particle Tangle and present Bell state is updated;The device of the recipient side can also include:Transmitter, the transmitter is used for Each EPR after renewal is tangled sender is sent to present status information.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method can be with Realize by another way.For example, device embodiment described above is only schematical, for example, the unit Divide, only a kind of division of logic function there can be other dividing mode when actually realizing, such as multiple units or component Another system can be combined or be desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or The coupling each other discussed or direct-coupling or communication connection can be the indirect couplings of device or unit by some interfaces Close or communicate to connect, can be electrical, machinery or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also That the independent physics of unit includes, can also two or more units it is integrated in a unit.Above-mentioned integrated list Member can both be realized in the form of hardware, it would however also be possible to employ hardware adds the form of SFU software functional unit to realize.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in an embodied on computer readable and deposit In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are to cause a computer Equipment (can be personal computer, server, or network equipment etc.) performs the portion of each embodiment methods described of the invention Step by step.Example, the equipment includes:Quantum computer etc..And foregoing storage medium includes:It is USB flash disk, mobile hard disk, read-only Memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic disc or CD etc. are various can be with the medium of store program codes.Example, storage medium includes:Quantum storage is set It is standby etc..
Finally it should be noted that:The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although The present invention is described in detail with reference to the foregoing embodiments, it will be understood by those within the art that:It still may be used To be modified to the technical scheme described in foregoing embodiments, or equivalent substitution is carried out to which part technical characteristic; And these modification or replace, do not make appropriate technical solution essence depart from various embodiments of the present invention technical scheme spirit and Scope.

Claims (24)

