CN105049198B - Based on the asymmetric communication means for inveigling state quantum key distribution agreement - Google Patents
Based on the asymmetric communication means for inveigling state quantum key distribution agreement Download PDFInfo
- Publication number
- CN105049198B CN105049198B CN201510472134.8A CN201510472134A CN105049198B CN 105049198 B CN105049198 B CN 105049198B CN 201510472134 A CN201510472134 A CN 201510472134A CN 105049198 B CN105049198 B CN 105049198B
- Authority
- CN
- China
- Prior art keywords
- base
- recipient
- light
- sender
- communication means
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The invention discloses a kind of based on the asymmetric communication means for inveigling state quantum key distribution agreement, include the following steps:Recipient and sender establish communication channel;Sender generates Serial No. at random, and Serial No. is encoded under the light of multiple intensity, if it is the light of signal state, encoded under the mistake of same base, if it is the weak light for inveigling state, encoded respectively with different probability selections in the case where the first base loses or the second base loses;Coding information is sent to recipient by sender, and recipient measures coding information with different probability selections in the case where the first base loses or the second base loses respectively, to generate source code;According to the base of sender-selected coding become estranged the light of selection intensity and recipient select measurement base mistake shared key is screened from source code.The communication means of the embodiment of the present invention by asymmetric selection base can be lost on the basis of ensuring communication safety property, improve the production rate of security key, reduce system complexity.
Description
Technical field
It is more particularly to a kind of based on asymmetric trick state quantum key point the present invention relates to internet communication technical field
Send out the communication means of agreement.
Background technology
The safety of quantum key distribution agreement is ensured by quantum-mechanical philosophy.Wherein, quantum key point
It is exactly BB84 agreements that it is most widely used, which to send out agreement, but it is a single-photon source that light source is required in BB84 agreements, however
In practice, single-photon source is difficult to realize.
In practical application, the relevant technologies can generally use coherent source, but easily lead to that there are multi-photon ingredients.Due to
Number of photons is attacked, and multi-photon ingredient must be unsafe, but together with monochromatic light subconstiuent with multi-photon ingredient is, and very
Difficulty distinguishes, and causes to substantially reduce the safe transmission distance of QKD system and the production rate of security key.Therefore, state is inveigled
BB84 agreements, which are suggested, solves the problems, such as this.In state BB84 agreements are inveigled, Alice is by selecting the light of varying strength to carry out
Coding, so as to accurately estimate monochromatic light subconstiuent, to improve the performance of QKD system.
Specifically, it is encoded under the light of each intensity, the probability of Alice selection X basic vectors and Z basic vectors is identical
, meanwhile, Bob is also measured with equal probabilities selection X and Z basic vectors, so as to the safety of guarantee agreement.But not is optimal
Way.
The base that Alice and Bob are encoded and detected with same probability selection is assumed however, inveigling in state BB84 agreements
Arrow, intuitively, only half can be into code in the signal of transmission, therefore it is not best practice to inveigle state BB84 agreements, is had
It is to be modified.
Invention content
One of the technical issues of the present invention is directed to solve at least to a certain extent in above-mentioned the relevant technologies.
It is for this purpose, a kind of based on the asymmetric communication for inveigling state quantum key distribution agreement it is an object of the invention to propose
Method, the communication means can improve the production rate of security key, and simple and convenient.
In order to achieve the above objectives, the embodiment of the present invention proposes a kind of based on asymmetric trick state quantum key distribution association
The communication means of view, includes the following steps:Recipient and sender establish communication channel;Described sender generates digital sequence at random
Row, and the Serial No. is encoded under the light of multiple intensity, wherein, if it is the light of signal state, the transmission
Side is encoded under the mistake of same base, and if it is the weak light for inveigling state, described sender is existed respectively with different probability selections
The mistake of first base or the second base are encoded under losing;Coding information is sent to the recipient, the recipient by described sender
The coding information is measured in the case where the first base loses or the second base loses with different probability selections respectively, to generate source code;And
According to described sender select coding base become estranged selection light intensity and the recipient select measurement base lose
Shared key is screened from the source code.
The communication means based on asymmetric trick state quantum key distribution agreement proposed according to embodiments of the present invention, leads to
Random generation Serial No. is crossed, and Serial No. is encoded under the light of multiple intensity, and with different probability selections
Coding information is measured in the case where the first base loses or the second base loses, to generate source code, so as to become estranged choosing according to the base of the coding of selection
Shared key is screened in the base mistake for selecting the intensity of light and the measurement of selection from source code, on the basis of ensuring communication safety property
On, it is lost by asymmetric selection base, improves the production rate of security key, while reduce trick state quantum key agreement is
The complexity of system has very strong application value.
