CN104618119A - Quantum authentication encryption protocol suitable for quantum Email and based on double-photon entanglement state - Google Patents

Quantum authentication encryption protocol suitable for quantum Email and based on double-photon entanglement state Download PDF

Info

Publication number
CN104618119A
CN104618119A CN201510093062.6A CN201510093062A CN104618119A CN 104618119 A CN104618119 A CN 104618119A CN 201510093062 A CN201510093062 A CN 201510093062A CN 104618119 A CN104618119 A CN 104618119A
Authority
CN
China
Prior art keywords
quantum
alice
bob
bit
photon entanglement
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510093062.6A
Other languages
Chinese (zh)
Other versions
CN104618119B (en
Inventor
叶天语
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Baicheng Technology Co.,Ltd.
Original Assignee
Zhejiang Gongshang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Gongshang University filed Critical Zhejiang Gongshang University
Priority to CN201510093062.6A priority Critical patent/CN104618119B/en
Publication of CN104618119A publication Critical patent/CN104618119A/en
Application granted granted Critical
Publication of CN104618119B publication Critical patent/CN104618119B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a quantum authentication encryption protocol suitable for a quantum Email and based on a double-photon entanglement state. Two communicators Alice and Bob share two private keys for deciding double-photon entanglement state preparation in advance. The sender Alice sends a double-photon entanglement sequence encoded with classical bits of Alice to the receiver Bob in a one-step quantum transport manner. After receiving the encoded quantum state sequence, Bob decodes the classical bits of Alice by utilizing double-photon combined measurement and authenticates integrity of a secret of Alice with the help of a one-way hash function. The protocol disclosed by the invention only uses one-step quantum transport and not only does not need a public discussion, but also does not need a credible third party. Therefore, the protocol disclosed by the invention can be suitable for the situations, such as the quantum Email and the like, which only require the receiver to be positioned below the line. The protocol disclosed by the invention enables accuracy of massage authentication to be the level of 1 bit with the help of the one-way hash function. Moreover, the information theory efficiency of the protocol disclosed by the invention reaches 100 percent.

Description

Be applicable to the quantum authentication cryptographic protocol based on two photon entanglement states of quantum Email
Technical field
The present invention relates to field of quantum security communication.The present invention designs a kind of quantum authentication cryptographic protocol based on two photon entanglement states being applicable to quantum Email, by quantum communications protocol application in only requiring the situation under recipient is in line.
Background technology
Quantum cryptography is one of most important application for quantum information process, quantum-key distribution (Quantum Key Distribution can be divided into, QKD) [1-5], quantum secret sharing (Quantum SecretSharing, QSS) [6-10], Quantum Secure Direct Communication (Quantum Secure DirectCommunication, QSDC) [11-19] etc.As everyone knows, certification is a kind of effective means guaranteeing the integrality of transmitted information, can be preferentially absorbed into classical password and quantum cryptography.According to the use of certification, quantum cryptographic protocols can be divided into two classes, namely not with authentication function with band authentication function.Such as, the quantum cryptographic protocols of document [1-19] always supposes to there is the classical channel of certification so that they do not have authentication function.Do not suppose the classical channel of certification with them unlike the quantum cryptographic protocols of, document [20-29], need first to complete verification process.Institute's protocols having of document [20-28] needs to carry out open debate at classical channel, and this requires that recipient must be online.More complicated, each agreement of document [20-22] needs a trusted third party being called authenticator.Fortunately, in 2011, Tsai etc. [29] utilize rotation process to propose a unidirectional quantum authentication secure communication protocols neither needing open debate not need again trusted third party.In this agreement, her message is sent to recipient by the mode that sender transmits with a step quantum.This agreement does not need recipient online.But when a listener-in Eve launches a offensive an amendment message quantum bit, she can escape with the probability of 1/2 and detect.By the inspiration of the agreement [29] of Tsai etc., Hwang etc. [30] propose one first and are called the completely new concept that quantum authentication is encrypted, and it is in fact the step certification Quantum Secure Direct Communication being applicable to recipient under line.The huge bright spot of quantum authentication encryption is the following aspects [30]:
(1) it only needs a step quantum transmission;
(2) it provides Privacy Protection and authentication;
(3) it makes message authentication be accurate to 1 bit level, namely to by 1 D-bit modification of message that transmits by the detection probability of initiation one 100%;
(4) it does not need a trusted third party;
(5) it does not need a classical channel.
Under what these bright spots made throughput subchannel carry out be applicable to line, many application of recipient become possibility, such as quantum E-mail [30].
Based on above analysis, the present invention proposes the quantum authentication cryptographic protocol based on two photon entanglement states that is applicable to quantum Email.With the protocol class of document [30] seemingly, two correspondent Alice and Bob share two in advance for determining private key prepared by two photon entanglement states.The two photon entanglement state sequences encoding her classical bit are sent to recipient Bob in the mode of a step Quantum Teleportation by sender Alice.After receiving the quantum state sequence of coding, Bob utilize two photon combined measurements decode Alice classical bit and under the help of one-way Hash function the integrality of the secret of certification Alice.Agreement of the present invention only uses a step Quantum Teleportation, and neither needs an open debate also not need a believable third party.Therefore, agreement of the present invention be applicable to quantum E-mail etc. only require recipient be in line under situation.Agreement of the present invention makes message authentication be accurate to 1 bit level under the help of one-way Hash function.And the information theory efficiency of agreement of the present invention is up to 100%.
List of references
[1]Bennett C H,Brassard G.Quantum cryptography:public-key distribution andcoin tossing.In:Proceedings of the IEEE International Conference onComputers,Systems and Signal Processing.Bangalore:IEEE Press,1984,175-179.
[2]Ekert A K.Quantum cryptography based on Bell′s theorem.Phys Rev Lett,1991,67(6):661-663.
[3]Bennett C H,Brassard G,Mermin N D.Quantum cryptography without Belltheorem.Phys Rev Lett,1992,68:557-559.
[4]Cabello A.Quantum key distribution in the Holevo limit.Phys Rev Lett,2000,85:5635.
[5]Deng F G,Long G L.Controlled order rearrangement encryption for quantumkey distribution.Phys Rev A,2003,68:042315.
[6]Hillery M,Buzek V,Berthiaume A.Quantum secret sharing.Phys Rev A,1999,59:1829-1834.
[7]Karlsson A,Koashi M,Imoto N.Quantum entanglement for secret sharing andsecret splitting.Phys Rev A,1999,59:162-168.
[8]Xiao L,Long G L,Deng F G,Pan J W.Efficient multiparty quantum-secret-sharing schemes.Phys Rev A,2004,69:052307.
[9]Hao L,Li J L,Long G L.Eavesdropping in a quantum secret sharing protocolbased on Grover algorithm and its solution.Sci China Ser G-Phys Mech Astron,2010,53(3):491-495.
[10]Hao L,Wang C,Long G L.Quantum secret sharing protocol with four stateGrover algorithm and its proof-of-principle experimental demonstration.OptCommun,2011,284:3639-3642.
[11]Long G L,Liu X S.Theoretically effiicient high-capacity quantum-key-distribution scheme.Phys Rev A,2002,65:032302.
[12]Bostrom K,Felbinger T.Deterministic secure direct communication usingentanglement.Phys Rev Lett,2002,89:187902.
[13]Deng F G,Long G L,Liu X S.Two-step quantum direct communicationprotocol using the Einstein-Podolsky-Rosen pair block.Phys Rev A,2003,68:042317.
[14]Deng F G,Long G L.Secure direct communication with a quantum one-timepad.Phys Rev A,2004,69:052319.
[15]Wang C,Deng F G,Li Y S,Liu X S,Long G L.Quantum secure directcommunication with high-dimension quantum superdense coding.Phys Rev A,2005,71:044305.
[16]Wang C,Deng F G,Long G L.Multi-step quantum secure directcommunication using multi-particle Green-Horne-Zeilinger state.Opt Commun,2005,253(1-3):15-20.
[17]Chen X B,Wen Q Y,Guo F Z,Sun Y,Xu G,Zhu F C.Controlled quantumsecure direct communication with W state.Int J Quant Inform,2008,6(4):899-906.
[18]Gu B,Huang Y G,Fang X,Zhang C Y.A two-step quantum secure directcommunication protocol with hyperentanglement.Chin Phys B,2011,20(10):100309.
[19]Liu D,Chen J L,Jiang W.High-capacity quantum secure directcommunication with single photons in both polarization and spatial-modedegrees of freedom.Int J Theor Phys,2012,51:2923-2929.
[20]Lee H,Lim J,Yang H.Quantum direct communication with authentication.Phys Rev A,2006,73:042305.
[21]Zhang Z J,Liu J,Wang D,Shi S H.Comment on“Quantum directcommunication with authentication”.Phys Rev A,2007,75:026301.
[22]Yen C A,Horng S J,Goan H S,Kao T W,Chou Y H.Quantum directcommunication with mutual authentication.Quantum Inf Comput,2009,9:376-394.
[23]Liu W J,Chen H W,Li Z Q,Liu Z H.Effi cient quantum secure directcommunication with authentication.Chin Phys Lett,2008,25:2354-2357.
[24]Wang M J,Pan W.Quantum secure direct communication based onauthentication.Chin Phys Lett,2008,25:3860-3863.
[25]Yang J,Wang C A,Zhang R.Quantum secure direct communication withauthentication expansion using single photons.Commun Theor Phys,2010,54:829-834.
[26]Yang Y G,Jia X,Xia J,Shi L,Zhang H.Comment on“Quantum secure directcommunication with authentication expansion using single photons”.Int JTheor Phys,2012,51:3681-3687.
[27]Liu D,Pei C X,Quan D X,Zhao N.A new quantum secure directcommunication scheme with authentication.Chin Phys Lett,2010,27:050306.
[28]Gao F,Qin S J,Guo F Z,Wen Q Y.Cryptanalysis of quantum secure directcommunication and authentication scheme via Bell states.Chin Phys Lett,2011,28:020303.
[29]Tsai C W,Wei T S,Hwang T.One-way quantum authenticated securecommunication using rotation operation.Commun Theor Phys,2011,56:1023-1026.
[30]Hwang T,Luo Y P,Yang C W,Lin T H.Quantum authencryption:one-stepauthenticated quantum secure direct communications for off-line communicants.Quantum InfProcess,2014,13:925-933.
[31]Yin X R,Ma W P,Liu W Y,Shen D S.Efficient bidirectional quantum securecommunication with two-photon entanglement.Quantum Inf Process,2013,12:3093-3102.
[32]Shannon C E.Communication theory of secrecy system.Bell System Tech J,1949,28:656-715.
Summary of the invention
The object of the invention is to design a kind of quantum authentication cryptographic protocol based on two photon entanglement states being applicable to quantum Email, by quantum communications protocol application in only requiring the situation under recipient is in line.
Be applicable to the quantum authentication cryptographic protocol based on two photon entanglement states of quantum Email, comprise following five processes altogether:
S1) prepare.Alice and Bob shares two in advance for determining private key K prepared by two photon entanglement states band K s.Here, K blength be N bit, K slength be 2N bit.Alice is according to K band K sproduce one by N number of two photon entanglement state { (A 1, B 1), (A 2, B 2) ..., (A t, B t) ..., (A n, B n) the quantum state sequence L that forms.Namely: if
( A t , B t ) = | φ + > , if K S 2 t - 1,2 t = 00 ; | φ - > , if K S 2 t - 1,2 t = 01 ; | ψ + > , if K S 2 t - 1,2 t = 10 ; | ψ - > , if K S 2 t - 1,2 t = 11 . ;
Otherwise,
( A t , B t ) = | Φ + > , if K S 2 t - 1,2 t = 00 ; | Φ - > , if K S 2 t - 1,2 t = 01 ; | Ψ + > if K S 2 t - 1,2 t = 10 ; | Ψ - > , if K S 2 t - 1,2 t = 11 . .
Here, k bt bit, k s2t-1 and 2t bit, wherein t ∈ 1,2 ..., N}.
S2) coding of Alice.2N the classical bit of Alice
{ (i 1, j 1) (i 2, j 2) ... (i t, j t) ... (i n, j n) be expressed as M=m a|| h (m a), wherein m aher secret, h (m a) be m acryptographic Hash.Here, " || " represents " connection " operation and i t, j t∈ 0,1}, wherein t ∈ 1,2 ..., N}.In order to the dibit (i in her M of encoding t, j t), Alice is to t two photon entanglement state (A t, B t) in B tapply operation at the tenth of the twelve Earthly Branches wherein t ∈ 1,2 ..., N}.Like this, L is converted into L ', wherein L ′ = { ( A 1 , U i 1 j 1 B 1 ) , ( A 2 , U i 2 j 2 B 2 ) , . . . , ( A t , U i t j t B t ) , . . . , ( A N , U i N j N B N ) } .
S3) transmission of Alice.L ' is sent to Bob by a quantum channel by Alice.
S4) decoding of Bob.According to bob is from MB 1=| φ ±>, | ψ ±>} and MB 2=| Φ ±>, | Ψ ±>} selects t two photon entanglement states in correct measurement base measurement L ' due to Bob from with can know that Alice prepares (A t, B t) initial state, he easily can derive (i from his measurement result t, j t).The classical bit decoded in Bob hand is represented as M '=m ' a|| h ' (m a).
S5) certification of Bob.In order to detect the existence of a listener-in Eve, Bob calculates m ' acryptographic Hash thus obtain h (m ' a).Then, he by h (m ' a) and h ' (m a) contrast.If they are the same, Bob accepts m ' afor send over from Alice not through the real m of any amendment a; Otherwise they abandon communicating and start anew.
The present invention proposes a kind of quantum authentication cryptographic protocol based on two photon entanglement states being applicable to quantum Email.Two correspondent Alice and Bob share two in advance for determining private key prepared by two photon entanglement states.The two photon entanglement state sequences encoding her classical bit are sent to recipient Bob in the mode of a step Quantum Teleportation by sender Alice.After receiving the quantum state sequence of coding, Bob utilize two photon combined measurements decode Alice classical bit and under the help of one-way Hash function the integrality of the secret of certification Alice.Agreement of the present invention only uses a step Quantum Teleportation, and neither needs an open debate also not need a believable third party.Therefore, agreement of the present invention be applicable to quantum E-mail etc. only require recipient be in line under situation.Agreement of the present invention makes message authentication be accurate to 1 bit level under the help of one-way Hash function.And the information theory efficiency of agreement of the present invention is up to 100%.
Embodiment
Below in conjunction with embodiment, technical scheme of the present invention is described further.
1, the transformational relation between two photon entanglement states
As everyone knows, four Bell state can be described to
| φ + > = 1 2 ( | 00 > + | 11 > ) = 1 2 ( | + > | + > + | - > | - > ) , - - - ( 1 )
| φ - > = 1 2 ( | 00 > - | 11 > ) = 1 2 ( | + > | - > + | - > | + > ) , - - - ( 2 )
| ψ + > = 1 2 ( | 01 > + | 10 > ) = 1 2 ( | + > | + > - | - | - > | - > ) , - - - ( 3 )
| ψ - > = 1 2 ( | 01 > + | 10 > ) = 1 2 ( | + > | - > - | - > | + > ) , - - - ( 4 )
Wherein obviously, MB 1=| φ ±>, | ψ ±>} is that a group of above-mentioned four Bell state measures base.On the other hand, four operations at the tenth of the twelve Earthly Branches can be described to
I=|0><0|+|1><1|,σ x=|0><1|+|1><0|,iσ y=|0><1|-|1><0|,σ z=|0><0|-|1><1|。
(5)
One in operation at four tenth of the twelve Earthly Branches be applied in second photon after, these four Bell state freely being changed to each other, as table 1 is concluded.
Transformational relation (quantum state at row place represents initial state, the quantum state representation transformation result at row place) between any two Bell state of table 1
Define another four two photon entanglement states for [31]
| &Phi; &PlusMinus; > = 1 2 ( | + > | 0 > &PlusMinus; i | - > | 1 > ) , - - - ( 6 )
| &Psi; &PlusMinus; > = 1 2 ( | + > | 1 > &PlusMinus; i | - > | 0 ) . - - - ( 7 )
Obviously, MB 2=| Φ ±>, | Ψ ±>} is that a group of above-mentioned four two photon entanglement states measures base.Can directly obtain, MB 1and MB 2non-orthogonal.Similarly, one in operation at four tenth of the twelve Earthly Branches be applied in second photon after, these four two photon entanglement states can freely changed to each other, as table 2 is concluded [31].
Transformational relation (quantum state at row place represents initial state, the quantum state representation transformation result at row place) between any two two photon entanglement states that table 2 formula (6,7) defines
2, quantum authentication cryptographic protocol
Suppose that Alice has and be expressed as M=m a|| h (m a) 2N classical bit { (i 1, j 1) (i 2, j 2) ... (i t, j t) ... (i n, j n), wherein m aher secret, h (m a) be m acryptographic Hash.Here, " || " represents " connection " operation and i t, j t∈ 0,1}, wherein t ∈ 1,2 ..., N}.And they decide through consultation that each tenth of the twelve Earthly Branches, operation represented a classical dibit as follows in advance:
I→U 00,σ x→U 01,iσ y→U 10,σ z→U 11, (8)
A classical dibit is designated as under wherein each.The two photon entanglement states that utilize that the present invention proposes are made up of following five processes as the quantum authentication cryptographic protocol of quantum resource.With the protocol class of document [30] seemingly, in this agreement, Alice and Bob is supposed to share two in advance for determining private key K prepared by two photon entanglement states band K s.Here, K blength be N bit, K slength be 2N bit.
S1) prepare.Alice is according to K band K sproduce one by N number of two photon entanglement state { (A 1, B 1), (A 2, B 2) ..., (A t, B t) ..., (A n, B n) the quantum state sequence L that forms.Namely: if K B t = 0 ,
( A t , B t ) = | &phi; + > , if K S 2 t - 1,2 t = 00 ; | &phi; - > , if K S 2 t - 1,2 t = 01 ; | &psi; + > , if K S 2 t - 1,2 t = 10 ; | &psi; - > , if K S 2 t - 1,2 t = 11 . ; - - - ( 9 )
Otherwise,
( A t , B t ) = | &Phi; + > , if K S 2 t - 1,2 t = 00 ; | &Phi; - > , if K S 2 t - 1,2 t = 01 ; | &Psi; + > if K S 2 t - 1,2 t = 10 ; | &Psi; - > , if K S 2 t - 1,2 t = 11 . . - - - ( 10 )
Here, k bt bit, k s2t-1 and 2t bit, wherein t ∈ 1,2 ..., N}.
S2) coding of Alice.In order to the dibit (i in her M of encoding t, j t), Alice is to t two photon entanglement state (A t, B t) in B tapply operation at the tenth of the twelve Earthly Branches wherein t ∈ 1,2 ..., N}.Like this, L is converted into L ', wherein
L &prime; = { ( A 1 , U i 1 j 1 B 1 ) , ( A 2 , U i 2 j 2 B 2 ) , . . . , ( A t , U i t j t B t ) , . . . , ( A N , U i N j N B N ) } .
S3) transmission of Alice.L ' is sent to Bob by a quantum channel by Alice.
S4) decoding of Bob.According to bob is from MB 1and MB 2select t two photon entanglement states in correct measurement base measurement L ' due to Bob from with can know that Alice prepares (A t, B t) initial state, according to table 1 and table 2, he easily can derive (i from his measurement result t, j t).The classical bit decoded in Bob hand is represented as M '=m ' a|| h ' (m a).
S5) certification of Bob.In order to detect the existence of a listener-in Eve, Bob calculates m ' acryptographic Hash thus obtain h (m ' a).Then, he by h (m ' a) and h ' (m a) contrast.If they are the same, Bob accepts m ' afor send over from Alice not through the real m of any amendment a; Otherwise they abandon communicating and start anew.
In agreement of the present invention, the two photon entanglement state sequences encoding her classical bit are sent to Bob in the mode without the need to being transmitted by a step quantum when open debate or a trusted third party by Alice.Receive that Alice sends over by encoded sequence after, Bob can authenticate the integrality of her secret.This just need not require that Bob is online.In other words, agreement of the present invention can be applicable to recipient be in line under situation.Can reach a conclusion, agreement of the present invention can be regarded as being applicable to the step certification Quantum Secure Direct Communication agreement without the need to trusted third party of recipient under a line.
Be necessary it is emphasised that, if there is no eavesdrop behavior, K band K scan be reused.But, under following two kinds of situations, new K band K sshould be shared by Alice and Bob in advance: (1) Alice thinks again to send identical secret; (2) eavesdropping behaviors are detected.[30]
3, safety analysis
(1) fail safe of anti-information leakage
Eve wishes that the L ' sended over by intercepting and capturing and measure Alice extracts some useful informations about M.But she is K for want of band K sshe does not know the initial state of L prepared by Alice, so can not get any useful information.Without loss of generality, with her measurement result be | φ +> is example.If she guesses that corresponding initial state is | φ +> (| ψ +>, | ψ ->, | φ ->), two classical bits will be 00 (01,10,11).That is, according to the information theory [32] of Shannon, for Eve, this measurement result is corresponding bit information.Therefore, be leaked out without any information.
(2) anti-fail safe of playing the part of attack
In this attack, Eve plays the part of Alice and the M of her vacation is sent to Bob.Without loss of generality, suppose she attempt sending to the dibit of Bob to be 00, with unclear with eve have to first to prepare one false be at random eight states | φ ±>, | ψ ±>, | Φ ±>, | Ψ ±the two photon entanglement states of one of >} | ε >, then sends to Bob by it.If she produces | ε > is in | φ +>, she successfully can send to Bob by 00; If she produce | ε > be in three states | φ ->, | ψ ±one of >}, she arrives by Bob with the Probability Detection of 100%; If she produce | ε > be in four states | Φ ±>, | Ψ ±one of >}, she is detected with certain probability.In a word, if N is enough large, this attack of Eve can be detected definitely.
(3) fail safe of anti-D-bit modification attack
In this attack, Eve intercepts and captures the L ' that sends over from Alice and applies three operation at the tenth of the twelve Earthly Branches { σ at random to any one L ' two photon entanglement state x, i σ y, σ zin one.Then, the L ' revised is sent to Bob by her.Fortunately, due to h (m ' a) no longer with h ' (m a) equal, this attack of Eve is arrived by Bob with the Probability Detection of 100%.Its reason is the character of one-way Hash function, and namely 1 bit-errors of input can cause the huge change of output [30].
Embodiment:
1, quantum authentication cryptographic protocol applicating example
With first two photon entanglement state (A 1, B 1) explain proposed agreement further as a concrete example.Suppose (i 1, j 1)=01.Correspondingly, (A 1, B 1) be in by Alice preparation | ψ +>.Like this, σ is operated at the tenth of the twelve Earthly Branches of Alice xafter, (A 1, B 1) state be changed to | φ +>.Then, after receiving it from Alice, according to bob selects MB 1measure it.Like this, according to table 1, he can read (i 1, j 1)=01 because he from with know (A prepared by Alice 1, B 1) initial state be | ψ +>.After decoding M ', Bob by contrast h (m ' a) and h ' (m a) can certification m ' aintegrality.
2, discuss
(1) information theory efficiency
The information theory efficiency [4] of Cabello definition is η=b s/ (q t+ b t), wherein b s, q tand b tthe classical bit number expecting to exchange between the secret bit number received, the quantum bit number used and two participants respectively.In agreement of the present invention, (A t, B t) be used to transmit (i from Alice to Bob t, j t) and without the need to any declaration undertaken by classical channel.Like this, b s=2, q t=2 and b t=0.Therefore, the information theory efficiency of agreement of the present invention is &eta; = 2 2 + 0 &times; 100 % = 100 % .
(2) contrast of quantum authentication cryptographic protocol and before
Here detailed contrast is carried out to first quantum authentication cryptographic protocol of agreement of the present invention and document [30].Comparing result is summarized in table 3.Conclusion as can be drawn from Table 3, agreement of the present invention surpasses the agreement of document [30] in channel capacity, but is measured as cost with quantum resource and quantum.
Comparing result between the agreement of table 3 agreement of the present invention and document [30]
3, sum up
The present invention proposes the quantum authentication cryptographic protocol based on two photon entanglement states that is applicable to quantum Email.Agreement implementation process of the present invention is: two correspondent Alice and Bob share two in advance for determining private key prepared by two photon entanglement states.The two photon entanglement state sequences encoding her classical bit are sent to recipient Bob in the mode of a step Quantum Teleportation by sender Alice.After receiving the quantum state sequence of coding, Bob utilize two photon combined measurements decode Alice classical bit and under the help of one-way Hash function the integrality of the secret of certification Alice.The bright spot of agreement of the present invention is:
(1) it only uses a step Quantum Teleportation, and neither needs an open debate also not need a believable third party.Therefore, it be applicable to quantum E-mail etc. only require recipient be in line under situation;
(2) it makes message authentication be accurate to 1 bit level under the help of one-way Hash function;
(3) its information theory efficiency is up to 100%.

Claims (1)

1. be applicable to the quantum authentication cryptographic protocol based on two photon entanglement states of quantum Email, two correspondent Alice and Bob share two in advance for determining private key prepared by two photon entanglement states; The two photon entanglement state sequences encoding her classical bit are sent to recipient Bob in the mode of a step Quantum Teleportation by sender Alice; After receiving the quantum state sequence of coding, Bob utilize two photon combined measurements decode Alice classical bit and under the help of one-way Hash function the integrality of the secret of certification Alice; Only use a step Quantum Teleportation, and neither need an open debate also not need a believable third party, be applicable to quantum E-mail etc. only require recipient be in line under situation; Under the help of one-way Hash function, make message authentication be accurate to 1 bit level; Comprise following five processes altogether:
S1) prepare: Alice and Bob shares two in advance for determining private key K prepared by two photon entanglement states band K s; Here, K blength be N bit, K slength be 2N bit; Alice is according to K band K sproduce one by N number of two photon entanglement state { (A 1, B 1), (A 2, B 2) ..., (A t, B t) ..., (A n, B n) the quantum state sequence L that forms; Namely, if
( A t , B t ) = | &phi; + > , if K S 2 t - 1,2 t = 00 ; | &phi; - > , if K S 2 t - 1,2 t = 01 ; | &psi; + > , if K S 2 t - 1,2 t = 10 ; | &psi; - > , if K S 2 t - 1,2 t = 11 . ,
Otherwise,
( A t , B t ) = | &Phi; + > , if K S 2 t - 1,2 t = 00 ; | &Phi; - > , if K S 2 t - 1,2 t = 01 ; | &Psi; + > , if K S 2 t - 1,2 t = 10 ; | &Psi; - > , if K S 2 t - 1,2 t = 11 . ;
Here, k bt bit, k s2t-1 and 2t bit, wherein t ∈ 1,2 ..., N};
S2) 2N classical the bit { (i of the coding of Alice: Alice 1, j 1) (i 2, j 2) ... (i t, j t) ... (i n, j n) be expressed as M=m a|| h (m a), wherein m aher secret, h (m a) be m acryptographic Hash; Here, " || " represents " connection " operation and i t, j t∈ 0,1}, wherein t ∈ 1,2 ..., N}; In order to the dibit (i in her M of encoding t, j t), Alice is to t two photon entanglement state (A t, B t) in B tapply operation at the tenth of the twelve Earthly Branches , wherein t ∈ 1,2 ..., N}; Like this, L is converted into L ', wherein L &prime; = { ( A 1 , U i 1 j 1 B 1 ) , ( A 2 U i 2 j 2 B 2 ) , . . . , ( A t , U i t j t B t ) , . . . , ( A N , U i N j N B N ) } ;
S3) L ' is sent to Bob by a quantum channel by the transmission of Alice: Alice;
S4) decoding of Bob: according to , Bob is from MB 1=| φ ±>, | ψ ±> } and MB 2=| Φ ±>, | Ψ ±> } select correct measurement base to measure t two photon entanglement states in L ' ; Due to Bob from with can know that Alice prepares (A t, B t) initial state, he easily can derive (i from his measurement result t, j t); The classical bit decoded in Bob hand is represented as M '=m ' a|| h ' (m a);
S5) certification of Bob: in order to detect the existence of a listener-in Eve, Bob calculates m ' acryptographic Hash thus obtain h (m ' a); Then, he by h (m ' a) and h ' (m a) contrast; If they are the same, Bob accepts m ' afor send over from Alice not through the real m of any amendment a, otherwise they abandon communicating and start anew.
CN201510093062.6A 2015-03-02 2015-03-02 Suitable for the quantum Email quantum authentication encryption method based on two photon entanglement states Active CN104618119B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510093062.6A CN104618119B (en) 2015-03-02 2015-03-02 Suitable for the quantum Email quantum authentication encryption method based on two photon entanglement states

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510093062.6A CN104618119B (en) 2015-03-02 2015-03-02 Suitable for the quantum Email quantum authentication encryption method based on two photon entanglement states

Publications (2)

Publication Number Publication Date
CN104618119A true CN104618119A (en) 2015-05-13
CN104618119B CN104618119B (en) 2017-12-01

Family

ID=53152413

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510093062.6A Active CN104618119B (en) 2015-03-02 2015-03-02 Suitable for the quantum Email quantum authentication encryption method based on two photon entanglement states

Country Status (1)

Country Link
CN (1) CN104618119B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107370546A (en) * 2016-05-11 2017-11-21 阿里巴巴集团控股有限公司 Eavesdrop detection method, data transmission method for uplink, apparatus and system
CN109586909A (en) * 2019-01-21 2019-04-05 成都信息工程大学 Based on Bell state quantal data library access control and Bidirectional identity authentication method
CN109660329A (en) * 2018-12-27 2019-04-19 安徽继远软件有限公司 A kind of more equal agreement of two side's quantum secures for resisting external attack
CN110336775A (en) * 2019-04-24 2019-10-15 重庆邮电大学 A kind of quantum group authentication method based on Grover algorithm
CN111970111A (en) * 2020-10-22 2020-11-20 深圳职业技术学院 Quantum zero knowledge proof-based block chain consensus mechanism establishing method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102801518A (en) * 2012-09-05 2012-11-28 浙江工商大学 Quantum steganography protocol based on gigahertz (GHZ) state dense coding and entanglement exchange
CN103281328A (en) * 2013-06-03 2013-09-04 浙江工商大学 Anti-information-disclosure quantum conversation protocol based on single quantum entanglement measurement correlation
CN103731255A (en) * 2013-12-02 2014-04-16 浙江工商大学 Quantum secure dialogue protocol based on quantum encryption

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102801518A (en) * 2012-09-05 2012-11-28 浙江工商大学 Quantum steganography protocol based on gigahertz (GHZ) state dense coding and entanglement exchange
CN103281328A (en) * 2013-06-03 2013-09-04 浙江工商大学 Anti-information-disclosure quantum conversation protocol based on single quantum entanglement measurement correlation
CN103731255A (en) * 2013-12-02 2014-04-16 浙江工商大学 Quantum secure dialogue protocol based on quantum encryption

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
HWANG T ETL: "Quantum authencrption:one-step authenticated quantum secure direct communications for off-line communicants", 《QUANTUM INFORMATION PROCESS》 *
LEE H ETL: "Quantum direct communication with authentication", 《PHYS REV A》 *
YIN X R ETL: "Efficient bidirectional quantum secure communication with two-photon entanglement", 《QUANTUM INFORMATION PROCESS》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107370546A (en) * 2016-05-11 2017-11-21 阿里巴巴集团控股有限公司 Eavesdrop detection method, data transmission method for uplink, apparatus and system
CN107370546B (en) * 2016-05-11 2020-06-26 阿里巴巴集团控股有限公司 Eavesdropping detection method, data sending method, device and system
CN109660329A (en) * 2018-12-27 2019-04-19 安徽继远软件有限公司 A kind of more equal agreement of two side's quantum secures for resisting external attack
CN109586909A (en) * 2019-01-21 2019-04-05 成都信息工程大学 Based on Bell state quantal data library access control and Bidirectional identity authentication method
CN109586909B (en) * 2019-01-21 2020-08-04 成都信息工程大学 Bell state quantum database access control and bidirectional identity authentication method
CN110336775A (en) * 2019-04-24 2019-10-15 重庆邮电大学 A kind of quantum group authentication method based on Grover algorithm
CN111970111A (en) * 2020-10-22 2020-11-20 深圳职业技术学院 Quantum zero knowledge proof-based block chain consensus mechanism establishing method and system
CN111970111B (en) * 2020-10-22 2021-01-05 深圳职业技术学院 Quantum zero knowledge proof-based block chain consensus mechanism establishing method and system

Also Published As

Publication number Publication date
CN104618119B (en) 2017-12-01

Similar Documents

Publication Publication Date Title
Wu et al. High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states
CN107517101B (en) Classical communication person is not required to have half quantum dialogue method of measurement capability based on single photon
US8433066B2 (en) Method for generating an encryption/decryption key
US20140219443A1 (en) Generation of cryptographic keys
CN104618119B (en) Suitable for the quantum Email quantum authentication encryption method based on two photon entanglement states
WO2022142307A1 (en) Secure relay-based quantum communication method and communication network
CN103731255A (en) Quantum secure dialogue protocol based on quantum encryption
CN104104503A (en) Collective dephasing noise resisting error tolerance channel encryption quantum dialogue protocol
CN103117851A (en) Encryption control method and device capable of achieving tamper-proofing and repudiation-proofing by means of public key infrastructure (PKI)
Zhou et al. Novel quantum deterministic key distribution protocols with entangled states
Wang et al. Quantum private comparison based on quantum dense coding
Goyal et al. Quantum cryptography & its comparison with classical cryptography: A review paper
Sharma et al. Security of entanglement based version of BB84 protocol for Quantum Cryptography
Chou et al. Quantum secure communication network protocol with entangled photons for mobile communications
Sathiamoorthy et al. A reliable and secure data transmission in CEAACK MANETs using distinct dynamic key with classified digital signature cryptographic algorithm
Kumar et al. A novel framework for secure file transmission using modified AES and MD5 algorithms
Yang et al. Quantum authenticated direct communication using Bell states
He et al. Two-party quantum key agreement protocol with four-particle entangled states
Singhrova Quantum key distribution-based techniques in IoT
Pal et al. Quantum and Post‐Quantum Cryptography
Chang et al. Controlled deterministic secure quantum communication protocol based on three-particle GHZ states in X-basis
CN104104498A (en) Shearing auxiliary logic Bell state based collective dephasing noise resistant quantum dialogue protocol
Sarvaghad-Moghaddam Efficient controlled bidirectional quantum secure direct communication using entanglement swapping in a network
Huang et al. Quantum secure direct communication based on chaos with authentication
Qawaqneh et al. A new hardware quantum-based encryption algorithm

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200212

Address after: 510670 room 1013, 81 Kefeng Road, Lianhe street, Huangpu District, Guangzhou City, Guangdong Province

Patentee after: Guangzhou Fangwei Intellectual Property Service Co., Ltd.

Address before: 310012 No. 149 staff Road, Hangzhou, Zhejiang, Xihu District

Patentee before: ZHEJIANG GONGSHANG University

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210107

Address after: 310000 1st floor, 748 Renmin Avenue, Nanyuan street, Yuhang District, Hangzhou City, Zhejiang Province

Patentee after: Hangzhou Baicheng Technology Co.,Ltd.

Address before: 510670 room 1013, 81 Kefeng Road, Lianhe street, Huangpu District, Guangzhou City, Guangdong Province

Patentee before: Guangzhou Fangwei Intellectual Property Service Co.,Ltd.