CN104468117A - Quantum dialogue protocol with collective-dephasing noise resisting authentication based on logic Bell states - Google Patents

Quantum dialogue protocol with collective-dephasing noise resisting authentication based on logic Bell states Download PDF

Info

Publication number
CN104468117A
CN104468117A CN201410658400.1A CN201410658400A CN104468117A CN 104468117 A CN104468117 A CN 104468117A CN 201410658400 A CN201410658400 A CN 201410658400A CN 104468117 A CN104468117 A CN 104468117A
Authority
CN
China
Prior art keywords
alice
bob
logic
quantum bit
quantum
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410658400.1A
Other languages
Chinese (zh)
Other versions
CN104468117B (en
Inventor
叶天语
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHONGQING JINLONG TECHNOLOGY Co.,Ltd.
Original Assignee
Zhejiang Gongshang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Gongshang University filed Critical Zhejiang Gongshang University
Priority to CN201410658400.1A priority Critical patent/CN104468117B/en
Publication of CN104468117A publication Critical patent/CN104468117A/en
Application granted granted Critical
Publication of CN104468117B publication Critical patent/CN104468117B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides a quantum dialogue protocol with collective-dephasing noise resisting authentication based on logic Bell states. Through the protocol, mutual identity authentication and dialogue can be simultaneously achieved securely between two participators on a collective-dephasing noise channel, wherein information transmitted through a classical channel can be intercepted and modified. A secret key used for selecting a sample logic qubit measurement base is shared by the two participators secretly in advance. Bell state measurement, instead of four-qubit joint measurement, is adopted for decoding. The two participators share the initial state of the information logic Bell state by the aid of direct transmission of the auxiliary logic Bell state. In this way, information leakage is avoided. Acting attacks from Eve, man-in-the-middle attacks and modification attacks can all be detected, and besides Trojan attacks can be avoided naturally.

Description

Phase noise certification quantum session protocol moves back in the anti-collective of logic-based Bell state
Technical field
The present invention relates to field of quantum security communication.Phase noise certification quantum session protocol moves back in the anti-collective that the present invention designs a kind of logic-based Bell state, reaches the object simultaneously realizing mutual identity authentication and dialogue in the noisy communication channel of collective's dephasign position between two participants safely.
Background technology
Between two participants, the direct transmission of secret information is carried out in order to realize throughput subsignal, Long and Liu [1] proposed first Quantum Secure Direct Communication (Quantum Secure DirectCommunication, QSDC) agreement (be called as subsequently state encode two step agreements) in 2002.This agreement has invented this thought of quantal data Bulk transport.From then on, many good QSDC agreements are fabricated out [2-11].
Between two participants, carry out the two-way communication of secret information to realize throughput subsignal, Nguyen [12] and Zhang etc. [13-14] are the independent concept proposing quantum dialogue (QuantumDialogue, QD) in 2004.After this, many QD agreements are suggested [15-24] according to different quantum techniques.Unfortunately, always there is the security risk being referred to as information leakage found in 2008 by [25-26] such as Gao in them.In fact, to result from the classics that Tan with Cai [27] pointed out in 2008 relevant for the information leakage problem of QD.Subsequently, the QD agreement how designed without information leakage causes rapidly the interest of researchers.Like this, many good anti-information leakage QD agreements are devised [28-37].
But above-mentioned all QD agreements [12-24,28-37] are just operated on following basis: can not be ravesdropping and revise by the information of classical transmission.Once this hypothesis is false, their face external assailant at once and play the part of the serious security risk that the attacks such as attacks, man-in-the-middle attack and amendment attack cause.Like this, a kind of special QD agreement being referred to as certification quantum dialogue (Authenticated Quantum Dialogue, AQD) is put forward to make up this defect by [39] such as Naseri [38] and Shen.But point out in 2013 as [40] such as Lin, the agreement [39] of Shen etc. is subject to man-in-the-middle attack and threatens.The agreement [38] of Naseri is no exception under this kind of attack.Subsequently, in order to improve the fail safe of AQD, Lin etc. [41] propose an AQD agreement based on Bell state, and wherein two participants can realize mutual identity authentication and dialogue safely simultaneously.In the agreement [41] of Lin etc., two kinds of secret keys are shared in confidence by two participants, and wherein the first secret key is for the preparation of initial Bell state.In this case, two participants enjoy initial Bell state in advance.But in anti-information leakage QD field, the initial state of quantum state is not enjoyed by two participants usually in advance.Another shortcoming of the agreement [41] of Lin etc. is that it is only operated in ideal communication channel.It is important to point out, anti-information leakage QD agreement [28-37] before is also operated in ideal communication channel only.In fact, harmful being coupled between photon with actual environment inevitably exists.Therefore, the impact of interchannel noise should be considered.Point out as document [42-43], transmit in time window faster if photon to change than noise at one, interchannel noise can be regarded as collective's noise.The first collective's noise is that phase noise moves back in collective, total keeps the horizontal polarization state of photon | and 0> is constant and by the perpendicular polarization state of photon | and 1> changes into | 1> [44].Another kind of noise is collective's rotational noise, always will | 0> and | 1> is separately converted to coS θ | 0>+sin θ | 1> and-sin θ | 0>+coS θ | 1> [46].Here, corresponding time dependent noise parameter with θ.As the means of a kind of effective opposing collective noise, not affected by noise has been commonly used to design antinoise quantum cryptographic protocols without eliminating coherence (Decoherence-Free, DF) state [42-54].Such as, the robust QD agreement of document [51] and document [53] utilizes the product state of two quantum bit DF states and two quantum bit DF states as quantum resource respectively, and the robust QD agreement of document [54] utilizes four quantum bit DF states as quantum resource.
Based on above analysis, phase noise AQD agreement is moved back by the anti-collective that the present invention utilizes logic Bell state (a kind of four quantum bit DF states) to propose a logic-based Bell state as quantum resource, wherein can be ravesdropping and revise by the information of classical transmission.Agreement proposed by the invention can realize mutual identity authentication and dialogue safely in the noisy communication channel of collective's dephasign position between two participants simultaneously.With the protocol class of document [41] seemingly, a kind of secret key for selecting sample logic quantum bit to measure base is shared in confidence by two participants in advance.Bell state is measured but not four quantum bit combined measurements are used for decoding.With the QD protocol class of document [54] seemingly, two participants are by means of directly transmitting the initial state that auxiliary logic Bell state shares infologic Bell state.Like this, information leakage problem is avoided.Play the part of attack, man-in-the-middle attack and amendment from Eve are attacked and can be detected, and Trojan attack is avoided natively.
List of references
[1]Long G L,Liu X S,Phys Rev A,2002,65:032302
[2]Bostrom K,Felbinger T,Phys Rev Lett,2002,89:187902
[3]Deng F G,Long G L,Liu X S,Phys Rev A,2003,68:042317
[4]Deng F G,Long G L,Phys Rev A,2004,69:052319
[5]Wang C,Deng F G,Li Y S,Liu X S,Long G L,Phys Rev A,2005,71:044305
[6]Wang C,Deng F G,Long G L,Opt Commun,2005,253:15
[7]Li X H,Li C Y,Deng F G,Zhou P,Liang Y J,Zhou H Y,Chin Phys,2007,16(8):2149-2153
[8]Chen X B,Wen Q Y,Guo F Z,Sun Y,Xu G,Zhu F C,Int J Quant Inform,2008,6:899
[9]Gu B,Huang Y G,Fang X,Zhang C Y,Chin Phys B,2011,20:100309
[10]Liu D,Chen J L,Jiang W,Int J Theor Phys,2012,51:2923
[11]Ren B C,Wei H R,Hua M,Li T,Deng F G,Eur Phys J D,2013,67:30
[12]Nguyen B A,Phys Lett A,2004,328(1):6-10
[13]Zhang Z J,Man Z X,2004,http://arxiv.org/pdf/quant-ph/0403215.pdf
[14]Zhang Z J,Man Z X,2004,http://arxiv.org/pdf/quant-ph/0403217.pdf
[15]Man Z X,Zhang Z J,Li Y,Chin Phys Lett,2005,22(1):22-24
[16]Jin X R,Ji X,Zhang Y Q,Zhang S,et al.,Phys Lett A,2006,354(1-2):67-70
[17]Man Z X,Xia Y J,Chin Phys Lett,2006,23(7):1680-1682
[18]Ji X,Zhang S,Chin Phys,2006,15(7):1418-1420
[19]Man Z X,Xia Y J,Nguyen B A,J Phys B-At Mol Opt Phys,2006,39(18):3855-3863
[20]Man Z X,Xia Y J,Chin Phys Lett,2007,24(1):15-18
[21]Chen Y,Man Z X,Xia Y J,Chin Phys Lett,2007,24(1):19-22
[22]Yang Y G,Wen Q Y,Sci China Ser G-Phys Mech Astron,2007,50(5):558-562
[23]Shan C J,Liu J B,Cheng W W,Liu T K,Huang Y X,Li H,Mod Phys Lett B,2009,23(27):3225-3234
[24]Ye T Y,Jiang L Z,Chin Phys Lett,2013,30(4):040305
[25]Gao F,Qin S J,Wen Q Y,Zhu F C,Phys Lett A,2008,372(18):3333-3336
[26]Gao F,Guo F Z,Wen Q Y,Zhu F C,Sci China Ser G-Phys Mech Astron,2008,51(5):559-566
[27]Tan Y G,Cai Q Y,Int J Quant Inform,2008,6(2):325-329
[28]Shi G F,Xi X Q,Tian X L,Yue R H,Opt Commun,2009,282(12):2460-2463
[29]Shi G F,Opt Commun,2010,283(24):5275-5278
[30]Gao G,Opt Commun,2010,283(10):2288-2293
[31]Shi G F,Xi X Q,Hu M L,Yue R H,Opt Commun,2010,283(9):1984-1986
[32]Shi G F,Tian X L,J Mod Opt,2010,57(20):2027-2030
[33]Ye T Y,Int J Quant Inform,2013,11(5):1350051
[34]Ye T Y,Jiang L Z,Phys Scr,2014,89(1):015103
[35]Ye T Y,Commun Theor Phys,2014,62(3):338-342
[36]Ye T Y,Int J Theor Phys,2014,53(11):3719-3727
[37]Zheng C,Long G F,Sci China-Phys Mech Astron,2014,57(7):1238-1243
[38]Naseri M,Int J Quant Inf,2011,9(7-8):1677-1684
[39]Shen D S,Ma W P,Yin X R,Li X P,Int J Theor Phys,2013,52(6):1825-1835
[40]Lin T H,Lin C Y,Hwang T,Int J Theor Phys,2013,52(9):3199-3203
[41]Lin C Y,Yang C W,Hwang T,Int J Theor Phys,in press,doi:10.1007/s 10773-014-2269-4
[42]Li X H,Deng F G,Zhou H Y,Phys Rev A,2008,78:022321
[43]Li X H,Zhao B K,Sheng Y B,et al.,Int J Quant Inform,2009,7(8):1479-1489
[44]Walton Z D,Abouraddy A F,Sergienko A V,et al.,Phys Rev Lett,2003,91:087901
[45]Boileau J C,Gottesman D,Laflamme R,et al.,Phys Rev Lett,2004,92:017901
[46]Zhang Z J,Physica A,2006,361:233-238
[47]Gu B,Pei S X,Song B,Zhong K,Sci China Ser G-Phys Mech Astron,2009,52(12):1913-1918
[48]Gu B,Mu L L,Ding L G,Zhang C Y,Li C Q,Opt Commun,2010,283:3099-3103
[49]Yang C W,TSAI C W,Hwang T,Sci China-Phys Mech Astron,2011,54(3):496-501
[50]Gu B,Zhang C Y,Cheng G S,Huang Y G,Sci China-Phys Mech Astron,2011,54(5):942-947
[51]Yang C W,Hwang T,Quantum InfProcess,2013,12:2131-2142
[52]Lin J,Hwang T,Quantum Inf Process,2013,12:1089-1107
[53]Ye T Y,Sci China-Phys Mech Astron,2014,57(12):2266-2275
[54]Ye T Y,Sci Sin-Phys Mech Astron,in press,doi:10.1360/SSPMA2014-00289(In chinese)
[55]Shannon C E,Bell System Tech J,1949,28:656-715
[56]Cai Q Y,Phys Lett A,2006,351(1-2):23-25
[57]Gisin N,Ribordy G,Tittel W,Zbinden H,Rev Mod Phys,2002,74(1):145-195
Summary of the invention
Phase noise AQD agreement is moved back by the anti-collective that the object of the invention is to design a kind of logic-based Bell state, reaches the object simultaneously realizing mutual identity authentication and dialogue in the noisy communication channel of collective's dephasign position between two participants safely.
A phase noise AQD agreement is moved back by the anti-collective of logic-based Bell state, comprises following seven processes altogether:
S1) Alice prepares 2N infologic Bell state { (A 1, B 1), (A 2, B 2) ..., (A 2n-1, B 2n-1), (A 2n, B 2n) ..., (A 2N-1, B 2N-1), (A 2N, B 2N) (n=1,2 ..., N), wherein every two adjacent infologic Bell state (A 2n-1, B 2n-1) and (A 2n, B 2n) be produced and be in identical quantum state and (be in four quantum states at random one of), with first protocol class of document [54] seemingly.The logic quantum bit A that Alice chooses respectively with odd index and even index carrys out composition sequence S oAand S eA.Namely,
S oA={ A 1, A 3..., A 2n-1..., A 2N-1and S eA={ A 2, A 4..., A 2n..., A 2N.Alice also does same thing to logic quantum bit B.Correspondingly, S is had oB={ B 1, B 3..., B 2n-1..., B 2N-1and S eB={ B 2, B 4..., B 2n..., B 2N.Then, in order to safety detection and mutual identity authentication, Alice prepares the sample logic Bell state (quantity of sample logic Bell state equals the length of K) of sufficient amount, and these sample logic Bell state is divided into two subsequences be made up of logic quantum bit A and B respectively.Then, the subsequence radom insertion S that will be made up of sample logic quantum bit A of Alice eAto form S ' eA.Similarly, Alice is to sample logic quantum bit B and S eBdo same thing to form S ' eB.Then, Alice keeps S oA, S ' eAand S oBmotionless, and by a quantum channel by S ' eBsend Bob to.Obviously, S ' eBbe sent out in the mode of Bulk transport [1].
S2) inform that Alice receives S ' at Bob eBafter, Alice detects S ' eBtransmission security and the identity of certification Bob.Alice tells BobS ' by a classical channel eBthe position of middle sample logic quantum bit.S ' is measured according to K, Bob eBin sample logic quantum bit to obtain measurement result then, Bob is by the measurement result of classical channel by him send to Alice.S ' is measured according to K, Alice eAin sample logic quantum bit to obtain measurement result because Alice prepares sample logic Bell state in person, according to with she can judge S ' simultaneously eBthe existence of listener-in and the identity of Bob between transmission period.If Alice finds wrong, her interrupt communication; Otherwise, she also with the mode throughput subchannel of Bulk transport [1] by S ' eAsend Bob to.
S3) inform that Alice receives S ' at Bob eAafter, Alice tells BobS ' eAthe position of middle sample logic quantum bit.Then, Bob abandons S ' eAwith S ' eBin sample logic quantum bit.Correspondingly, S ' eAwith S ' eBtransformed back into S respectively eAand S eB.Then, Bob is from S eAand S eBchoose logic quantum bit A respectively 2nand B 2n, and they are saved as 2n infologic Bell state again.Then, in order to know (A 2n, B 2n) quantum state, Bob applies two Bell state to the 1st and the 3rd quantum bit and the 2nd and the 4th quantum bit respectively and measures.Due to every two adjacent infologic Bell state (A 2n-1, B 2n-1) and (A 2n, B 2n) to be prepared in step S1 by Alice and to be in identical quantum state, Bob can from (A 2n, B 2n) directly know (A 2n-1, B 2n-1) quantum state.
S4) Alice also with the mode throughput subchannel of Bulk transport [1] by S oBsend Bob to.Then, Bob is from S qBselect N/4 logic quantum bit as sample logic quantum bit and tell their position of Alice by classical channel.S is measured according to K, Alice oAin corresponding sample logic quantum bit to obtain measurement result then, Alice is by the measurement result of classical channel by her send to Bob.S is measured according to K, Bob oBin sample logic quantum bit to obtain measurement result then, because Bob knows (A in step S3 2n-1, B 2n-1) quantum state, according to with he can judge S simultaneously oBthe existence of listener-in and the identity of Alice between transmission period.If Bob finds wrong, his interrupt communication; Otherwise communication continues.
S5) Alice and Bob abandons S respectively in order oAand S oBin sample logic quantum bit.Conveniently, remaining S oAand S oBuse S ' respectively oA=A ' 1, A ' 2..., A ' 3N/4and S ' oB=B ' 1, B ' 2..., B ' 3N/4represent.Then, in order to encode, Alice is to A ' d(d=1,2 ..., 3N/4) and apply logic operation at the tenth of the twelve Earthly Branches like this, S ' oAbe converted into S OA ′ ′ = { Ω i 1 j 1 A 1 ′ , Ω i 2 j 2 A 2 ′ , . . . , Ω i 3 N / 4 j 3 N / 4 A 3 N / 4 ′ } . Then, Alice also with the mode throughput subchannel of Bulk transport [1] by S " oAsend Bob to.
S6) S is being received " oAafter, in order to encode, Bob couple apply logic operation at the tenth of the twelve Earthly Branches like this, S " oAbe converted into S OA ′ ′ ′ = { Ω t 1 l 1 Ω i 1 j 1 A 1 ′ , Ω t 2 l 2 Ω i 2 j 2 A 2 ′ , . . . , Ω t 3 N / 4 l 3 N / 4 Ω i 3 N / 4 j 3 N / 4 A 3 N / 4 ′ } . Then, Bob is from S " ' oAwith S ' oBchoose respectively with B ' dwith form d (d ∈ 1,2 ..., 3N/4}) and group.Then, in order to know quantum state, Bob applies two Bell state to the 1st and the 3rd quantum bit and the 2nd and the 4th quantum bit respectively and measures.According to the logic operation at the tenth of the twelve Earthly Branches of himself right with him measurement result, Bob can read (i d, j d), because he know (A ' d, B ' d) quantum state.Here, the classical bit decoded is represented as m ' a|| h (m a) ', be m ' wherein athe m decoded a, h (m ah (the m that) ' be decodes a).Then, with the protocol class of document [41] seemingly, Bob calculates m ' acryptographic Hash (be referred to as h (m ' a)) and by h (m ' a) and h (m a) ' compare.If they are identical, m ' areal m is thought by Bob aand communication continues; Otherwise communication is terminated.
S7) Bob is right by him by classical channel
measurement result send to Alice.Similarly, according to the logic operation at the tenth of the twelve Earthly Branches of herself alice can know (t d, l d) (d ∈ 1,2 ..., 3N/4}) because herself preparation (A ' d, B ' d).Here, the classical bit decoded is represented as m ' b|| h (m b) ', be m ' wherein bthe m decoded b, h (m bh (the m that) ' be decodes b).Then, with the protocol class of document [41] seemingly, Alice calculates m ' bcryptographic Hash (be referred to as h (m ' b)) and by h (m ' b) and h (m b) ' compare.If they are identical, m ' breal m is thought by Alice b; Otherwise communication is terminated.
Phase noise AQD agreement is moved back by the anti-collective that the present invention proposes a kind of logic-based Bell state.The agreement that the present invention proposes can realize mutual identity authentication and dialogue safely in the noisy communication channel of collective's dephasign position between two participants simultaneously.Here, can be ravesdropping and revise by the information of classical transmission.A kind of secret key for selecting sample logic quantum bit to measure base is shared in confidence by two participants in advance.Bell state is measured but not four quantum bit combined measurements are used for decoding.Two participants share the initial state of infologic Bell state to avoid information leakage problem by means of directly transmitting auxiliary logic Bell state.Play the part of attack, man-in-the-middle attack and amendment from Eve are attacked and can be detected, and Trojan attack is avoided natively.
Embodiment
Below in conjunction with embodiment, technical scheme of the present invention is described further.
1, there is the logic Bell state of anti-collective's dephasign position noise jamming consistency and ultra dense coding thereof
Four logic Bell state that collective moves back under phase noise can be represented as [48]
| Φ dp + ⟩ 1234 = 1 2 ( | 0 dp ⟩ | 0 dp ⟩ + | 1 dp ⟩ | 1 dp ) 1234 = 1 2 ( | 01 ⟩ | 01 ⟩ + | 10 ⟩ | 10 ⟩ ) 1234 = 1 2 ( | + dp ⟩ | + dp ⟩ + | - dp ⟩ | - dp ⟩ ) 1234 = 1 2 ( | 00 ⟩ | 11 ⟩ + | 11 ⟩ | 00 ⟩ ) 1324 = 1 2 ( | φ + ⟩ | φ + ⟩ - | φ - ⟩ | φ - ⟩ ) 1324 ,
| Φ dp - ⟩ 1234 = 1 2 ( | 0 dp ⟩ | 0 dp ⟩ - | 1 dp ⟩ | 1 dp ) 1234 = 1 2 ( | 01 ⟩ | 01 ⟩ - | 10 ⟩ | 10 ⟩ ) 1234 = 1 2 ( | + dp ⟩ | - dp ⟩ + | - dp ⟩ | + dp ⟩ ) 1234 = 1 2 ( | 00 ⟩ | 11 ⟩ - | 11 ⟩ | 00 ⟩ ) 1324 = 1 2 ( | φ - ⟩ | φ + ⟩ - | φ + ⟩ | φ - ⟩ ) 1324 ,
| Ψ dp + ⟩ 1234 = 1 2 ( | 0 dp ⟩ | 1 dp ⟩ + | 1 dp ⟩ | 0 dp ⟩ ) 1234 = 1 2 ( | 01 ⟩ | 10 ⟩ + | 10 ⟩ | 01 ⟩ ) 1234
= 1 2 ( | + dp ⟩ | + dp ⟩ - | d p ⟩ | - dp ⟩ ) 1234 = 1 2 ( | 01 ⟩ | 10 ⟩ + | 10 ⟩ | 01 ⟩ ) 1324 = 1 2 ( | ψ + ⟩ | ψ + ⟩ - | ψ - ⟩ | ψ - ⟩ ) 1324 ,
| Ψ dp - ⟩ 1234 = 1 2 ( | 0 dp ⟩ | 1 dp ⟩ - | 1 dp ⟩ | 0 dp ) 1234 = 1 2 ( | 01 ⟩ | 10 ⟩ - | 10 ⟩ | 01 ⟩ ) 1234 = 1 2 ( | + dp ⟩ | - dp ⟩ + | - dp ⟩ | + dp ⟩ ) 1234 = 1 2 ( | 01 ⟩ | 10 ⟩ - | 10 ⟩ | 01 ⟩ ) 1324 = 1 2 ( | ψ - ⟩ | ψ + ⟩ - | ψ + ⟩ | ψ - ⟩ ) 1324 , - - - ( 1 )
Wherein | φ ± ⟩ = 1 2 ( | 00 ⟩ ± | 11 ⟩ ) With | ψ ± ⟩ = 1 2 ( | 01 ⟩ ± | 10 ⟩ ) Four original Bell state.Here, | 0 dp>=|01> and | 1 dp>=|10> is two logic quantum bits [44] to collective's dephasign position noise immunity, their superposition state | ± dp ⟩ = 1 2 ( | 0 dp ⟩ ± | 1 dp ⟩ ) = 1 2 ( | 01 ⟩ ± | 10 ⟩ ) Also not by this noise effect [46].Correspondingly, under this noise, two logics measurement bases just produce thereupon, i.e. Z dp=| 0 dp>, | 1 dp>} and X dp=|+ dp>, |- dp>}.Easily know from formula (1), as long as two Bell state measurements are applied separately at the 1st and the 3rd quantum bit and the 2nd and the 4th quantum bit, above-mentioned four logic Bell state can be distinguished to each other.[48] and, one in four logics operation at the tenth of the twelve Earthly Branches that these four logic Bell state define by formula (2) to each other transforms mutually.[48-49]
Ω I = I 1 ⊗ I 2 , Ω z = U z 1 ⊗ I 2 , Ω x = U x 1 ⊗ U x 2 , Ω y = U y 1 ⊗ U x 2 . - - - ( 2 )
Here, I=|0><0|+|1>LEs sT.LTssT.LT1|, U x=| 1><0|+|0>LEssT. LTssT.LT1|, U y=| 0><1|-|1>LEssT. LTssT.LT0 and U z=| 0><0|-|1>LEssT. LTssT.LT1|.
Suppose that Alice and Bob decides through consultation that four logics operation at the tenth of the twelve Earthly Branches that formula (2) describes represents classical bit with following form in advance:
Ω I→Ω 00,Ω z→Ω 01,Ω x→Ω 10,Ω y→Ω 11。(3) here, each numeric suffix represents a classical dibit.
2, AQD agreement
Suppose that Alice has 3N/2 classical bit { (i 1, j 1) (i 2, j 2) ... (i d, j d) ... (i 3N/4, j 3N/4) (be expressed as m a|| h (m a)), wherein m aher secret, h (m a) be the cryptographic Hash of her secret; Bob has 3N/2 classical bit { (t 1, l 1) (t 2, l 2) ... (t d, l d) ... (t 3N/4, l 3N/4)(be expressed as m b|| h (m b)), wherein m bhis secret, h (m b) be the cryptographic Hash of his secret.Here, " || " represents connection, and i d, j d, t d, l d∈ 0,1}, wherein d ∈ 1,2 ..., 3N/4}.With the protocol class of document [41] seemingly, a kind of secret key K for selecting sample logic quantum bit to measure base is assumed to be further to be shared in confidence in advance between Alice and Bob.Here, K ∈ { 0,1} n/4.That is, if the p of K (p=1,2 ..., N/4) and bit is 0, Z dpbase is used to measurement p sample logic quantum bit; Otherwise, X dpbase is used to measure it.Agreement hypothesis of the present invention can be ravesdropping and revise by the information of classical transmission, comprises following seven processes altogether:
S1) Alice prepares 2N infologic Bell state
{ (A 1, B 1), (A 2, B 2) ..., (A 2n-1, B 2n-1), (A 2n, B 2n) ..., (A 2N-1, B 2N-1), (A 2N, B 2N) (n=1,2 ..., N), wherein every two adjacent infologic Bell state (A 2n-1, B 2n-1) and (A 2n, B 2n) be produced and be in identical quantum state and (be in four quantum states at random one of), with first protocol class of document [54] seemingly.The logic quantum bit A that Alice chooses respectively with odd index and even index carrys out composition sequence S oAand S eA.Namely, S oA={ A 1, A 3..., A 2n-1..., A 2N-1and S eA={ A 2, A 4..., A 2n..., A 2N.Alice also does same thing to logic quantum bit B.Correspondingly, S is had oB={ B 1, B 3..., B 2n-1..., B 2N-1and S eB={ B 2, B 4..., B 2n..., B 2N.Then, in order to safety detection and mutual identity authentication, Alice prepares the sample logic Bell state (quantity of sample logic Bell state equals the length of K) of sufficient amount, and these sample logic Bell state is divided into two subsequences be made up of logic quantum bit A and B respectively.Then, the subsequence radom insertion S that will be made up of sample logic quantum bit A of Alice eAto form S ' eA.Similarly, Alice is to sample logic quantum bit B and S eBdo same thing to form S ' eB.Then, Alice keeps S oA, S ' eAand S oBmotionless, and by a quantum channel by S ' eBsend Bob to.Obviously, S ' eBbe sent out in the mode of Bulk transport [1].
S2) inform that Alice receives S ' at Bob eBafter, Alice detects S ' eBtransmission security and the identity of certification Bob.Alice tells BobS ' by a classical channel eBthe position of middle sample logic quantum bit.S ' is measured according to K, Bob eBin sample logic quantum bit to obtain measurement result then, Bob is by the measurement result of classical channel by him send to Alice.S ' is measured according to K, Alice eAin sample logic quantum bit to obtain measurement result because Alice prepares sample logic Bell state in person, according to with she can judge S ' simultaneously eBthe existence of listener-in and the identity of Bob between transmission period.If Alice finds wrong, her interrupt communication; Otherwise, she also with the mode throughput subchannel of Bulk transport [1] by S ' eAsend Bob to.
S3) inform that Alice receives S ' at Bob eAafter, Alice tells BobS ' eAthe position of middle sample logic quantum bit.Then, Bob abandons S ' eAwith S ' eBin sample logic quantum bit.Correspondingly, S ' eAwith S ' eBtransformed back into S respectively eAand S eB.Then, Bob is from S eAand S eBchoose logic quantum bit A respectively 2nand B 2n, and they are saved as 2n infologic Bell state again.Then, in order to know (A 2n, B 2n) quantum state, Bob applies two Bell state to the 1st and the 3rd quantum bit and the 2nd and the 4th quantum bit respectively and measures.Due to every two adjacent infologic Bell state (A 2n-1, B 2n-1) and (A 2n, B 2n) to be prepared in step S1 by Alice and to be in identical quantum state, Bob can from (A 2n, B 2n) directly know (A 2n-1, B 2n-1) quantum state.
S4) Alice also with the mode throughput subchannel of Bulk transport [1] by S oBsend Bob to.Then, Bob is from S oBselect N/4 logic quantum bit as sample logic quantum bit and tell their position of Alice by classical channel.S is measured according to K, Alice oAin corresponding sample logic quantum bit to obtain measurement result then, Alice is by the measurement result of classical channel by her send to Bob.S is measured according to K, Bob oBin sample logic quantum bit to obtain measurement result then, owing to knowing (A in step S3 2n-1, B 2n-1) quantum state, according to with he Bob can judge S simultaneously oBthe existence of listener-in and the identity of Alice between transmission period.If Bob finds wrong, his interrupt communication; Otherwise communication continues.
S5) Alice and Bob abandons S respectively in order oAand S oBin sample logic quantum bit.Conveniently, remaining S oAand S oBuse S ' respectively oA=A ' 1, A ' 2..., A ' 3N/4and S ' oB=B ' 1, B ' 2..., B ' 3N/4represent.Then, in order to encode, Alice couple apply logic operation at the tenth of the twelve Earthly Branches like this, S ' oAbe converted into S OA &prime; &prime; = { &Omega; i 1 j 1 A 1 &prime; , &Omega; i 2 j 2 A 2 &prime; , . . . , &Omega; i 3 N / 4 j 3 N / 4 A 3 N / 4 &prime; } . Then, Alice also with the mode throughput subchannel of Bulk transport [1] by S " oAsend Bob to.
S6) S is being received " oAafter, in order to encode, Bob couple apply logic operation at the tenth of the twelve Earthly Branches like this, S " oAbe converted into S OA &prime; &prime; &prime; = { &Omega; t 1 l 1 &Omega; i 1 j 1 A 1 &prime; , &Omega; t 2 l 2 &Omega; i 2 j 2 A 2 &prime; , . . . , &Omega; t 3 N / 4 l 3 N / 4 &Omega; i 3 N / 4 j 3 N / 4 A 3 N / 4 &prime; } . Then, Bob is from S " ' oAwith S ' oBchoose respectively with B ' dwith form d (d ∈ 1,2 ..., 3N/4}) and group.Then, in order to know quantum state, Bob applies two Bell state to the 1st and the 3rd quantum bit and the 2nd and the 4th quantum bit respectively and measures.According to the logic operation at the tenth of the twelve Earthly Branches of himself right with him measurement result, Bob can read (i d, j d), because he know (A ' d, B ' d) quantum state.Here, the classical bit decoded is represented as m ' a|| h (m a) ', be m ' wherein athe m decoded a, h (m ah (the m that) ' be decodes a).Then, with the protocol class of document [41] seemingly, Bob calculates m ' acryptographic Hash (be referred to as h (m ' a)) and by h (m ' a) and h (m a) ' compare.If they are identical, m ' areal m is thought by Bob aand communication continues; Otherwise communication is terminated.
S7) Bob is right by him by classical channel measurement result send to Alice.Similarly, according to the logic operation at the tenth of the twelve Earthly Branches of herself alice can know (t d, l d) (d ∈ 1,2 ..., 3N/4}) because herself preparation (A ' d, B ' d).Here, the classical bit decoded is represented as m ' b|| h (m b) ', be m ' wherein bthe m decoded b, h (m bh (the m that) ' be decodes b).Then, with the protocol class of document [41] seemingly, Alice calculates m ' bcryptographic Hash (be referred to as h (m ' b)) and by h (m ' b) and h (m b) ' compare.If they are identical, m ' breal m is thought by Alice b; Otherwise communication is terminated.
3, safety analysis
(1) attack is played the part of
With the protocol class of document [41] seemingly, what always have two kinds of situations here plays the part of attack.
The first situation is: in order to obtain the classical bit of Alice, Eve plays the part of Bob and Alice and communicates.But because Eve does not know the secret key K for selecting sample logic quantum bit to measure base, she is to S ' eBthe random measurement of middle sample logic quantum bit can not produce really therefore, when Alice passes through assessment in step S2 with mistake between relation with the identity of certification Bob time, Eve can be detected.
Second case is: in order to obtain the classical bit of Bob, Eve plays the part of Alice and Bob and communicates.The S ' that Eve preparation is false eB, S ' eA, S oBand S oA, and by the S ' of vacation eB, S ' eAand S oBbob is sent to respectively in step S1, S2 and S4.Then, false S is measured according to K, Bob oBin sample logic quantum bit and obtain one false owing to not knowing K, the S of Eve random measurement vacation oAin corresponding sample logic quantum bit and obtain one false obviously, false with vacation between relation be inharmonic.Therefore, when Bob is in step S4 false by assessment with vacation between relation with the identity of certification Alice time, Eve can be detected.
(2) man-in-the-middle attack
In order to obtain the classical bit of Alice and Bob, Eve independently communicates to apply man-in-the-middle attack by setting up two with them.[41] S ' that Eve preparation is false eB, S ' eA, S oBand S oA, and replace with them all real logic quantum bits transmitted between Alice and Bob.As above analyzed, Eve is detected in the mutual certification of Alice and Bob, because she can not prepare out real initial state and measurement result.
(3) amendment is attacked
The object that the amendment of Eve is attacked is to make participant obtain the classical bit of mistake.[41] with the protocol class of document [41] seemingly, the amendment always having two kinds of situations is here attacked.
The first situation is: the S that to send Bob at amendment Alice in step S5 to " oAafter, Eve sends amended version to Bob.Due to S " oAcontain h (m a), the amendment of Eve is attacked and is detected by Bob in step S6 is to the verification process of the classical bit of Alice, even if only have S " oAa logic quantum bit be modified.
Second case is: send to Alice at amendment Bob in step S7 measurement result (be represented as R msg) after, Eve sends amended version to Alice.Due to R msgcontain h (m b), the amendment of Eve is attacked and is detected by Alice in step S7 is to the verification process of the classical bit of Bob.
Can reach a conclusion, hashing operation makes the amendment of Eve attack to detect.
(4) Trojan attack
Always having two kinds of Trojan attack, is invisible photon eavesdropping [56] and delay photon Trojan attack [57] respectively.Because all logic quantum bits are the one-way transmission from Alice to Bob only, the agreement that the present invention proposes is natively to Trojan attack immunity.
Embodiment:
1, AQD protocol application citing
Suppose (i 1, j 1) and (t 1, l 1) be (0,1) and (1,0) respectively.And, suppose (A ' 1, B ' 1) be produced and be in Ω is applied respectively at Alice and Bob 01and Ω 10after encoding, (A ' 1, B ' 1) be converted into then, Bob can easily read (i 1, j 1) be (0,1).By classical channel, he is right at Bob measurement result send to Alice after, Alice can easily infer (t 1, l 1) be (1,0).Decoding m ' a|| h (m a) ' after, Bob calculating h (m ' a) and by h (m ' a) and h (m a) ' compare is with the m of certification Alice a.Similarly, m ' is being decoded b|| h (m b) ' after, Alice calculating h (m ' b) and by h (m ' b) and h (m b) ' compare is with the m of certification Bob b.
2, discuss
Information leakage problem refers to that any other people does not need to carry out any active attack only from declaring publicly just energy Extraction parts classical information.Due to every two adjacent infologic Bell state (A 2n-1, B 2n-1) and (A 2n, B 2n) be in identical quantum state, at Alice by S ' by Alice in step S1 preparation eAwith S ' eBafter sending Bob to, Bob can from (A 2n, B 2n) directly know (A 2n-1, B 2n-1) initial state.Therefore, Alice there is no need to announce (A to Bob 2n-1, B 2n-1) initial state.Like this, Eve does not have approach to know (A 2n-1, B 2n-1) initial state.In this case, for Eve, measurement result contain the logic operative combination at the tenth of the twelve Earthly Branches of 16 kinds of Alice and Bob.According to the information theory [55] of Shannon, this comprises bit information, just in time equal Alice and Bob by coding classical bit number.Therefore, information is not had to be leaked out.Obviously, (A 2n, B 2n) role that plays the part of auxiliary logic Bell state helps to overcome information leakage problem, with the protocol class of document [54] seemingly.
3, sum up
Phase noise AQD agreement is moved back by the anti-collective that the present invention utilizes logic Bell state to propose a logic-based Bell state as quantum resource, and wherein a kind of secret key for selecting sample logic quantum bit to measure base is shared in confidence by two participants in advance.With QD agreement [12-24 before, 28-39,41,51,53-54] compare, the outstanding advantages of agreement proposed by the invention is: when supposing can be ravesdropping by the information of classical transmission and revise, it can realize mutual identity authentication and dialogue safely in the noisy communication channel of collective's dephasign position between two participants simultaneously.Other of agreement proposed by the invention are characterized as:
(1) measure about quantum, Bell state is measured but not four quantum bit combined measurements are used to decoding;
(2) about information leakage problem, the method directly transmitting auxiliary logic Bell state is used to avoid it;
(3) about the active attack of Eve, play the part of attack, man-in-the-middle attack and amendment and attack and can be detected, and Trojan attack is avoided natively.

Claims (1)

1. a phase noise certification quantum session protocol moves back in the anti-collective of logic-based Bell state, can realize mutual identity authentication and dialogue safely in the noisy communication channel of collective's dephasign position between two participants simultaneously; The information of classical transmission is utilized to be ravesdropping and to revise; A kind of secret key K for selecting sample logic quantum bit to measure base is shared in advance in confidence between two participants; Employing Bell state measures but not four quantum bit combined measurements are used for decoding; Between two participants, the initial state of infologic Bell state is shared to avoid information leakage problem by means of directly transmitting auxiliary logic Bell state; Can detect that play the part of attack, man-in-the-middle attack and amendment from Eve are attacked, and avoid Trojan attack natively; Comprise following seven processes altogether:
S1) Alice prepares 2N infologic Bell state
{ (A 1, B 1), (A 2, B 2) ..., (A 2n-1, B 2n-1), (A 2n, B 2n) ..., (A 2N-1, B 2N-1), (A 2N, B 2N) (n=1,2 ..., N), wherein every two adjacent infologic Bell state (A 2n-1, B 2n-1) and (A 2n, B 2n) be produced and be in four quantum states at random one of identical quantum state; The logic quantum bit A that Alice chooses respectively with odd index and even index carrys out composition sequence S oAand S eA, namely, S oA={ A 1, A 3..., A 2n-1..., A 2N-1and S eA={ A 2, A 4..., A 2n..., A 2N; Alice also does same thing to logic quantum bit B, correspondingly, has
S oB={ B 1, B 3..., B 2n-1..., B 2N-1and S eB={ B 2, B 4..., B 2n..., B 2N; Then, in order to safety detection and mutual identity authentication, Alice prepares the sample logic Bell state (quantity of sample logic Bell state equals the length of secret key K) of sufficient amount, and these sample logic Bell state is divided into two subsequences be made up of logic quantum bit A and B respectively; Then, the subsequence radom insertion S that will be made up of sample logic quantum bit A of Alice eAto form S ' eA; Similarly, Alice is to sample logic quantum bit B and S eBdo same thing to form S ' eB; Then, Alice keeps S oA, S ' eAand S oBmotionless, and pass through a quantum channel in the mode of Bulk transport by S ' eBsend Bob to;
S2) inform that Alice receives S ' at Bob eBafter, Alice detects S ' eBtransmission security and the identity of certification Bob; Alice tells BobS ' by a classical channel eBthe position of middle sample logic quantum bit; S ' is measured according to K, Bob eBin sample logic quantum bit to obtain measurement result then, Bob is by the measurement result of classical channel by him send to Alice; S ' is measured according to K, Alice eAin sample logic quantum bit to obtain measurement result because Alice prepares sample logic Bell state in person, according to with she can judge S ' simultaneously eBthe existence of listener-in and the identity of Bob between transmission period; If Alice finds wrong, her interrupt communication, otherwise, she also with the mode throughput subchannel of Bulk transport by S ' eAsend Bob to;
S3) inform that Alice receives S ' at Bob eAafter, Alice tells BobS ' eAthe position of middle sample logic quantum bit; Then, Bob abandons S ' eAwith S ' eBin sample logic quantum bit; Correspondingly, S ' eAwith S ' eBtransformed back into S respectively eAand S eB; Then, Bob is from S eAand S eBchoose logic quantum bit A respectively 2nand B 2n, and they are saved as 2n infologic Bell state again; Then, in order to know (A 2n, B 2n) quantum state, Bob applies two Bell state to the 1st and the 3rd quantum bit and the 2nd and the 4th quantum bit respectively and measures; Due to every two adjacent infologic Bell state (A 2n-1, B 2n-1) and (A 2n, B 2n) to be prepared in step S1 by Alice and to be in identical quantum state, Bob can from (A 2n, B 2n) directly know (A 2n-1, B 2n-1) quantum state;
S4) Alice also with the mode throughput subchannel of Bulk transport by S oBsend Bob to; Then, Bob is from S oBselect N/4 logic quantum bit as sample logic quantum bit and tell their position of Alice by classical channel; S is measured according to K, Alice oAin corresponding sample logic quantum bit to obtain measurement result then, Alice is by the measurement result of classical channel by her send to Bob; S is measured according to K, Bob oBin sample logic quantum bit to obtain measurement result then, because Bob knows (A in step S3 2n-1, B 2n-1) quantum state, according to with he can judge S simultaneously oBthe existence of listener-in and the identity of Alice between transmission period; If Bob finds wrong, his interrupt communication, otherwise communication continues;
S5) Alice and Bob abandons S respectively in order oAand S oBin sample logic quantum bit; Remaining S oAand S oBuse S ' respectively oA=A ' 1, A ' 2..., A ' 3N/4and S ' oB=B ' 1, B ' 2..., B ' 3N/4represent; Then, in order to encode, Alice is to A ' d(d=1,2 ..., 3N/4) and apply logic operation at the tenth of the twelve Earthly Branches like this, S ' oAbe converted into S OA &prime; &prime; = { &Omega; i 1 j 1 A 1 &prime; , &Omega; i 2 j 2 A 2 &prime; , &CenterDot; &CenterDot; &CenterDot; , &Omega; i 3 N / 4 j 3 N / 4 A 3 N / 4 &prime; } ; Then, Alice also with the mode throughput subchannel of Bulk transport by S " oAsend Bob to;
S6) S is being received " oAafter, in order to encode, Bob couple apply logic operation at the tenth of the twelve Earthly Branches like this, S " oAbe converted into S OA &prime; &prime; &prime; = { &Omega; t 1 l 1 &Omega; i 1 j 1 A 1 &prime; , &Omega; t 2 l 2 &Omega; i 2 j 2 A 2 &prime; , &CenterDot; &CenterDot; &CenterDot; , &Omega; t 3 N / 4 l 3 N / 4 &Omega; i 3 N / 4 j 3 N / 4 A 3 N / 4 &prime; } ; Then, Bob is from S " ' oAwith S " oBchoose respectively with B ' dwith form d (d ∈ 1,2 ..., 3N/4}) and group; Then, in order to know quantum state, Bob applies two Bell state to the 1st and the 3rd quantum bit and the 2nd and the 4th quantum bit respectively and measures; According to the logic operation at the tenth of the twelve Earthly Branches of himself right with him measurement result, Bob can read (i d, j d), because he know (A ' d, B ' d) quantum state; Here, the classical bit decoded is represented as m ' a|| h (m a) ', be m ' wherein athe m decoded a, h (m ah (the m that) ' be decodes a); Then, Bob calculates m ' acryptographic Hash (be referred to as h (m ' a)) and by h (m ' a) and h (m a) ' compare; If they are identical, m ' areal m is thought by Bob aand communication continues, otherwise communication is terminated;
S7) Bob is right by him by classical channel
{ ( &Omega; t 1 l 1 &Omega; i 1 j 1 A 1 &prime; , B 1 &prime; ) , ( &Omega; t 2 l 2 &Omega; i 2 j 2 A 2 &prime; , B 2 &prime; ) , &CenterDot; &CenterDot; &CenterDot; , ( &Omega; t 3 N / 4 l 3 N / 4 &Omega; i 3 N / 4 j 3 N / 4 A 3 N / 4 &prime; , B 3 N / 4 &prime; ) } Measurement result send to Alice; Similarly, according to the logic operation at the tenth of the twelve Earthly Branches of herself alice can know (t d, l d) (d ∈ 1,2 ..., 3N/4}) because herself preparation (A ' d, B ' d); Here, the classical bit decoded is represented as m ' b|| h (m b) ', be m ' wherein bthe m decoded b, h (m bh (the m that) ' be decodes b); Then, Alice calculates m ' bcryptographic Hash (be referred to as h (m ' b)) and by h (m ' b) and h (m b) ' compare; If they are identical, m ' breal m is thought by Alice botherwise, communication is terminated.
CN201410658400.1A 2014-11-18 2014-11-18 Phase noise certification quantum dialogue method moves back in the anti-collective of logic-based Bell state Active CN104468117B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410658400.1A CN104468117B (en) 2014-11-18 2014-11-18 Phase noise certification quantum dialogue method moves back in the anti-collective of logic-based Bell state

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410658400.1A CN104468117B (en) 2014-11-18 2014-11-18 Phase noise certification quantum dialogue method moves back in the anti-collective of logic-based Bell state

Publications (2)

Publication Number Publication Date
CN104468117A true CN104468117A (en) 2015-03-25
CN104468117B CN104468117B (en) 2017-12-01

Family

ID=52913547

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410658400.1A Active CN104468117B (en) 2014-11-18 2014-11-18 Phase noise certification quantum dialogue method moves back in the anti-collective of logic-based Bell state

Country Status (1)

Country Link
CN (1) CN104468117B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109039477A (en) * 2018-07-31 2018-12-18 西北大学 A kind of fault tolerant quantum dialogue method based on decoherence free subspace
CN109547118A (en) * 2018-12-03 2019-03-29 北京邮电大学 The method and client carried out data transmission using position of closely making an uproar
CN109586909A (en) * 2019-01-21 2019-04-05 成都信息工程大学 Based on Bell state quantal data library access control and Bidirectional identity authentication method
CN111092733A (en) * 2019-12-10 2020-05-01 西北大学 Quantum blind double signature method for resisting collective noise

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297226A (en) * 2013-06-03 2013-09-11 浙江工商大学 Controlled bi-directional quantum secure direct communication protocol free of information leakage
CN103346877A (en) * 2013-06-28 2013-10-09 浙江工商大学 Information non-leakage quantum conversation protocol based on cavity QED
CN103731255A (en) * 2013-12-02 2014-04-16 浙江工商大学 Quantum secure dialogue protocol based on quantum encryption
CN104104503A (en) * 2014-07-22 2014-10-15 浙江工商大学 Collective dephasing noise resisting error tolerance channel encryption quantum dialogue protocol

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297226A (en) * 2013-06-03 2013-09-11 浙江工商大学 Controlled bi-directional quantum secure direct communication protocol free of information leakage
CN103346877A (en) * 2013-06-28 2013-10-09 浙江工商大学 Information non-leakage quantum conversation protocol based on cavity QED
CN103731255A (en) * 2013-12-02 2014-04-16 浙江工商大学 Quantum secure dialogue protocol based on quantum encryption
CN104104503A (en) * 2014-07-22 2014-10-15 浙江工商大学 Collective dephasing noise resisting error tolerance channel encryption quantum dialogue protocol

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
TIAN-YU YE: "Quantum dialogue without information leakage based on the entanglement swapping between any two Bell states and shared secret Bell state", 《PHYSICAL SCRIPTA》 *
YE TIANYU: "Quantum Secure Dialogue with Quantum Encryption", 《COMMUNNICATION THEORY PHYSICAL》 *
叶天语: "基于Bell态和Bell测量的无信息泄露受控双向量子安全直接通信", 《光子学报》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109039477A (en) * 2018-07-31 2018-12-18 西北大学 A kind of fault tolerant quantum dialogue method based on decoherence free subspace
CN109547118A (en) * 2018-12-03 2019-03-29 北京邮电大学 The method and client carried out data transmission using position of closely making an uproar
CN109586909A (en) * 2019-01-21 2019-04-05 成都信息工程大学 Based on Bell state quantal data library access control and Bidirectional identity authentication method
CN109586909B (en) * 2019-01-21 2020-08-04 成都信息工程大学 Bell state quantum database access control and bidirectional identity authentication method
CN111092733A (en) * 2019-12-10 2020-05-01 西北大学 Quantum blind double signature method for resisting collective noise

Also Published As

Publication number Publication date
CN104468117B (en) 2017-12-01

Similar Documents

Publication Publication Date Title
CN107666356B (en) Requirement classical communication person based on single photon has half quantum dialogue method of measurement capability
CN102904726B (en) Classical channel message authentication method and device for quantum key distribution system
CN107517101A (en) Do not require that classical communication person possesses half quantum dialogue method of measurement capability based on single photon
Hwang et al. Comment on “Security analysis and improvements of arbitrated quantum signature schemes”
Ye Information leakage resistant quantum dialogue against collective noise
CN106712936A (en) Ring structure based multi-party quantum key agreement protocol
CN104468529B (en) Anti- collective&#39;s dephasign position noise robustness quantum dialogue method of logic-based quantum bit and control not operation
CN105871544A (en) Two-party quantum private comparison method based on five-quantum bit entangled state
Zhou et al. Quantum deterministic key distribution protocols based on the authenticated entanglement channel
CN104468117A (en) Quantum dialogue protocol with collective-dephasing noise resisting authentication based on logic Bell states
CN104618119B (en) Suitable for the quantum Email quantum authentication encryption method based on two photon entanglement states
CN104104503A (en) Collective dephasing noise resisting error tolerance channel encryption quantum dialogue protocol
Zhou et al. Novel quantum deterministic key distribution protocols with entangled states
Li et al. The Security Analysis of Quantum SAGR04 Protocol in Collective‐Rotation Noise Channel
Mafu et al. Finite-key-size security of the Phoenix-Barnett-Chefles 2000 quantum-key-distribution protocol
Yin et al. Efficient quantum dialogue without information leakage
Li et al. Improved quantum “Ping-pong” protocol based on GHZ state and classical XOR operation
Tsai et al. One-way quantum authenticated secure communication using rotation operation
Gan Quantum key distribution scheme with high efficiency
CN104104498A (en) Shearing auxiliary logic Bell state based collective dephasing noise resistant quantum dialogue protocol
GÜMÜŞ et al. Quantum cryptography and comparison of quantum key distribution protocols
Huang et al. Quantum secure direct communication based on chaos with authentication
CN104125054A (en) Error tolerance quantum steganography sub-protocol applicable to collective dephasing noise channels
Li et al. An arbitrated quantum signature scheme based on entanglement swapping with signer anonymity
Lin et al. Attacks and improvement on “quantum direct communication with mutual authentication”

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20200217

Address after: 510670 room 1013, 81 Kefeng Road, Lianhe street, Huangpu District, Guangzhou City, Guangdong Province

Patentee after: Guangzhou Fangwei Intellectual Property Service Co., Ltd.

Address before: 310012 No. 149 staff Road, Hangzhou, Zhejiang, Xihu District

Patentee before: ZHEJIANG GONGSHANG University

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201120

Address after: 408300 Chongqing Dianjiang County Industrial Park

Patentee after: CHONGQING JINLONG TECHNOLOGY Co.,Ltd.

Address before: 510670 room 1013, 81 Kefeng Road, Lianhe street, Huangpu District, Guangzhou City, Guangdong Province

Patentee before: Guangzhou Fangwei Intellectual Property Service Co.,Ltd.

TR01 Transfer of patent right