1. a kind of method of quantum secure transmission, it is characterised in that including:
Sender and recipient share a string of EPR tangle pair and each EPR tangle to status information;Each EPR entangles Twine to being in any of two distinct types of Bell state any or at least three kinds Bell states at random;Wherein, institute State EPR tangle to including:One first key particle and a second key particle;
Sender generates the objects within confidentiality of quantum state;The objects within confidentiality of the quantum state includes multiple secrecy bits;
Sender using the first key particle to the secrecy bit encryption, the objects within confidentiality after being encrypted, and by institute State the objects within confidentiality after encryption and be sent to recipient;To cause recipient to be tangled according to EPR to present Bell state, institute is utilized State the objects within confidentiality after the encryption that the second key particle receives it to decrypt and measure, obtain the decryption object of classical state;Institute Stating the decryption object of classical state includes multiple decryption bits.
2. according to the method described in claim 1, it is characterised in that described sender is using the first key particle to described Secrecy bit encryption, the objects within confidentiality after being encrypted, and the objects within confidentiality after the encryption is sent to recipient included:
If a string of EPR tangle to length be more than or equal to the length of the objects within confidentiality, sender utilizes described the One key particle is to each secrecy bit encryption in the objects within confidentiality, the objects within confidentiality after being encrypted, and is sent to reception Side;Or,
If a string of EPR tangle to length be less than the length of the objects within confidentiality, sender utilizes whole first keys Encryption of the particle to the privacy amplification bit in the objects within confidentiality, obtains the objects within confidentiality after Partial encryption, and is sent to and connects Debit;Perform circulation:According to current EPR tangle to Bell state to currently used first key particle carries out recovery behaviour Make, EPR tangle to Bell state update after, and each EPR after recipient's Share update tangle to status information;Utilize Remaining secrecy bit in objects within confidentiality is encrypted the first key particle that EPR after renewal tangles centering, obtains part Objects within confidentiality after encryption, and be sent to recipient, until the objects within confidentiality is fully completed encryption, and is sent to the reception Side.
3. method according to claim 2, it is characterised in that after completing one-time pad encryption and sending, methods described is also Including:
Perform eavesdropping testing process;The eavesdropping testing process includes:Using inspection positions secrecy bit classical state and Bit-detection is decrypted with the presence or absence of eavesdropping.
4. according to the method described in claim 1, it is characterised in that the objects within confidentiality after by the encryption is sent to recipient Afterwards, methods described also includes:
Sender according to current EPR tangle to Bell state to currently used first key particle carries out recovery operation;
EPR tangle to Bell state update after, and each EPR after recipient's Share update tangle to status information;
EPR after being updated using inspection positions tangles secrecy bit of the first key particle to the inspection positions of centering It is encrypted;
Secrecy bit after the inspection positions are encrypted is sent to recipient, to cause recipient according to the test position EPR after place updates tangles the second key particle that centering is tangled to the EPR after present Bell state and renewal, respectively Secrecy bit after the inspection positions encryption received to it is decrypted and measured, and obtains the decryption of the inspection positions Bit;
Perform eavesdropping testing process;The eavesdropping testing process includes:Using inspection positions secrecy bit classical state and Bit-detection is decrypted with the presence or absence of eavesdropping.
5. the method according to claim 2 or 4, it is characterised in that the current EPR of basis tangle to Bell state to working as Preceding used first key particle, which carries out recovery operation, to be included:
It is to present Bell state if current EPR is tangled | Φ+>, then to currently used first key particle is doneRotation process;
It is to present Bell state if current EPR is tangled | Φ->, then to currently used first key particle is doneRotation process;
It is to present Bell state if current EPR is tangled | Ψ+>, then to currently used first key particle is doneRotation process;
It is to present Bell state if current EPR is tangled | Ψ->, then to currently used first key particle is doneRotation process.
6. the method according to claim 2 or 4, it is characterised in that it is described EPR tangle to Bell state update after, and Each EPR after recipient's Share update tangle to status information include:
Sender is processed using a kind of operation for updating Bell state at random to first key particle, to cause the first key EPR belonging to particle is tangled to be updated to present Bell state, and each EPR after renewal is tangled to present state Information is sent to recipient;Or,
Each EPR after the renewal sent by recipient is received to tangle to present status information.
7. the method according to claim any one of 1-4, it is characterised in that described sender generates the secrecy pair of quantum state As including:
Randomly generating needs the classical Bit String for issuing recipient, and the classical Bit String is converted into quantum bit string, as The objects within confidentiality of the quantum state;Or,
The information for issuing recipient will be needed to be converted into quantum bit string, and the radom insertion at least one in the quantum bit string Individual quantum bit, is used as the objects within confidentiality of the quantum state.
8. a kind of method of quantum secure transmission, it is characterised in that including:
Recipient and sender share a string of EPR tangle pair and each EPR tangle to status information;Each EPR entangles Twine to being in any of two distinct types of Bell state any or at least three kinds Bell states at random;Wherein, institute State EPR tangle to including:One first key particle and a second key particle;
Recipient receives the objects within confidentiality after encryption, and is tangled according to EPR to present Bell state, utilizes second key Objects within confidentiality after the encryption that particle is received to it is decrypted and measured, and obtains the decryption object of classical state;After the encryption Objects within confidentiality is obtained by described sender utilizes the first key particle to secrecy bit encryption;The solution of the classical state Close object includes multiple decryption bits.
9. method according to claim 8, it is characterised in that the recipient receives the objects within confidentiality after encryption, and root Tangled according to EPR to present Bell state, the objects within confidentiality solution after the encryption received using the second key particle to it Close and measure, obtaining the decryption object of classical state includes:
If a string of EPR tangle to length be more than or equal to the length of the objects within confidentiality, recipient once receives entirely Objects within confidentiality after portion's encryption, and is tangled to present Bell state according to EPR, using the second key particle to encryption after Objects within confidentiality decrypt and measure, obtain all decryption objects;
If a string of EPR tangle to length be less than the objects within confidentiality length, recipient's receiving portion encryption after Objects within confidentiality, and tangled according to EPR to present Bell state, using the second key particle to the secrecy after Partial encryption Object is decrypted and measured, and obtains part decryption object;Perform circulation:To currently used second key particle recovers Operation, EPR tangle to Bell state update after, and each EPR after sender's Share update tangle to status information, connect Objects within confidentiality after receiving portions encryption, is tangled to present Bell state according to EPR after renewal, is tangled pair using EPR after renewal In the second key particle the objects within confidentiality after the Partial encryption that is currently received is decrypted and measured, obtain part decryption pair As until the objects within confidentiality after the encryption is fully completed decryption.
10. method according to claim 9, it is characterised in that after completing once to decrypt and measure, methods described is also Including:
Perform eavesdropping testing process;The eavesdropping testing process includes:Using inspection positions secrecy bit classical state and Bit-detection is decrypted with the presence or absence of eavesdropping.
11. method according to claim 8, it is characterised in that after the decryption object of classical state is obtained, methods described Also include:
Recipient is to currently used second key particle carries out recovery operation;
EPR tangle to Bell state update after, and each EPR after sender's Share update tangle to status information;
Receive the secrecy bit after the inspection positions encryption that sender sends;
EPR after being updated according to inspection positions tangle to Bell state, the EPR after being updated using inspection positions tangle to Secrecy bit after second key particle is encrypted to the inspection positions is decrypted and measured;
Perform eavesdropping testing process;The eavesdropping testing process includes:Using inspection positions secrecy bit classical state and Bit-detection is decrypted with the presence or absence of eavesdropping;
If eavesdropping is not present in detection, effective connection object is generated.
12. the method according to claim 9 or 11, it is characterised in that the recipient is to currently used second Key particle, which carries out recovery operation, to be included:
Recipient is to currently used second key particle is done Rotation process.
13. the method according to claim 9 or 11, it is characterised in that it is described EPR tangle to Bell state update after, With each EPR after sender's Share update tangle to status information include:
Each EPR after the renewal sent by sender is received to tangle to present status information;Or,
Recipient is processed using a kind of operation for updating Bell state at random to the second key particle, to cause second key EPR belonging to particle is tangled to be updated to present Bell state, and each EPR after renewal is tangled to present state Information is sent to sender.
14. method according to claim 11, it is characterised in that the objects within confidentiality of quantum state is randomly generated, described Generating effective connection object includes:The decryption bit of inspection positions is removed from decryption object, effective transmission pair is obtained As;Or,
The objects within confidentiality of the quantum state is that sender inserts what quantum bit was obtained in the information for needing to issue recipient, institute Position of the test position at least one insertion quantum bit is stated, the effective connection object of generation includes:From decryption object In remove the decryption bit at the position of the sub- bit of insertion unless each, obtain effective connection object.
15. a kind of device of quantum secure transmission, it is characterised in that including:
Shared cell, for recipient share a string of EPR tangle pair and each EPR tangle to status information;Each institute EPR is stated to tangle to being in any of two distinct types of Bell state any or at least three kinds Bell states at random; Wherein, the EPR tangle to including:One first key particle and a second key particle;
Generation unit, the objects within confidentiality for generating quantum state;The objects within confidentiality of the quantum state includes multiple secrecy bits;
Ciphering unit, for utilizing the first key particle to the secrecy bit encryption, the objects within confidentiality after being encrypted;
Transmitting element, for the objects within confidentiality after the encryption to be sent into recipient;To cause recipient to be tangled pair according to EPR Present Bell state, the objects within confidentiality after the encryption received using the second key particle to it is decrypted and measured, and is obtained To the decryption object of classical state;The decryption object of the classical state includes multiple decryption bits.
16. device according to claim 15, it is characterised in that if a string of EPR tangle to length be more than or wait In the length of the objects within confidentiality, then the ciphering unit is for utilizing the first key particle in the shared cell to described Generation unit generates each secrecy bit encryption in objects within confidentiality, the objects within confidentiality after being encrypted;Or,
If a string of EPR tangle to length be less than the objects within confidentiality length, the ciphering unit be used for utilize institute State in shared cell whole first key particles and adding for privacy amplification bit in objects within confidentiality is generated to the generation unit It is close, obtain the objects within confidentiality after Partial encryption;Perform circulation:According to current EPR tangle to Bell state to currently used First key particle carry out recovery operation, EPR tangle to Bell state update after, and each after recipient's Share update EPR tangle to status information, the generation unit is generated using the first key particles for tangling centering of the EPR after renewal Remaining secrecy bit in objects within confidentiality is encrypted, and obtains the objects within confidentiality after Partial encryption, until the objects within confidentiality is complete Portion completes encryption.
17. device according to claim 16, it is characterised in that also include:First detection eavesdropping unit, steals for performing Listen testing process;The eavesdropping testing process includes:Classical state and decryption bit inspection using the secrecy bit of inspection positions Survey with the presence or absence of eavesdropping.
18. device according to claim 15, it is characterised in that also include:Second detection eavesdropping unit, works as basis Preceding EPR tangle to Bell state to currently used first key particle carries out recovery operation;EPR tangle to Bell After state updates, and each EPR after recipient's Share update tangle to status information;After being updated using inspection positions The secrecy bit of the inspection positions is encrypted the first key particle that EPR tangles centering;By the inspection positions Secrecy bit after encryption is sent to recipient, is tangled pair with the EPR after causing recipient to be updated according to the inspection positions EPR after present Bell state and renewal tangles the second key particle of centering, the detection received respectively to it Secrecy bit after being encrypted at position is decrypted and measured, and obtains the decryption bit of the inspection positions;Perform eavesdropping detection stream Journey;The eavesdropping testing process includes:Whether deposited using the classical state and decryption bit-detection of the secrecy bit of inspection positions In eavesdropping.
19. the device according to claim any one of 15-18, it is characterised in that the generation unit, for randomly generating Need to issue the classical Bit String of recipient, the classical Bit String is converted into quantum bit string, the quantum state is used as Objects within confidentiality;Or,
For the information for issuing recipient will to be needed to be converted into quantum bit string, and in the quantum bit string, radom insertion is extremely A few quantum bit, is used as the objects within confidentiality of the quantum state.
20. a kind of device of quantum secure transmission, it is characterised in that including:
Shared cell, for sender share a string of EPR tangle pair and each EPR tangle to status information;Each institute EPR is stated to tangle to being in any of two distinct types of Bell state any or at least three kinds Bell states at random; Wherein, the EPR tangle to including:One first key particle and a second key particle;
Receiving unit, for receiving the objects within confidentiality after encryption;
Decryption unit, is tangled to present Bell state for the EPR in shared cell, utilizes the second key particle Objects within confidentiality after the encryption received to the receiving unit is decrypted and measured, and obtains the decryption object of classical state;It is described to add Objects within confidentiality after close is obtained by described sender utilizes the first key particle to secrecy bit encryption;The classics The decryption object of state includes multiple decryption bits.
21. device according to claim 20, it is characterised in that if a string of EPR tangle to length be more than or wait In the length of the objects within confidentiality, the then objects within confidentiality that the receiving unit is used for after the whole encryptions of once reception;The decryption Unit is used to be tangled to present Bell state according to EPR, using the second key particle to the objects within confidentiality solution after encryption It is close and measure, obtain all decryption objects;Or,
If a string of EPR tangle to length be less than the objects within confidentiality length, the receiving unit be used at least two Objects within confidentiality after secondary receiving portion encryption;The decryption unit is used for, and is tangled to present Bell state, utilized according to EPR Objects within confidentiality after the Partial encryption that the second key particle is received to first time is decrypted and measured, and obtains part decryption pair As;Perform circulation:To currently used second key particle carries out recovery operation, EPR tangle to Bell state update Afterwards, each EPR and after sender's Share update tangle to status information, tangled according to EPR after renewal to present Bell state, the second key particle of centering is tangled using EPR after renewal to the objects within confidentiality after the Partial encryption that is currently received Decrypt and measure, part decryption object is obtained, until the objects within confidentiality after the encryption is fully completed decryption.
22. device according to claim 21, it is characterised in that also include:First detection eavesdropping unit, for completing After once decrypting and measure, eavesdropping testing process is performed;The eavesdropping testing process includes:Utilize the secrecy of inspection positions The classical state and decryption bit-detection of bit are with the presence or absence of eavesdropping.
23. device according to claim 20, it is characterised in that also include:Second detection eavesdropping unit, for obtaining After the decryption object of classical state, to currently used second key particle carries out recovery operation;EPR tangle to After Bell state updates, and each EPR after sender's Share update tangle to status information;Receive the detection that sender sends Secrecy bit after being encrypted at position;EPR after being updated according to inspection positions tangle to Bell state, utilize inspection positions EPR after renewal tangle to the second key particle the inspection positions are encrypted after secrecy bit be decrypted and survey Amount;Perform eavesdropping testing process;The eavesdropping testing process includes:Classical state and institute using the secrecy bit of inspection positions Decryption bit-detection that decryption unit obtains is stated with the presence or absence of eavesdropping;
Result unit is generated, in the case of eavesdropping is not present in the described second detection eavesdropping unit detection, generation is effective Connection object.
24. device according to claim 23, it is characterised in that the generation result unit, for from decryption object The decryption bit of inspection positions is removed, effective connection object is obtained;Or,
The objects within confidentiality of quantum state is that sender inserts what quantum bit was obtained in the information for needing to issue recipient, the inspection Location is set to the position of at least one insertion quantum bit, the generation result unit, for being gone unless each from decryption object The decryption bit inserted at the position of quantum bit, obtains effective connection object.
CN201310113350.4A 2013-04-02 2013-04-02 A kind of method and apparatus of quantum secure transmission Active CN104104500B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310113350.4A CN104104500B (en) 2013-04-02 2013-04-02 A kind of method and apparatus of quantum secure transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310113350.4A CN104104500B (en) 2013-04-02 2013-04-02 A kind of method and apparatus of quantum secure transmission

Publications (2)

Publication Number Publication Date
CN104104500A CN104104500A (en) 2014-10-15
CN104104500B true CN104104500B (en) 2017-07-28

Family

ID=51672329

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310113350.4A Active CN104104500B (en) 2013-04-02 2013-04-02 A kind of method and apparatus of quantum secure transmission

Country Status (1)

Country Link
CN (1) CN104104500B (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104601248B (en) * 2014-12-23 2017-09-01 上海电机学院 The method that multi-party joint based on monatomic operation remotely prepares quantum state
CN104468097B (en) * 2015-01-13 2018-01-09 中国人民解放军理工大学 A kind of secure data communication implementation method based on quantum key distribution
CN106685635B (en) * 2015-11-07 2019-10-18 上海复旦微电子集团股份有限公司 Method of calibration of circling round and device
CN106529681A (en) * 2016-10-28 2017-03-22 章美前 Quantum computer
CN107147491A (en) * 2017-06-01 2017-09-08 浙江九州量子信息技术股份有限公司 A kind of cipher key service framework communicated based on multiple terminals and distribution method
CN107948727B (en) * 2017-12-25 2023-09-05 东莞市纽格力信息技术有限公司 Digital television program stream transmission system and method based on quantum encryption
CN108388946B (en) * 2018-01-29 2021-08-17 湘潭大学 Two-party quantum computing method based on blind quantum computing
CN108650081B (en) * 2018-03-30 2020-08-04 清华大学 Information transmission method, device and system based on quantum entanglement
CN108880790B (en) * 2018-05-28 2024-04-05 广东尤科泊得科技发展有限公司 Quantum voting system and method based on quantum invisible transmission state
CN111200582A (en) * 2018-11-19 2020-05-26 普天信息技术有限公司 Covert communication method and apparatus
CN109660329B (en) * 2018-12-27 2022-06-14 安徽继远软件有限公司 Two-party quantum secret communication method capable of resisting external attack
CN110417552A (en) * 2019-08-06 2019-11-05 中国工商银行股份有限公司 Safe communication method and system based on quantum entanglement
CN110401493B (en) * 2019-08-22 2020-11-03 苏州赛安电子技术有限公司 Intelligent ad hoc network communication system based on quantum encryption
CN110971406B (en) * 2019-12-12 2023-04-21 南京邮电大学 Two-photon six-qubit superentangled Bell state concurrency measurement method
CN112600666B (en) * 2020-11-18 2022-04-26 中山大学 Quantum secure communication method and device, computer equipment and storage medium
CN113708926A (en) * 2021-08-25 2021-11-26 重庆邮电大学 Safe multi-party computing method based on verifiable blind quantum computing

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102946313A (en) * 2012-10-08 2013-02-27 北京邮电大学 Model and method for user authentication for quantum key distribution network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030112970A1 (en) * 2001-08-26 2003-06-19 Arindam Mitra How to generate unbreakable key through any communication channel

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102946313A (en) * 2012-10-08 2013-02-27 北京邮电大学 Model and method for user authentication for quantum key distribution network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于EPR粒子对的信息签名协议;温晓军,等.;《大连理工大学学报》;20070531;全文 *
基于共享EPR纠缠态的量子消息认证;邵博闻,等.;《信息安全与通信保密》;20070430;全文 *

Also Published As

Publication number Publication date
CN104104500A (en) 2014-10-15

Similar Documents

Publication Publication Date Title
CN104104500B (en) A kind of method and apparatus of quantum secure transmission
US20230224148A1 (en) System and method for quantum-safe authentication, encryption and decryption of information
CN107493168B (en) Quanta identity authentication method and its application method during quantum key distribution
Nair et al. Quantum-noise randomized ciphers
Wang et al. A blind quantum signature protocol using the GHZ states
CN107222307A (en) A kind of controlled quantum safety direct communication method based on four Particle Cluster states
Min et al. Novel multi-party quantum key agreement protocol with g-like states and bell states
WO2019020177A1 (en) Privacy amplification for quantum key distribution secret sharing
Vegh et al. Enhancing security in cyber-physical systems through cryptographic and steganographic techniques
Gianni et al. New quantum private comparison using hyperentangled ghz state
Lai et al. Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes
Zhu et al. Cryptanalysis of a new circular quantum secret sharing protocol for remote agents
Yin et al. Two-step efficient quantum dialogue with three-particle entangled W state
Vohra et al. An efficient chaos-based optimization algorithm approach for cryptography
Xiang et al. Quantum secret sharing protocol based on four-dimensional three-particle entangled states
Wu et al. Cryptanalysis and improvement of Ye et al’s quantum private comparison protocol
Adedeji et al. Improved image encryption for real-time application over wireless communication networks using hybrid cryptography technique
CN101364868B (en) Pseudo-noise code generator based on broad sense information field and generating method thereof
Labadze et al. Post-Quantum Digital Signature Scheme with BB84 Protocol.
Shen et al. Improvement of a controlled quantum secure direct communication protocol
Ji et al. Twice-Hadamard-CNOT attack on Li et al.’s fault-tolerant quantum private comparison and the improved scheme
Gupta et al. Non-malleable codes against lookahead tampering
Karpinski et al. Security amplification of the computer-aided voting system using quantum cryptography protocols
Arivazhagan et al. Mixed chaotic maps based encryption for high crypto secrecy
Lai et al. A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant