Background technology
Between two participants, the direct transmission of secret information is carried out in order to realize throughput subsignal, Long and Liu [1] proposed first Quantum Secure Direct Communication (Quantum Secure DirectCommunication, QSDC) agreement (be called as subsequently state encode two step agreements) in 2002.This agreement has invented this thought of quantal data Bulk transport.From then on, many good QSDC agreements are fabricated out [2-11].
Between two participants, carry out the two-way communication of secret information to realize throughput subsignal, Nguyen [12] and Zhang etc. [13-14] are the independent concept proposing quantum dialogue (QuantumDialogue, QD) in 2004.After this, many QD agreements are suggested [15-24] according to different quantum techniques.Unfortunately, always there is the security risk being referred to as information leakage found in 2008 by [25-26] such as Gao in them.In fact, to result from the classics that Tan with Cai [27] pointed out in 2008 relevant for the information leakage problem of QD.Subsequently, the QD agreement how designed without information leakage causes rapidly the interest of researchers.Like this, many good anti-information leakage QD agreements are devised [28-37].
But above-mentioned all QD agreements [12-24,28-37] are just operated on following basis: can not be ravesdropping and revise by the information of classical transmission.Once this hypothesis is false, their face external assailant at once and play the part of the serious security risk that the attacks such as attacks, man-in-the-middle attack and amendment attack cause.Like this, a kind of special QD agreement being referred to as certification quantum dialogue (Authenticated Quantum Dialogue, AQD) is put forward to make up this defect by [39] such as Naseri [38] and Shen.But point out in 2013 as [40] such as Lin, the agreement [39] of Shen etc. is subject to man-in-the-middle attack and threatens.The agreement [38] of Naseri is no exception under this kind of attack.Subsequently, in order to improve the fail safe of AQD, Lin etc. [41] propose an AQD agreement based on Bell state, and wherein two participants can realize mutual identity authentication and dialogue safely simultaneously.In the agreement [41] of Lin etc., two kinds of secret keys are shared in confidence by two participants, and wherein the first secret key is for the preparation of initial Bell state.In this case, two participants enjoy initial Bell state in advance.But in anti-information leakage QD field, the initial state of quantum state is not enjoyed by two participants usually in advance.Another shortcoming of the agreement [41] of Lin etc. is that it is only operated in ideal communication channel.It is important to point out, anti-information leakage QD agreement [28-37] before is also operated in ideal communication channel only.In fact, harmful being coupled between photon with actual environment inevitably exists.Therefore, the impact of interchannel noise should be considered.Point out as document [42-43], transmit in time window faster if photon to change than noise at one, interchannel noise can be regarded as collective's noise.The first collective's noise is that phase noise moves back in collective, total keeps the horizontal polarization state of photon | and 0> is constant and by the perpendicular polarization state of photon | and 1> changes into
| 1> [44].Another kind of noise is collective's rotational noise, always will | 0> and | 1> is separately converted to coS θ | 0>+sin θ | 1> and-sin θ | 0>+coS θ | 1> [46].Here,
corresponding time dependent noise parameter with θ.As the means of a kind of effective opposing collective noise, not affected by noise has been commonly used to design antinoise quantum cryptographic protocols without eliminating coherence (Decoherence-Free, DF) state [42-54].Such as, the robust QD agreement of document [51] and document [53] utilizes the product state of two quantum bit DF states and two quantum bit DF states as quantum resource respectively, and the robust QD agreement of document [54] utilizes four quantum bit DF states as quantum resource.
Based on above analysis, phase noise AQD agreement is moved back by the anti-collective that the present invention utilizes logic Bell state (a kind of four quantum bit DF states) to propose a logic-based Bell state as quantum resource, wherein can be ravesdropping and revise by the information of classical transmission.Agreement proposed by the invention can realize mutual identity authentication and dialogue safely in the noisy communication channel of collective's dephasign position between two participants simultaneously.With the protocol class of document [41] seemingly, a kind of secret key for selecting sample logic quantum bit to measure base is shared in confidence by two participants in advance.Bell state is measured but not four quantum bit combined measurements are used for decoding.With the QD protocol class of document [54] seemingly, two participants are by means of directly transmitting the initial state that auxiliary logic Bell state shares infologic Bell state.Like this, information leakage problem is avoided.Play the part of attack, man-in-the-middle attack and amendment from Eve are attacked and can be detected, and Trojan attack is avoided natively.
List of references
[1]Long G L,Liu X S,Phys Rev A,2002,65:032302
[2]Bostrom K,Felbinger T,Phys Rev Lett,2002,89:187902
[3]Deng F G,Long G L,Liu X S,Phys Rev A,2003,68:042317
[4]Deng F G,Long G L,Phys Rev A,2004,69:052319
[5]Wang C,Deng F G,Li Y S,Liu X S,Long G L,Phys Rev A,2005,71:044305
[6]Wang C,Deng F G,Long G L,Opt Commun,2005,253:15
[7]Li X H,Li C Y,Deng F G,Zhou P,Liang Y J,Zhou H Y,Chin Phys,2007,16(8):2149-2153
[8]Chen X B,Wen Q Y,Guo F Z,Sun Y,Xu G,Zhu F C,Int J Quant Inform,2008,6:899
[9]Gu B,Huang Y G,Fang X,Zhang C Y,Chin Phys B,2011,20:100309
[10]Liu D,Chen J L,Jiang W,Int J Theor Phys,2012,51:2923
[11]Ren B C,Wei H R,Hua M,Li T,Deng F G,Eur Phys J D,2013,67:30
[12]Nguyen B A,Phys Lett A,2004,328(1):6-10
[13]Zhang Z J,Man Z X,2004,http://arxiv.org/pdf/quant-ph/0403215.pdf
[14]Zhang Z J,Man Z X,2004,http://arxiv.org/pdf/quant-ph/0403217.pdf
[15]Man Z X,Zhang Z J,Li Y,Chin Phys Lett,2005,22(1):22-24
[16]Jin X R,Ji X,Zhang Y Q,Zhang S,et al.,Phys Lett A,2006,354(1-2):67-70
[17]Man Z X,Xia Y J,Chin Phys Lett,2006,23(7):1680-1682
[18]Ji X,Zhang S,Chin Phys,2006,15(7):1418-1420
[19]Man Z X,Xia Y J,Nguyen B A,J Phys B-At Mol Opt Phys,2006,39(18):3855-3863
[20]Man Z X,Xia Y J,Chin Phys Lett,2007,24(1):15-18
[21]Chen Y,Man Z X,Xia Y J,Chin Phys Lett,2007,24(1):19-22
[22]Yang Y G,Wen Q Y,Sci China Ser G-Phys Mech Astron,2007,50(5):558-562
[23]Shan C J,Liu J B,Cheng W W,Liu T K,Huang Y X,Li H,Mod Phys Lett B,2009,23(27):3225-3234
[24]Ye T Y,Jiang L Z,Chin Phys Lett,2013,30(4):040305
[25]Gao F,Qin S J,Wen Q Y,Zhu F C,Phys Lett A,2008,372(18):3333-3336
[26]Gao F,Guo F Z,Wen Q Y,Zhu F C,Sci China Ser G-Phys Mech Astron,2008,51(5):559-566
[27]Tan Y G,Cai Q Y,Int J Quant Inform,2008,6(2):325-329
[28]Shi G F,Xi X Q,Tian X L,Yue R H,Opt Commun,2009,282(12):2460-2463
[29]Shi G F,Opt Commun,2010,283(24):5275-5278
[30]Gao G,Opt Commun,2010,283(10):2288-2293
[31]Shi G F,Xi X Q,Hu M L,Yue R H,Opt Commun,2010,283(9):1984-1986
[32]Shi G F,Tian X L,J Mod Opt,2010,57(20):2027-2030
[33]Ye T Y,Int J Quant Inform,2013,11(5):1350051
[34]Ye T Y,Jiang L Z,Phys Scr,2014,89(1):015103
[35]Ye T Y,Commun Theor Phys,2014,62(3):338-342
[36]Ye T Y,Int J Theor Phys,2014,53(11):3719-3727
[37]Zheng C,Long G F,Sci China-Phys Mech Astron,2014,57(7):1238-1243
[38]Naseri M,Int J Quant Inf,2011,9(7-8):1677-1684
[39]Shen D S,Ma W P,Yin X R,Li X P,Int J Theor Phys,2013,52(6):1825-1835
[40]Lin T H,Lin C Y,Hwang T,Int J Theor Phys,2013,52(9):3199-3203
[41]Lin C Y,Yang C W,Hwang T,Int J Theor Phys,in press,doi:10.1007/s 10773-014-2269-4
[42]Li X H,Deng F G,Zhou H Y,Phys Rev A,2008,78:022321
[43]Li X H,Zhao B K,Sheng Y B,et al.,Int J Quant Inform,2009,7(8):1479-1489
[44]Walton Z D,Abouraddy A F,Sergienko A V,et al.,Phys Rev Lett,2003,91:087901
[45]Boileau J C,Gottesman D,Laflamme R,et al.,Phys Rev Lett,2004,92:017901
[46]Zhang Z J,Physica A,2006,361:233-238
[47]Gu B,Pei S X,Song B,Zhong K,Sci China Ser G-Phys Mech Astron,2009,52(12):1913-1918
[48]Gu B,Mu L L,Ding L G,Zhang C Y,Li C Q,Opt Commun,2010,283:3099-3103
[49]Yang C W,TSAI C W,Hwang T,Sci China-Phys Mech Astron,2011,54(3):496-501
[50]Gu B,Zhang C Y,Cheng G S,Huang Y G,Sci China-Phys Mech Astron,2011,54(5):942-947
[51]Yang C W,Hwang T,Quantum InfProcess,2013,12:2131-2142
[52]Lin J,Hwang T,Quantum Inf Process,2013,12:1089-1107
[53]Ye T Y,Sci China-Phys Mech Astron,2014,57(12):2266-2275
[54]Ye T Y,Sci Sin-Phys Mech Astron,in press,doi:10.1360/SSPMA2014-00289(In chinese)
[55]Shannon C E,Bell System Tech J,1949,28:656-715
[56]Cai Q Y,Phys Lett A,2006,351(1-2):23-25
[57]Gisin N,Ribordy G,Tittel W,Zbinden H,Rev Mod Phys,2002,74(1):145-195
Summary of the invention
Phase noise AQD agreement is moved back by the anti-collective that the object of the invention is to design a kind of logic-based Bell state, reaches the object simultaneously realizing mutual identity authentication and dialogue in the noisy communication channel of collective's dephasign position between two participants safely.
A phase noise AQD agreement is moved back by the anti-collective of logic-based Bell state, comprises following seven processes altogether:
S1) Alice prepares 2N infologic Bell state { (A
1, B
1), (A
2, B
2) ..., (A
2n-1, B
2n-1), (A
2n, B
2n) ..., (A
2N-1, B
2N-1), (A
2N, B
2N) (n=1,2 ..., N), wherein every two adjacent infologic Bell state (A
2n-1, B
2n-1) and (A
2n, B
2n) be produced and be in identical quantum state and (be in four quantum states at random
one of), with first protocol class of document [54] seemingly.The logic quantum bit A that Alice chooses respectively with odd index and even index carrys out composition sequence S
oAand S
eA.Namely,
S
oA={ A
1, A
3..., A
2n-1..., A
2N-1and S
eA={ A
2, A
4..., A
2n..., A
2N.Alice also does same thing to logic quantum bit B.Correspondingly, S is had
oB={ B
1, B
3..., B
2n-1..., B
2N-1and S
eB={ B
2, B
4..., B
2n..., B
2N.Then, in order to safety detection and mutual identity authentication, Alice prepares the sample logic Bell state (quantity of sample logic Bell state equals the length of K) of sufficient amount, and these sample logic Bell state is divided into two subsequences be made up of logic quantum bit A and B respectively.Then, the subsequence radom insertion S that will be made up of sample logic quantum bit A of Alice
eAto form S '
eA.Similarly, Alice is to sample logic quantum bit B and S
eBdo same thing to form S '
eB.Then, Alice keeps S
oA, S '
eAand S
oBmotionless, and by a quantum channel by S '
eBsend Bob to.Obviously, S '
eBbe sent out in the mode of Bulk transport [1].
S2) inform that Alice receives S ' at Bob
eBafter, Alice detects S '
eBtransmission security and the identity of certification Bob.Alice tells BobS ' by a classical channel
eBthe position of middle sample logic quantum bit.S ' is measured according to K, Bob
eBin sample logic quantum bit to obtain measurement result
then, Bob is by the measurement result of classical channel by him
send to Alice.S ' is measured according to K, Alice
eAin sample logic quantum bit to obtain measurement result
because Alice prepares sample logic Bell state in person, according to
with
she can judge S ' simultaneously
eBthe existence of listener-in and the identity of Bob between transmission period.If Alice finds wrong, her interrupt communication; Otherwise, she also with the mode throughput subchannel of Bulk transport [1] by S '
eAsend Bob to.
S3) inform that Alice receives S ' at Bob
eAafter, Alice tells BobS '
eAthe position of middle sample logic quantum bit.Then, Bob abandons S '
eAwith S '
eBin sample logic quantum bit.Correspondingly, S '
eAwith S '
eBtransformed back into S respectively
eAand S
eB.Then, Bob is from S
eAand S
eBchoose logic quantum bit A respectively
2nand B
2n, and they are saved as 2n infologic Bell state again.Then, in order to know (A
2n, B
2n) quantum state, Bob applies two Bell state to the 1st and the 3rd quantum bit and the 2nd and the 4th quantum bit respectively and measures.Due to every two adjacent infologic Bell state (A
2n-1, B
2n-1) and (A
2n, B
2n) to be prepared in step S1 by Alice and to be in identical quantum state, Bob can from (A
2n, B
2n) directly know (A
2n-1, B
2n-1) quantum state.
S4) Alice also with the mode throughput subchannel of Bulk transport [1] by S
oBsend Bob to.Then, Bob is from S
qBselect N/4 logic quantum bit as sample logic quantum bit and tell their position of Alice by classical channel.S is measured according to K, Alice
oAin corresponding sample logic quantum bit to obtain measurement result
then, Alice is by the measurement result of classical channel by her
send to Bob.S is measured according to K, Bob
oBin sample logic quantum bit to obtain measurement result
then, because Bob knows (A in step S3
2n-1, B
2n-1) quantum state, according to
with
he can judge S simultaneously
oBthe existence of listener-in and the identity of Alice between transmission period.If Bob finds wrong, his interrupt communication; Otherwise communication continues.
S5) Alice and Bob abandons S respectively in order
oAand S
oBin sample logic quantum bit.Conveniently, remaining S
oAand S
oBuse S ' respectively
oA=A '
1, A '
2..., A '
3N/4and S '
oB=B '
1, B '
2..., B '
3N/4represent.Then, in order to encode, Alice is to A '
d(d=1,2 ..., 3N/4) and apply logic operation at the tenth of the twelve Earthly Branches
like this, S '
oAbe converted into
Then, Alice also with the mode throughput subchannel of Bulk transport [1] by S "
oAsend Bob to.
S6) S is being received "
oAafter, in order to encode, Bob couple
apply logic operation at the tenth of the twelve Earthly Branches
like this, S "
oAbe converted into
Then, Bob is from S " '
oAwith S '
oBchoose respectively
with B '
dwith form d (d ∈ 1,2 ..., 3N/4}) and group.Then, in order to know
quantum state, Bob applies two Bell state to the 1st and the 3rd quantum bit and the 2nd and the 4th quantum bit respectively and measures.According to the logic operation at the tenth of the twelve Earthly Branches of himself
right with him
measurement result, Bob can read (i
d, j
d), because he know (A '
d, B '
d) quantum state.Here, the classical bit decoded is represented as m '
a|| h (m
a) ', be m ' wherein
athe m decoded
a, h (m
ah (the m that) ' be decodes
a).Then, with the protocol class of document [41] seemingly, Bob calculates m '
acryptographic Hash (be referred to as h (m '
a)) and by h (m '
a) and h (m
a) ' compare.If they are identical, m '
areal m is thought by Bob
aand communication continues; Otherwise communication is terminated.
S7) Bob is right by him by classical channel
measurement result send to Alice.Similarly, according to the logic operation at the tenth of the twelve Earthly Branches of herself
alice can know (t
d, l
d) (d ∈ 1,2 ..., 3N/4}) because herself preparation (A '
d, B '
d).Here, the classical bit decoded is represented as m '
b|| h (m
b) ', be m ' wherein
bthe m decoded
b, h (m
bh (the m that) ' be decodes
b).Then, with the protocol class of document [41] seemingly, Alice calculates m '
bcryptographic Hash (be referred to as h (m '
b)) and by h (m '
b) and h (m
b) ' compare.If they are identical, m '
breal m is thought by Alice
b; Otherwise communication is terminated.
Phase noise AQD agreement is moved back by the anti-collective that the present invention proposes a kind of logic-based Bell state.The agreement that the present invention proposes can realize mutual identity authentication and dialogue safely in the noisy communication channel of collective's dephasign position between two participants simultaneously.Here, can be ravesdropping and revise by the information of classical transmission.A kind of secret key for selecting sample logic quantum bit to measure base is shared in confidence by two participants in advance.Bell state is measured but not four quantum bit combined measurements are used for decoding.Two participants share the initial state of infologic Bell state to avoid information leakage problem by means of directly transmitting auxiliary logic Bell state.Play the part of attack, man-in-the-middle attack and amendment from Eve are attacked and can be detected, and Trojan attack is avoided natively.
Embodiment
Below in conjunction with embodiment, technical scheme of the present invention is described further.
1, there is the logic Bell state of anti-collective's dephasign position noise jamming consistency and ultra dense coding thereof
Four logic Bell state that collective moves back under phase noise can be represented as [48]
Wherein
With
Four original Bell state.Here, | 0
dp>=|01> and | 1
dp>=|10> is two logic quantum bits [44] to collective's dephasign position noise immunity, their superposition state
Also not by this noise effect [46].Correspondingly, under this noise, two logics measurement bases just produce thereupon, i.e. Z
dp=| 0
dp>, | 1
dp>} and X
dp=|+
dp>, |-
dp>}.Easily know from formula (1), as long as two Bell state measurements are applied separately at the 1st and the 3rd quantum bit and the 2nd and the 4th quantum bit, above-mentioned four logic Bell state can be distinguished to each other.[48] and, one in four logics operation at the tenth of the twelve Earthly Branches that these four logic Bell state define by formula (2) to each other transforms mutually.[48-49]
Here, I=|0><0|+|1>LEs sT.LTssT.LT1|, U
x=| 1><0|+|0>LEssT. LTssT.LT1|, U
y=| 0><1|-|1>LEssT. LTssT.LT0 and U
z=| 0><0|-|1>LEssT. LTssT.LT1|.
Suppose that Alice and Bob decides through consultation that four logics operation at the tenth of the twelve Earthly Branches that formula (2) describes represents classical bit with following form in advance:
Ω
I→Ω
00,Ω
z→Ω
01,Ω
x→Ω
10,Ω
y→Ω
11。(3) here, each numeric suffix represents a classical dibit.
2, AQD agreement
Suppose that Alice has 3N/2 classical bit { (i
1, j
1) (i
2, j
2) ... (i
d, j
d) ... (i
3N/4, j
3N/4) (be expressed as m
a|| h (m
a)), wherein m
aher secret, h (m
a) be the cryptographic Hash of her secret; Bob has 3N/2 classical bit { (t
1, l
1) (t
2, l
2) ... (t
d, l
d) ... (t
3N/4, l
3N/4)(be expressed as m
b|| h (m
b)), wherein m
bhis secret, h (m
b) be the cryptographic Hash of his secret.Here, " || " represents connection, and i
d, j
d, t
d, l
d∈ 0,1}, wherein d ∈ 1,2 ..., 3N/4}.With the protocol class of document [41] seemingly, a kind of secret key K for selecting sample logic quantum bit to measure base is assumed to be further to be shared in confidence in advance between Alice and Bob.Here, K ∈ { 0,1}
n/4.That is, if the p of K (p=1,2 ..., N/4) and bit is 0, Z
dpbase is used to measurement p sample logic quantum bit; Otherwise, X
dpbase is used to measure it.Agreement hypothesis of the present invention can be ravesdropping and revise by the information of classical transmission, comprises following seven processes altogether:
S1) Alice prepares 2N infologic Bell state
{ (A
1, B
1), (A
2, B
2) ..., (A
2n-1, B
2n-1), (A
2n, B
2n) ..., (A
2N-1, B
2N-1), (A
2N, B
2N) (n=1,2 ..., N), wherein every two adjacent infologic Bell state (A
2n-1, B
2n-1) and (A
2n, B
2n) be produced and be in identical quantum state and (be in four quantum states at random
one of), with first protocol class of document [54] seemingly.The logic quantum bit A that Alice chooses respectively with odd index and even index carrys out composition sequence S
oAand S
eA.Namely, S
oA={ A
1, A
3..., A
2n-1..., A
2N-1and S
eA={ A
2, A
4..., A
2n..., A
2N.Alice also does same thing to logic quantum bit B.Correspondingly, S is had
oB={ B
1, B
3..., B
2n-1..., B
2N-1and S
eB={ B
2, B
4..., B
2n..., B
2N.Then, in order to safety detection and mutual identity authentication, Alice prepares the sample logic Bell state (quantity of sample logic Bell state equals the length of K) of sufficient amount, and these sample logic Bell state is divided into two subsequences be made up of logic quantum bit A and B respectively.Then, the subsequence radom insertion S that will be made up of sample logic quantum bit A of Alice
eAto form S '
eA.Similarly, Alice is to sample logic quantum bit B and S
eBdo same thing to form S '
eB.Then, Alice keeps S
oA, S '
eAand S
oBmotionless, and by a quantum channel by S '
eBsend Bob to.Obviously, S '
eBbe sent out in the mode of Bulk transport [1].
S2) inform that Alice receives S ' at Bob
eBafter, Alice detects S '
eBtransmission security and the identity of certification Bob.Alice tells BobS ' by a classical channel
eBthe position of middle sample logic quantum bit.S ' is measured according to K, Bob
eBin sample logic quantum bit to obtain measurement result
then, Bob is by the measurement result of classical channel by him
send to Alice.S ' is measured according to K, Alice
eAin sample logic quantum bit to obtain measurement result
because Alice prepares sample logic Bell state in person, according to
with
she can judge S ' simultaneously
eBthe existence of listener-in and the identity of Bob between transmission period.If Alice finds wrong, her interrupt communication; Otherwise, she also with the mode throughput subchannel of Bulk transport [1] by S '
eAsend Bob to.
S3) inform that Alice receives S ' at Bob
eAafter, Alice tells BobS '
eAthe position of middle sample logic quantum bit.Then, Bob abandons S '
eAwith S '
eBin sample logic quantum bit.Correspondingly, S '
eAwith S '
eBtransformed back into S respectively
eAand S
eB.Then, Bob is from S
eAand S
eBchoose logic quantum bit A respectively
2nand B
2n, and they are saved as 2n infologic Bell state again.Then, in order to know (A
2n, B
2n) quantum state, Bob applies two Bell state to the 1st and the 3rd quantum bit and the 2nd and the 4th quantum bit respectively and measures.Due to every two adjacent infologic Bell state (A
2n-1, B
2n-1) and (A
2n, B
2n) to be prepared in step S1 by Alice and to be in identical quantum state, Bob can from (A
2n, B
2n) directly know (A
2n-1, B
2n-1) quantum state.
S4) Alice also with the mode throughput subchannel of Bulk transport [1] by S
oBsend Bob to.Then, Bob is from S
oBselect N/4 logic quantum bit as sample logic quantum bit and tell their position of Alice by classical channel.S is measured according to K, Alice
oAin corresponding sample logic quantum bit to obtain measurement result
then, Alice is by the measurement result of classical channel by her
send to Bob.S is measured according to K, Bob
oBin sample logic quantum bit to obtain measurement result
then, owing to knowing (A in step S3
2n-1, B
2n-1) quantum state, according to
with
he Bob can judge S simultaneously
oBthe existence of listener-in and the identity of Alice between transmission period.If Bob finds wrong, his interrupt communication; Otherwise communication continues.
S5) Alice and Bob abandons S respectively in order
oAand S
oBin sample logic quantum bit.Conveniently, remaining S
oAand S
oBuse S ' respectively
oA=A '
1, A '
2..., A '
3N/4and S '
oB=B '
1, B '
2..., B '
3N/4represent.Then, in order to encode, Alice couple
apply logic operation at the tenth of the twelve Earthly Branches
like this, S '
oAbe converted into
Then, Alice also with the mode throughput subchannel of Bulk transport [1] by S "
oAsend Bob to.
S6) S is being received "
oAafter, in order to encode, Bob couple
apply logic operation at the tenth of the twelve Earthly Branches
like this, S "
oAbe converted into
Then, Bob is from S " '
oAwith S '
oBchoose respectively
with B '
dwith form d (d ∈ 1,2 ..., 3N/4}) and group.Then, in order to know
quantum state, Bob applies two Bell state to the 1st and the 3rd quantum bit and the 2nd and the 4th quantum bit respectively and measures.According to the logic operation at the tenth of the twelve Earthly Branches of himself
right with him
measurement result, Bob can read (i
d, j
d), because he know (A '
d, B '
d) quantum state.Here, the classical bit decoded is represented as m '
a|| h (m
a) ', be m ' wherein
athe m decoded
a, h (m
ah (the m that) ' be decodes
a).Then, with the protocol class of document [41] seemingly, Bob calculates m '
acryptographic Hash (be referred to as h (m '
a)) and by h (m '
a) and h (m
a) ' compare.If they are identical, m '
areal m is thought by Bob
aand communication continues; Otherwise communication is terminated.
S7) Bob is right by him by classical channel
measurement result send to Alice.Similarly, according to the logic operation at the tenth of the twelve Earthly Branches of herself
alice can know (t
d, l
d) (d ∈ 1,2 ..., 3N/4}) because herself preparation (A '
d, B '
d).Here, the classical bit decoded is represented as m '
b|| h (m
b) ', be m ' wherein
bthe m decoded
b, h (m
bh (the m that) ' be decodes
b).Then, with the protocol class of document [41] seemingly, Alice calculates m '
bcryptographic Hash (be referred to as h (m '
b)) and by h (m '
b) and h (m
b) ' compare.If they are identical, m '
breal m is thought by Alice
b; Otherwise communication is terminated.
3, safety analysis
(1) attack is played the part of
With the protocol class of document [41] seemingly, what always have two kinds of situations here plays the part of attack.
The first situation is: in order to obtain the classical bit of Alice, Eve plays the part of Bob and Alice and communicates.But because Eve does not know the secret key K for selecting sample logic quantum bit to measure base, she is to S '
eBthe random measurement of middle sample logic quantum bit can not produce really
therefore, when Alice passes through assessment in step S2
with mistake
between relation with the identity of certification Bob time, Eve can be detected.
Second case is: in order to obtain the classical bit of Bob, Eve plays the part of Alice and Bob and communicates.The S ' that Eve preparation is false
eB, S '
eA, S
oBand S
oA, and by the S ' of vacation
eB, S '
eAand S
oBbob is sent to respectively in step S1, S2 and S4.Then, false S is measured according to K, Bob
oBin sample logic quantum bit and obtain one false
owing to not knowing K, the S of Eve random measurement vacation
oAin corresponding sample logic quantum bit and obtain one false
obviously, false
with vacation
between relation be inharmonic.Therefore, when Bob is in step S4 false by assessment
with vacation
between relation with the identity of certification Alice time, Eve can be detected.
(2) man-in-the-middle attack
In order to obtain the classical bit of Alice and Bob, Eve independently communicates to apply man-in-the-middle attack by setting up two with them.[41] S ' that Eve preparation is false
eB, S '
eA, S
oBand S
oA, and replace with them all real logic quantum bits transmitted between Alice and Bob.As above analyzed, Eve is detected in the mutual certification of Alice and Bob, because she can not prepare out real initial state and measurement result.
(3) amendment is attacked
The object that the amendment of Eve is attacked is to make participant obtain the classical bit of mistake.[41] with the protocol class of document [41] seemingly, the amendment always having two kinds of situations is here attacked.
The first situation is: the S that to send Bob at amendment Alice in step S5 to "
oAafter, Eve sends amended version to Bob.Due to S "
oAcontain h (m
a), the amendment of Eve is attacked and is detected by Bob in step S6 is to the verification process of the classical bit of Alice, even if only have S "
oAa logic quantum bit be modified.
Second case is: send to Alice at amendment Bob in step S7
measurement result (be represented as R
msg) after, Eve sends amended version to Alice.Due to R
msgcontain h (m
b), the amendment of Eve is attacked and is detected by Alice in step S7 is to the verification process of the classical bit of Bob.
Can reach a conclusion, hashing operation makes the amendment of Eve attack to detect.
(4) Trojan attack
Always having two kinds of Trojan attack, is invisible photon eavesdropping [56] and delay photon Trojan attack [57] respectively.Because all logic quantum bits are the one-way transmission from Alice to Bob only, the agreement that the present invention proposes is natively to Trojan attack immunity.
Embodiment:
1, AQD protocol application citing
Suppose (i
1, j
1) and (t
1, l
1) be (0,1) and (1,0) respectively.And, suppose (A '
1, B '
1) be produced and be in
Ω is applied respectively at Alice and Bob
01and Ω
10after encoding, (A '
1, B '
1) be converted into
then, Bob can easily read (i
1, j
1) be (0,1).By classical channel, he is right at Bob
measurement result send to Alice after, Alice can easily infer (t
1, l
1) be (1,0).Decoding m '
a|| h (m
a) ' after, Bob calculating h (m '
a) and by h (m '
a) and h (m
a) ' compare is with the m of certification Alice
a.Similarly, m ' is being decoded
b|| h (m
b) ' after, Alice calculating h (m '
b) and by h (m '
b) and h (m
b) ' compare is with the m of certification Bob
b.
2, discuss
Information leakage problem refers to that any other people does not need to carry out any active attack only from declaring publicly just energy Extraction parts classical information.Due to every two adjacent infologic Bell state (A
2n-1, B
2n-1) and (A
2n, B
2n) be in identical quantum state, at Alice by S ' by Alice in step S1 preparation
eAwith S '
eBafter sending Bob to, Bob can from (A
2n, B
2n) directly know (A
2n-1, B
2n-1) initial state.Therefore, Alice there is no need to announce (A to Bob
2n-1, B
2n-1) initial state.Like this, Eve does not have approach to know (A
2n-1, B
2n-1) initial state.In this case, for Eve,
measurement result contain the logic operative combination at the tenth of the twelve Earthly Branches of 16 kinds of Alice and Bob.According to the information theory [55] of Shannon, this comprises
bit information, just in time equal Alice and Bob by coding classical bit number.Therefore, information is not had to be leaked out.Obviously, (A
2n, B
2n) role that plays the part of auxiliary logic Bell state helps to overcome information leakage problem, with the protocol class of document [54] seemingly.
3, sum up
Phase noise AQD agreement is moved back by the anti-collective that the present invention utilizes logic Bell state to propose a logic-based Bell state as quantum resource, and wherein a kind of secret key for selecting sample logic quantum bit to measure base is shared in confidence by two participants in advance.With QD agreement [12-24 before, 28-39,41,51,53-54] compare, the outstanding advantages of agreement proposed by the invention is: when supposing can be ravesdropping by the information of classical transmission and revise, it can realize mutual identity authentication and dialogue safely in the noisy communication channel of collective's dephasign position between two participants simultaneously.Other of agreement proposed by the invention are characterized as:
(1) measure about quantum, Bell state is measured but not four quantum bit combined measurements are used to decoding;
(2) about information leakage problem, the method directly transmitting auxiliary logic Bell state is used to avoid it;
(3) about the active attack of Eve, play the part of attack, man-in-the-middle attack and amendment and attack and can be detected, and Trojan attack is avoided natively.