It is in addition, according to the above embodiment of the present invention based on the asymmetric communication party for inveigling state quantum key distribution agreement
Method can also have following additional technical characteristic:
Further, in one embodiment of the invention, the above method further includes:The shared key is entangled
Mistake, so that the shared key agreement in described sender and the recipient.
Further, in one embodiment of the invention, the communication channel includes quantum channel and/or classical letter
Road.
Preferably, in one embodiment of the invention, light source can be coherent source.
The additional aspect of the present invention and advantage will be set forth in part in the description, and will partly become from the following description
It obtains significantly or is recognized by the practice of the present invention.
Description of the drawings
The above-mentioned and/or additional aspect and advantage of the present invention will become in the description from combination accompanying drawings below to embodiment
Significantly and it is readily appreciated that, wherein:
Fig. 1 is based on the asymmetric communication means for inveigling state quantum key distribution agreement according to the embodiment of the present invention
Flow chart.
Specific embodiment
The embodiment of the present invention is described below in detail, the example of the embodiment is shown in the drawings, wherein from beginning to end
Same or similar label represents same or similar element or the element with same or like function.Below with reference to attached
The embodiment of figure description is exemplary, it is intended to for explaining the present invention, and is not considered as limiting the invention.
In addition, term " first ", " second " are only used for description purpose, and it is not intended that instruction or hint relative importance
Or the implicit quantity for indicating indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or
Implicitly include one or more this feature.In the description of the present invention, " multiple " are meant that two or more,
Unless otherwise specifically defined.
In the present invention unless specifically defined or limited otherwise, term " installation ", " connected ", " connection ", " fixation " etc.
Term should be interpreted broadly, for example, it may be being fixedly connected or being detachably connected or be integrally connected;It can be machine
Tool is connected or is electrically connected;It can be directly connected, can also be indirectly connected by intermediary, can be two members
Connection inside part.For the ordinary skill in the art, above-mentioned term can be understood in this hair as the case may be
Concrete meaning in bright.
In the present invention unless specifically defined or limited otherwise, fisrt feature second feature it " on " or it " under "
It can be in direct contact including the first and second features, it is not to be in direct contact but pass through it that can also include the first and second features
Between other characterisation contact.Moreover, fisrt feature second feature " on ", " top " and " above " including first spy
Sign is right over second feature and oblique upper or is merely representative of fisrt feature level height higher than second feature.Fisrt feature exists
Second feature " under ", " lower section " and " following " immediately below second feature and obliquely downward or be merely representative of including fisrt feature
Fisrt feature level height is less than second feature.
Below state quantum key distribution agreement is inveigled based on asymmetric what description proposed according to embodiments of the present invention
Before communication means, the BB84 quantum key distributions in the relevant technologies are briefly described first and inveigle state quantum key distribution
Agreement.
First, BB84 quantum key distributions:
In BB84 quantum key distribution agreements, two people, Alice and Bob are desired with safe communication.Wherein, he
Communication means headed by first pass through quantum means share some completely randoms safety key and then using these are close
The information to be communicated is encrypted in key, such as the method that can use one-time pad.The safety of this BB84 agreement is that have
What quantum-mechanical nature ensured, symmetrical BB84 Details Of Agreements are as follows:
1. there are quantum channel (such as optical fiber) and classical channel between two people Alice and Bob.
2.Alice randomly generates a string 01 number strings, and they are encoded so that equiprobability is (symmetrical) in horizontal vertical coding
(Z basic vectors) or 45 degree and -45 degree codings (X basic vectors), and it is sent to Bob using single photon.Bob is (symmetrical with identical probability
) information sent out from Alice is measured using X bases or Z bases, and generate source code.
Alice and Bob announces oneself coding and measures the base of selection after 3., and screening and rear place are carried out to source code
Reason.Only when they select identical base to be encoded and measured, Alice and Bob from source code obtained one it is close
Key.In this way, only 50% possibility Alice and Bob select same basic vector to be encoded and measured, then there was only about 50%
Source code can generate security key.
Secondly, state quantum key distribution agreement is inveigled:
In BB84 agreements, it has been assumed that Alice uses single-photon source.But perfect single-photon source is in practice
Very difficult.It is to use weak coherent state light source in the case of general.It but thus can there are multi-photon ingredients.
It is exactly by the way that by quantum signal coding, under the light of different intensity, it is continuously to think completely to require coherent state here to inveigle state agreement
To be random, so as to which a coherent state will be considered as Number State | 1><1 |, | 2><2 | ..., | n><N | the mixed state of state.
As an example, using a specific practical implementation method, that is, the trick state amount of " weak to inveigle state+vacuum state "
Quantum key distribution agreement.Specific agreement is as follows:
1. there are quantum channel (such as optical fiber) and classical channel between two people Alice and Bob.
2.Alice randomly generates a string 01 number strings, and is encoded them in different intensity with certain probability, specifically
It is signal state, the random coherent light of the weak complete Phase Continuation for inveigling state and vacuum state these three intensity.
3. symmetrical basic vector selection.For the light of each intensity, Alice exists them with (symmetrical) coding of equiprobability
The vertical coding (Z basic vectors) of level or 45 degree and -45 degree codings (X basic vectors), and it is sent to Bob.What certain vacuum state is exactly
It does not send out, does not then need to encode.
The information that Bob is sent out with identical probability (symmetrical) using X bases or the measurement of Z bases from Alice, and generate original
Code.
4.Alice and Bob are post-processed, and final key is obtained from primary key.
1. Alice and Bob announce oneself coding and measure the basic vector of selection respectively, Alice announces oneself selection and compiles simultaneously
The intensity of the light of code, and source code is screened and post-processed.Only when they select identical base to be encoded and measured
When, Alice and Bob from source code screened after key.
2. the step of Alice and Bob pass through error correction, the key to ensure them is identical.And estimate Eve most
The information more being likely to be obtained.Final security key is obtained by the method for the amplification pair that maintains secrecy again.
In the relevant technologies, such as in the case where using laser diode as light source, it is assumed that varying strength light is prepared not
Same polarization state needs different laser diodes.Therefore, the scheme in the relevant technologies just needs 8 different light-emitting diodes
Pipe corresponds respectively to 4 states (0 He of X and Z basic vectors of weak 4 states (the 0 of X and Z basic vectors and 1) and signal state for inveigling state
1).It should be noted that vacuum state is not need to additional light emitting diode.Therefore, light source needs 8 laser diodes.
In conclusion the scheme in the relevant technologies can be very good to ensure the safety of communication, but generate the effect of key
There is no The Gift of Being the Best You Can Be in rate, the only source code of half can generate security key, and the production rate of security key is relatively low, while
It can so that light source part is more complicated, increase system complexity.
The present invention is based on the above problem, and proposes a kind of based on asymmetric trick state quantum key distribution agreement
Communication means.
Describe to propose according to embodiments of the present invention with reference to the accompanying drawings inveigles state quantum key distribution based on asymmetric
The communication means of agreement.With reference to shown in Fig. 1, which includes the following steps:
S101, recipient and sender establish communication channel.
Wherein, in one embodiment of the invention, communication channel includes quantum channel and/or classical channel.
S102, sender generates Serial No. at random, and Serial No. is encoded under the light of multiple intensity,
In, if it is the light of signal state, sender is encoded under the mistake of same base, if it is the weak light for inveigling state, sender
It is encoded respectively with different probability selections in the case where the first base loses or the second base loses.
Coding information is sent to recipient by S103, sender, and recipient is respectively with different probability selections in the first base
It loses or the second base loses lower measurement coding information, to generate source code.
S104, becomes estranged the intensity of the light of selection and measurement that recipient selects according to the base of sender-selected coding
Shared key is screened in base mistake from source code.
Further, in one embodiment of the invention, the communication means of the embodiment of the present invention further includes:To what is shared
Key carries out error correction, so that the shared key agreement in sender and recipient.
Below by taking a specific embodiment as an example, it is described in detail with the communication means to the present invention.
In one particular embodiment of the present invention, the communication means of the embodiment of the present invention is with " weak trick state+vacuum state "
Trick state quantum key distribution agreement for example, asymmetric trick state BB84 Details Of Agreements are as follows:
1. there are quantum channel (such as optical fiber) and classical channel between two people Alice (recipient) and Bob (sender).
2.Alice randomly generates a string 01 number strings, and is encoded them in different intensity with certain probability, specifically
It is signal state, the weak light for inveigling these three intensity of state and vacuum state.
3. asymmetric basic vector selection:Specifically, including:
1. for signal state, Alice encodes all states on a kind of basic vector, such as on Z basic vectors.
2. for weak trick state, Alice is with certain probability encoding on X basic vectors, and certain probability encoding is on Z basic vectors.
In general, it the two probability and differs.
3. for vacuum state, Alice does not need to be encoded.
Further, these coding states are sent to Bob by Alice, and Bob is surveyed with certain probability selection with X basic vectors
Amount, certain probability selection are measured with Z basic vectors.It should be noted that the two probability are typically also different.
4.Alice and Bob are post-processed, and final key is obtained from primary key.Specifically include following steps:
1. Alice and Bob announce oneself coding and measure the basic vector of selection, Alice announces oneself selection coding simultaneously
The intensity of light, and source code is screened and post-processed.Only when they select that identical base encoded and measured
Wait, Alice and Bob from source code screened after key.
2. the step of Alice and Bob pass through error correction, the key to ensure them is identical.And estimate Eve most
The information more being likely to be obtained.Final security key is obtained by the method for the amplification pair that maintains secrecy again.
In an embodiment of the present invention, the asymmetric basic vectors that must select to prepare and measure of Alice and Bob, so as to reach letter
Change system and improve into code check purpose.Specifically, the trick state quantum key distribution agreement of asymmetric basic vector is ensureing safety
Property on the basis of, into code check in principle close to 2 times of symmetrical quantum key distribution agreement, at the same can also reduce inveigle state amount
The system complexity of sub-key agreement has very strong application value.
Preferably, in one embodiment of the invention, light source can be coherent source.
Specifically, the embodiment of the present invention can use laser diode as light source, it is assumed that varying strength light prepares different
Polarization state need different laser diode, then need 6 light emitting diodes, correspond respectively to weak 4 state (X for inveigling state
1) and 2 states of signal state (the 0 of Z basic vectors and 1) with the 0 of Z basic vectors and.It should be noted that vacuum state is not need to be additional
Light emitting diode.Therefore, the embodiment of the present invention only needs 6 laser diodes, is needed less than the light source in the relevant technologies
8 laser diodes, so as to reduce light source complexity.
In conclusion in an embodiment of the present invention, Alice and Bob can be encoded and be measured with different probability selections
Basic vector, on the one hand the select probability of one of basic vector can be allowed to be intended to 0, it is whole into code check, the opposing party so as to be promoted
Face can reduce the multifarious demand to light source, so as to simplify system, have very strong application value.In addition, it is necessary to explanation
It is that the embodiment of the present invention can be used for but not only in inveigling state BB84 agreements, others need what is symmetrically selected coding and measure
Quantum key distribution agreement can be through the embodiment of the present invention asymmetric quantum key distribution technology improve into code check, than
Such as in the unrelated quantum key distribution protocol of measuring apparatus, performance and simplification can also be improved using the method for the embodiment of the present invention
Device.
The communication means based on asymmetric trick state quantum key distribution agreement proposed according to embodiments of the present invention, leads to
Random generation Serial No. is crossed, and Serial No. is encoded under the light of multiple intensity, and with different probability selections
Coding information is measured in the case where the first base loses or the second base loses, to generate source code, so as to become estranged choosing according to the base of the coding of selection
Shared key is screened in the base mistake for selecting the intensity of light and the measurement of selection from source code, on the basis of ensuring communication safety property
On, it is lost by asymmetric selection base, improves the production rate of security key, increase substantially the performance of agreement, reduce simultaneously
The complexity of the system of state quantum key agreement is inveigled, there is very strong application value.
Any process described otherwise above or method description are construed as in flow chart or herein, represent to include
Module, segment or the portion of the code of the executable instruction of one or more the step of being used to implement specific logical function or process
Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discuss suitable
Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, to perform function, this should be of the invention
Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use
In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for
Instruction execution system, device or equipment (such as computer based system, including the system of processor or other can be held from instruction
The system of row system, device or equipment instruction fetch and execute instruction) it uses or combines these instruction execution systems, device or set
It is standby and use.For the purpose of this specification, " computer-readable medium " can any can be included, store, communicate, propagate or pass
Defeated program is for instruction execution system, device or equipment or the dress used with reference to these instruction execution systems, device or equipment
It puts.The more specific example (non-exhaustive list) of computer-readable medium is including following:Electricity with one or more wiring
Connecting portion (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory
(ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits
Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable
Medium, because can be for example by carrying out optical scanner to paper or other media, then into edlin, interpretation or when necessary with it
His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the present invention can be realized with hardware, software, firmware or combination thereof.Above-mentioned
In embodiment, software that multiple steps or method can in memory and by suitable instruction execution system be performed with storage
Or firmware is realized.If for example, with hardware come realize in another embodiment, can be under well known in the art
Any one of row technology or their combination are realized:With for the logic gates to data-signal realization logic function
Discrete logic, have suitable combinational logic gate circuit application-specific integrated circuit, programmable gate array (PGA), scene
Programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that realize all or part of step that above-described embodiment method carries
Suddenly it is that relevant hardware can be instructed to complete by program, the program can be stored in a kind of computer-readable storage medium
In matter, the program when being executed, one or a combination set of the step of including embodiment of the method.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, it can also
That each unit is individually physically present, can also two or more units be integrated in a module.Above-mentioned integrated mould
The form that hardware had both may be used in block is realized, can also be realized in the form of software function module.The integrated module is such as
Fruit is realized in the form of software function module and is independent product sale or in use, can also be stored in a computer
In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " example ", " is specifically shown " some embodiments "
The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description
Point is contained at least one embodiment of the present invention or example.In the present specification, schematic expression of the above terms are not
Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any
One or more embodiments or example in combine in an appropriate manner.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example
Property, it is impossible to limitation of the present invention is interpreted as, those of ordinary skill in the art are not departing from the principle of the present invention and objective
In the case of can make changes, modifications, substitutions and variations to the above described embodiments within the scope of the invention.
Claims (4)
- It is 1. a kind of based on the asymmetric communication means for inveigling state quantum key distribution agreement, which is characterized in that including following step Suddenly:Recipient and sender establish communication channel;Described sender generates Serial No. at random, and the Serial No. is encoded under the light of multiple intensity, wherein, If it is the light of signal state, described sender is encoded under the mistake of same base, if it is the weak light for inveigling state, the hair It is become estranged under the second base loses and is encoded in the first base with different probability selections respectively in the side of sending;Coding information is sent to the recipient by described sender, and the recipient is respectively with different probability selections first Base becomes estranged under the second base loses and measures the coding information, to generate source code;AndThe base of the coding selected according to described sender is become estranged the intensity of light of selection and the measurement that selects of the recipient Shared key is screened in base mistake from the source code, wherein, sender and recipient select identical basic vector carry out coding and It measures.
- It is 2. according to claim 1 based on the asymmetric communication means for inveigling state quantum key distribution agreement, feature It is, further includes:Error correction is carried out to the shared key, so that the shared key agreement in described sender and the recipient.
- It is 3. according to claim 1 based on the asymmetric communication means for inveigling state quantum key distribution agreement, feature It is, the communication channel includes quantum channel and/or classical channel.
- It is 4. according to claim 1 based on the asymmetric communication means for inveigling state quantum key distribution agreement, feature It is, light source is coherent source.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510472134.8A CN105049198B (en) | 2015-08-05 | 2015-08-05 | Based on the asymmetric communication means for inveigling state quantum key distribution agreement |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510472134.8A CN105049198B (en) | 2015-08-05 | 2015-08-05 | Based on the asymmetric communication means for inveigling state quantum key distribution agreement |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105049198A CN105049198A (en) | 2015-11-11 |
CN105049198B true CN105049198B (en) | 2018-06-22 |
Family
ID=54455421
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510472134.8A Active CN105049198B (en) | 2015-08-05 | 2015-08-05 | Based on the asymmetric communication means for inveigling state quantum key distribution agreement |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105049198B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105846999B (en) * | 2016-06-14 | 2019-02-15 | 泰山学院 | Multi-party quantum key agreement method based on one-way transmission circuit |
WO2018076175A1 (en) | 2016-10-25 | 2018-05-03 | 华为技术有限公司 | Information processing method and apparatus |
CN106712940B (en) * | 2016-12-28 | 2022-11-25 | 清华大学 | Quantum key distribution system and method irrelevant to measurement and equipment |
CN108650088B (en) * | 2018-07-04 | 2023-10-20 | 中国科学技术大学 | Quantum communication device and method comprising at least three parties |
CN110247765B (en) * | 2019-06-25 | 2021-12-28 | 湖北凯乐量子通信光电科技有限公司 | Quantum secret data chain communication system |
CN112332987B (en) * | 2021-01-06 | 2021-03-23 | 成都信息工程大学 | Cloud quantum privacy query method based on user agent |
CN113037476B (en) * | 2021-03-01 | 2022-07-12 | 南京大学 | Asymmetric coherent detection quantum conference key negotiation method and system |
CN113824510B (en) * | 2021-09-22 | 2022-09-23 | 西北大学 | Quantum secure direct communication method based on middle base decoy state |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101394269A (en) * | 2008-08-07 | 2009-03-25 | 清华大学 | Remote communication method directly safely communicating with quantum by using quantum state injection reinforcement |
CN101645769A (en) * | 2008-08-05 | 2010-02-10 | 中国科学院物理研究所 | Optical system sharing true random number sequence between different places |
CN102946313A (en) * | 2012-10-08 | 2013-02-27 | 北京邮电大学 | Model and method for user authentication for quantum key distribution network |
CN103986575A (en) * | 2014-06-05 | 2014-08-13 | 武汉大学 | Asymmetric calculation type shared key establishing method |
CN104410500A (en) * | 2014-12-24 | 2015-03-11 | 广东数字证书认证中心有限公司 | Specified verifier-based signing, signature verification and signature copy simulation method and system |
CN104579638A (en) * | 2014-09-30 | 2015-04-29 | 清华大学 | Decoy-state quantum key distribution system based on discrete random phase |
-
2015
- 2015-08-05 CN CN201510472134.8A patent/CN105049198B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101645769A (en) * | 2008-08-05 | 2010-02-10 | 中国科学院物理研究所 | Optical system sharing true random number sequence between different places |
CN101394269A (en) * | 2008-08-07 | 2009-03-25 | 清华大学 | Remote communication method directly safely communicating with quantum by using quantum state injection reinforcement |
CN102946313A (en) * | 2012-10-08 | 2013-02-27 | 北京邮电大学 | Model and method for user authentication for quantum key distribution network |
CN103986575A (en) * | 2014-06-05 | 2014-08-13 | 武汉大学 | Asymmetric calculation type shared key establishing method |
CN104579638A (en) * | 2014-09-30 | 2015-04-29 | 清华大学 | Decoy-state quantum key distribution system based on discrete random phase |
CN104410500A (en) * | 2014-12-24 | 2015-03-11 | 广东数字证书认证中心有限公司 | Specified verifier-based signing, signature verification and signature copy simulation method and system |
Non-Patent Citations (1)
Title |
---|
Passive decoy state quantum key distribution with coherent light;Marcos Curty等;《IEEE》;20100518;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN105049198A (en) | 2015-11-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105049198B (en) | Based on the asymmetric communication means for inveigling state quantum key distribution agreement | |
CN104579638B (en) | Trick state quantum key distribution system based on Discrete Stochastic phase | |
CN106712940B (en) | Quantum key distribution system and method irrelevant to measurement and equipment | |
CN108712261B (en) | Key generation method, device and medium based on block chain | |
KR101610747B1 (en) | Method and apparatus for quantum cryptographic communication | |
CN103221988B (en) | Calculating system, calculating device, ability offer device are provided, computational methods, ability offer method are provided | |
CN105553648A (en) | Quantum key distribution, privacy amplification and data transmission methods, apparatuses, and system | |
CN115085924B (en) | Computer information transmission encryption system based on Huffman coding | |
WO2018043742A1 (en) | Quantum cryptographic key output apparatus, quantum cryptographic key communication system, and quantum cryptographic key output method | |
CN107359985B (en) | Controlled quantum secure direct communication method based on Huffman compression coding | |
CN108092771A (en) | A kind of anti-tamper controlled quantum safety direct communication method and system | |
CN111092664B (en) | Channel capacity increasing method for quantum secure communication irrelevant to measuring equipment | |
CN106254072A (en) | A kind of quantum key distribution system and method | |
CN104238996A (en) | Source irrelevant quantum random number generation method and device | |
CN106576002A (en) | Fibre-based communication | |
CN104660346A (en) | Multi-party quantum communication method and system for triple-quantum bit encoding of single photon | |
CN103108245B (en) | A kind of intelligent television pays cipher key system and method for payment based on intelligent television | |
CN108365954B (en) | Control code multiplexing method | |
CN103118351B (en) | The generation method and apparatus of repaid card data | |
Xiao et al. | Widening the sharpness modulation region of an entanglement-assisted sequential quantum random access code: Theory, experiment, and application | |
CN105049200B (en) | The data post processing method of quantum key distribution system | |
CN206517427U (en) | One kind inveigles state quantum key distribution system | |
CN109347833B (en) | Access control method and system used in machine learning environment based on attribute encryption | |
Renes | The physics of quantum information: Complementarity, uncertainty, and entanglement | |
CN114667710A (en) | Qubit decoding apparatus, systems, and methods |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |