CN105245332A - Four-particle x state-based two-party quantum key agreement protocol - Google Patents

Four-particle x state-based two-party quantum key agreement protocol Download PDF

Info

Publication number
CN105245332A
CN105245332A CN201510688396.8A CN201510688396A CN105245332A CN 105245332 A CN105245332 A CN 105245332A CN 201510688396 A CN201510688396 A CN 201510688396A CN 105245332 A CN105245332 A CN 105245332A
Authority
CN
China
Prior art keywords
alice
bob
sequence
state
quantum
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510688396.8A
Other languages
Chinese (zh)
Other versions
CN105245332B (en
Inventor
何业锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian University of Posts and Telecommunications
Original Assignee
Xian University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Posts and Telecommunications filed Critical Xian University of Posts and Telecommunications
Priority to CN201510688396.8A priority Critical patent/CN105245332B/en
Publication of CN105245332A publication Critical patent/CN105245332A/en
Application granted granted Critical
Publication of CN105245332B publication Critical patent/CN105245332B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Optical Modulation, Optical Deflection, Nonlinear Optics, Optical Demodulation, Optical Logic Elements (AREA)
  • Optical Communication System (AREA)

Abstract

The invention discloses a four-particle x state-based two-party quantum key agreement protocol. The protocol includes following steps that: step 1, Alice and Bob negotiate on quantum-state codes; step 2, Alice prepares n x-state|x<00>>ABCD, and divides all the particles into four ordered sequences, and selects out 2m decoy photons and inserts the decoy photons into the sequences and transmits the sequences to Bob; step 3, Bob measures corresponding decoy photons with a correct measurement base, and informs Alice of measurement results; Alice compares the measurement results and the initial states of the decoy photons, and calculates an error rate, and executes step 4 if the error rate is low, otherwise, executes step 2; and step 4, Alice performs Bell measurement on the particles, Bob executes Z convolution Z-base measurement on the sequences, and Alice and Bob both obtain a shared key. The protocol of the invention can resist existing participant attacks, external attacks and Troy Trojan horse attacks; and the protocol is safe in a noise-free quantum channel and a quantum noise channel. The quantum bit efficiency of the protocol of the invention is higher than that of an existing secure multi-particle entangled state-based quantum key agreement protocol.

Description

Based on two side's quantum key agreement protocols of four particle χ states
Technical field
The invention belongs to quantum communications field, be specifically related to a kind of quantum key and consult (Quantumkeyagreement) agreement, particularly a kind of two side's quantum key agreement protocols based on four particle χ states.
Background technology
Quantum cryptography is the new technology of communication and network security, and its fail safe is ensured by fundamental principles of quantum mechanics.Be the different of computationally secure mostly from conventional cipher, quantum cryptography can realize unconditional security, has attracted a large amount of concern thus.It is the new important branch of of quantum cryptography that quantum key consults (QKA) agreement, it allows participant to consult a classical shared secret key by disclosed quantum channel, and the contribution of each participant is identical, the subset that any one participant or participant are formed all can not independently determine this shared key.Utilization sub-key consults the shared secret key of (QKA) agreement foundation and the cryptographic algorithm of one-time pad, and communicating pair can realize the secure communication of unconditional security.
Existing most of quantum key agreement protocol is based on single-particle or Bell state, based on multiparticle Entangled State quantum key agreement can be counted on one's fingers, and they or the external attacks such as Te Luoyi wooden horse can not be resisted, be unsafe, or quantum bit rate is too low.
D.S.Shen, W.P.MaandL.L.Wang utilizes the Cluster State of four particles to propose a both sides QKA agreement in paper " Two-partyquantumkeyagreementwithfour-qubitclusterstates " (QuantumInf.Process.2014:2313-2324), and this agreement has the sub-bit efficiency of higher amount.The concrete steps of agreement are: the first, the Cluster State of some four particles of each self-generating of communicating pair A and B.Communication party A (communication party B) issues communication party B (communication party A) by being inserted after trick photon by the sequence that (first) particle is formed of the 3rd in Cluster State, and retains and its particle sequence.The second, after communicating pair receives corresponding particle sequence, perform eavesdropping monitoring together.3rd, the unitary transformation of the particle sequence execution that communicating pair just receives separately oneself.Then insert after inveigling photon and it is issued the other side mutually.4th, after communicating pair receives corresponding particle sequence, perform eavesdropping monitoring together.5th, communication party A (communication party B) performs respective unitary transformation to by the sequence that (the 3rd) particle is formed of first in Cluster State.Then both sides perform the measurement of cluster base to respective Cluster State, and both sides can obtain identical measurement result.The privacy key shared can be obtained according to coding and the correspondence of measurement result.This agreement Shortcomings part is: because this agreement is a Ping-Pong agreement, namely same particle has been transmitted one back and forth in quantum channel, and therefore this agreement cannot be resisted invisible photon eavesdropping (IPE) Trojan attack and be postponed photon Trojan attack.
W.Huang, Q.Su, X.Wu, Y.B.LiandY.Sun utilize the DF state of four particles to propose the both sides QKA agreement of an energy immunity associating noise in paper " Quantumkeyagreementagainstcollectivedecoherence " (Int.J.Theor.Phys.2014:2891-2901).The concrete steps of agreement are: the first, and communication party A generates two random bit strings, and an individual as shared key contributes string, and one as selecting the control string measuring base.The second, communication party A contributes string and selection to measure the sequence of the DF state of control string preparation four particles of base according to individual, and issues communication party B after inserting trick photon.3rd, after communication party B receives the sequence of DF state of four particles, both sides perform eavesdropping monitoring jointly.If by detecting, the individual that communication party B announces his shared key contributes string.4th, communication party A contributes string according to oneself and the individual of communication party B, can calculate the shared secret key of both sides.The control string of base is measured in 5th, the communication party A selection disclosing him.Utilize this to control string, communication party B can measure all DF states, and the individual that can obtain the shared key of communication party A according to measurement result contributes string.Therefore, communication party B also can calculate the shared secret key of both sides.This agreement Shortcomings part is: the quantum bit efficiency of this agreement is too low, and its quantum bit efficiency is only 10%.
Summary of the invention
For the defect existed in above-mentioned prior art or deficiency, the object of the invention is to, a kind of quantum key agreement protocol based on GHZ state is provided.
In order to realize above-mentioned task, the present invention adopts following technical scheme to be solved:
Based on two side's quantum key agreement protocols of four particle χ states, specifically comprise the steps:
Step 1:Alice and Bob consults the coding of following quantum state;
Step 2:Alice prepares n χ state | χ 00> aBCD, and by this n χ state | χ 00> aBCDall particles be divided into four orderly sequences:
S A={A 1,A 2,…,A n},S B={B 1,B 2,…,B n},
S c={ C 1, C 2..., C nand S d={ D 1, D 2..., D n}
Wherein sequence S a, S b, S c, S drespectively by each χ state | χ 00> aBCDparticle A, B, C, D form; Alice from set | 0>, | 1>, |+>, | select 2m in->} at random and inveigle photon, and by this 2m trick photon radom insertion sequence S cand S d, and ensure that inserting m in each sequence inveigles photon, obtains new sequence S' respectively cand S' d; Alice oneself reservation queue S aand S b, by sequence S' cand S' dsend to Bob; N, m are the positive integer being greater than 1;
Step 3: when Bob receives sequence S' cand S' dafter, inform Alice by classical authenticated channel; Alice announces and inveigles photon at sequence S' cand S' din position and corresponding measurement base | 0>, | 1>} or |+>, |->}; Bob goes to measure with correct measurement base and inveigles photon accordingly, and measurement result is informed Alice by classical authenticated channel; Alice compares and measures result and inveigles the initial condition of photon, mistake in computation rate; If error rate is lower than prespecified limit gate value, then perform step 4, otherwise, perform step 2;
Step 4:Alice is to sequence S aand S bevery two particles that middle sequence number is identical perform Bell and measure, and Bob is to sequence S cand S devery two particles that middle sequence number is identical perform base is measured; According to the coding of the quantum state that Alice and Bob in the measurement result of Alice and Bob and step 1 consults, Alice and Bob obtains the shared key of identical 2n bit respectively.
Z &CircleTimes; Z = { | 00 > , | 01 > , | 10 > , | 11 > }
Further, in described step 1, the coding of the quantum state that Alice and Bob consults: | φ +> aB→ 00, | ψ -> aB→ 01, | ψ +> aB→ 10, | φ -> aB→ 11, | 00> cD→ 00, | 01> cD→ 01, | 10> cD→ 10, | 11> cD→ 11.
Further, in described step 2,
| &chi; 00 > A B C D = 1 2 2 ( | 0000 > + | 0011 > - | 0101 > + | 0110 > + | 1001 > + | 1010 > + | 1100 > - | 1111 > ) A B C D .
Further, in described step 3, described limit gate value gets 0.1 ~ 0.2.
Beneficial effect of the present invention:
Two side's quantum key agreement protocols based on four particle χ states of the present invention can guarantee that communicating pair sets up the classical privacy key shared between them liberally; Utilize the cryptographic algorithm of this classical privacy key and one-time pad, communicating pair can realize the secure communication of unconditional security, and obvious the present invention can resist existing participant and attack and external attack.Because each particle in agreement of the present invention is only transmitted once, therefore assailant successfully can not perform Trojan horse attack.Find that this agreement is not only safe at noiseless quantum channel by analyzing, and it is also safe on quantum noise channel.In addition, the quantum bit efficiency of agreement of the present invention is higher than the existing safe quantum key agreement protocol based on multiparticle Entangled State.
Embodiment
1, pre-knowledge
As everyone knows, | 0>, | 1>} defines Z base, |+>, |->} defines X base, wherein | - > 1 / 2 ( | 0 > - | 1 > ) . Four Bell state are defined as follows:
| &phi; + > = 1 / 2 ( | 00 > + | 11 > ) , | &phi; - > = 1 / 2 ( | 00 > + | 11 > ) ,
| &psi; + > = 1 / 2 ( | 0 1 > + | 1 0 > ) , | &psi; - > = 1 / 2 ( | 0 1 > - | 1 0 > ) ,
They form one group of complete orthogonal basis in four-dimensional Hilbert space, i.e. Bell base.χ state is the maximal entangled state of four particles, and they can form one group of complete orthogonal basis in 16 dimension Hilbert spaces.In agreement of the present invention, we use a following χ state as quantum information source, namely
| &chi; 00 > A B C D = 1 2 2 ( | 0000 > + | 0011 > - | 0101 > + | 0110 > + | 1001 > + | 1010 > + | 1100 > - | 1111 > ) A B C D = 1 2 ( | &phi; + > A B | 00 > C D - | &psi; - > A B | 01 > C D + | &psi; + > A B | 10 > C D + | &phi; - > A B | 11 > C D )
According to expression formula, if to χ state | χ 00> aBCDparticle A and B perform Bell measure, particle C and D is performed base measure, then system with 1/4 probability be collapsed to state | φ +> aB| 00> cD, | ψ -> aB| 01> cD, | ψ +> aB| 10> cDwith | φ -> aB| 11> cD.
2, two side's quantum key agreement protocols based on four particle χ states of the present invention
Two side's quantum key agreement protocols based on four particle χ states of the present invention, specifically comprise the steps:
Step 1:Alice and Bob consults the coding of following quantum state: | φ +> aB→ 00, | ψ -> aB→ 01, | ψ +> aB→ 10, | φ -> aB→ 11, | 00> cD→ 00, | 01> cD→ 01, | 10> cD→ 10, | 11> cD→ 11.
Step 2:Alice prepares n χ state | χ 00> aBCD, and by this n χ state | χ 00> aBCDall particles be divided into four orderly sequences:
S A={A 1,A 2,…,A n},S B={B 1,B 2,…,B n},
S c={ C 1, C 2..., C nand S d={ D 1, D 2..., D n}
Wherein sequence S a, S b, S c, S drespectively by each χ state | χ 00> aBCDparticle A, B, C, D form; Alice from set | 0>, | 1>, |+>, | select 2m in->} at random and inveigle photon, and by this 2m trick photon radom insertion sequence S cand S d, and ensure that just in time inserting m in each sequence inveigles photon, obtains new sequence S' respectively cand S' d; Alice oneself reservation queue S aand S b, by sequence S' cand S' dsend to Bob; N, m are the positive integer being greater than 1;
| &chi; 00 > A B C D = 1 2 2 ( | 0000 > + | 0011 > - | 0101 > + | 0110 > + | 1001 > + | 1010 > + | 1100 > - | 1111 > ) A B C D
Step 3: when Bob receives sequence S' cand S' dafter, inform Alice by classical authenticated channel; Alice announces and inveigles photon at sequence S' cand S' din position and corresponding measurement base | 0>, | 1>} or |+>, |->}; Bob goes to measure with correct measurement base and inveigles photon accordingly, and measurement result is informed Alice by classical authenticated channel; Alice compares and measures result and inveigles the initial condition of photon, mistake in computation rate; If error rate is lower than prespecified limit gate value, then perform step 4, otherwise, perform step 2; Described limit gate value gets 0.1 ~ 0.2.
Step 4:Alice is to sequence S aand S bevery two particles that middle sequence number is identical perform Bell and measure, and Bob is to sequence S cand S devery two particles that middle sequence number is identical perform base is measured; According to the coding of the quantum state that Alice and Bob in the measurement result of Alice and Bob and step 1 consults, Alice and Bob obtains the shared key of identical 2n bit respectively.
Z &CircleTimes; Z = { | 00 > , | 01 > , | 10 > , | 11 > }
According to | &chi; 00 > A B C D = 1 2 ( | &phi; + > A B | 00 > C D - | &psi; - > A B | 01 > C D + | &psi; + > A B | 10 > C D + | &phi; - > A B | 11 > C D ) , Known, if to χ state | χ 00> aBCDparticle A and B perform Bell measure, particle C and D is performed base measure, then system with 1/4 probability be collapsed to state | φ +> aB| 00> cD, | ψ -> aB| 01> cD, | ψ +> aB| 10> cDwith | φ -> aB| 11> cD.Therefore, Alice and Bob can obtain the shared key of identical 2n bit.
4 fail safes and efficiency analysis
The QKA agreement of a safety can not only resist external attack, and can resist participant's attack.
4.1 participants attack
Below, explanation dishonest participant can not be obtained alone this shared key by us.Without loss of generality, suppose that Alice is a dishonest participant, she wants to allow the 2l bit in shared key be 0 entirely, and she needs to measure sequence S with Bell base aand S bin corresponding l to particle.But according to the characteristic of Quantum Entangled States, the measurement result of every a pair particle is all randomly | φ +> aB, | ψ -> aB, | ψ +> aBwith | φ -> aB, namely Alice with 25% probability obtain 00,01,10 or 11.Therefore, every 2 in 2l bit is 00,01,10 or 11 randomly.So Alice cannot any one bit in Independent Decisiveness shared key.So this agreement can be resisted participant and be attacked.
4.2 external attack
Suppose that Eve is a listener-in wanting to steal shared key, the possible method that she attacks has: Trojan horse attack, measurement-multi-sending attack, intercepting and capturing-multi-sending attack and tangle-measure attack.
Trojan horse attack: in this agreement, because each photon in quantum channel is only transmitted once, therefore Eve successfully can not perform invisible photon eavesdropping (IPE) Trojan attack and postpone photon Trojan attack.
Measurement-multi-sending attack: Eve can to sequence S' cand S' din particle perform measurement-multi-sending attack.But the measurement of Eve will affect sequence S' cand S' dthe state of middle trick particle.In the eavesdropping of second step detects, Alice and Bob can with 1-(3/4) mthe probability of (m represents the quantity for detecting the trick particle that this is attacked) finds the attack of Eve.
Intercepting and capturing-multi-sending attack: if Eve performs intercepting and capturing-multi-sending attack, first she intercept and capture sequence S' cand S' d, then send her forgery sequence to Bob.After agreement terminates, she is again to sequence S' cand S' din particle perform corresponding measurement.But Eve does not also know position and the initial state of inveigling particle, and the sequence that therefore she forges can not be monitored by the eavesdropping of second step.When inveigling particle to be used to monitor this eavesdropping attack for m, corresponding eavesdropping verification and measurement ratio is 1-(1/2) m.Therefore, the intercepting and capturing-multi-sending attack of Eve also have failed.
Tangle-measure attack: Eve also can go to tangle this transmission particle (sequence S' with oneself pre-prepd auxiliary particle cand S' din particle), then transmission particle is issued Bob again.After agreement terminates, she measures corresponding auxiliary particle again, thus extracts the useful information about shared key.But Eve is before eavesdropping detects and do not know to inveigle the position of photon, she tangles operation U and certainly also can be performed on trick photon.Further, state is inveigled to become following two particle Entangled State:
U(|0>|E>)=a|0>|e 00>+b|1>|e 01>,
U(|1>|E>)=c|0>|e 10>+d|1>|e 11>,
U ( | + > | E > ) = 1 2 &lsqb; | + > ( a | e 00 > + b | e 01 > + c | e 10 > + d | e 11 > ) + | - > ( a | e 00 > - b | e 01 > + c | e 10 > - d | e 11 > ) &rsqb;
U ( | - > | E > ) = 1 2 &lsqb; | + > ( a | e 00 > + b | e 01 > - c | e 10 > - d | e 11 > ) + | - > ( a | e 00 > - b | e 01 > - c | e 10 > + d | e 11 > ) &rsqb;
Wherein | e 00>, | e 01>, | e 10> and | e 11> is by the well-determined pure state of unitary transformation U, and | a| 2+ | b| 2=1, | c| 2+ | d| 2=1.Obviously, CNOT conversion is the special circumstances of unitary transformation U.If Eve wants to be detected by eavesdropping at second step, the unitary transformation U of Eve must satisfy condition b=c=0 and a|e 00>=d|e 11>.Work as equation during establishment, Eve can not distinguish auxiliary photon a|e 00> and d|e 11>, thus Eve does not obtain the useful information of shared key by observing auxiliary photon.But, if a|e 00> ≠ d|e 11the attack of >, Eve will disturb trick state |+> and |->.Therefore, the attack of Eve will be found by Alice and Bob.The eavesdropping verification and measurement ratio of each trick photon is:
1 4 | b | 2 + 1 4 | c | 2 + 1 4 &times; 1 4 &times; ( | a | 2 + | b | 2 + | c | 2 + | d | 2 ) &times; 2 = 1 4 ( | b | 2 + | c | 2 ) + 1 4 &GreaterEqual; 1 4 .
4.3 quantum noise channels
In quantum noise channel, the span of quantum bit error rate (QBER) τ introduced by noise is similar at 2%-8.9%, and it depends on the situation of channel as factors such as distances.If the quantum bit error rate that the attack of Eve is introduced is less than τ, so she just can hide her attack with noise.According to above-mentioned safety analysis, in this agreement, the eavesdropping verification and measurement ratio of each trick photon is at least 25%, and it is much larger than τ.Therefore, suitable eavesdropping detectability gate value is selected can to guarantee that this agreement is also safe on quantum noise channel.
According to above-mentioned analysis, this agreement is all safe on noiseless quantum channel and quantum noise channel.
5 efficiency analysiss
For a QKA agreement, Cabello quantum bit efficiency is defined as: wherein c represents the quantity of the classical bit of negotiation, the quantity of the quantum bit used in q presentation protocol.Therefore, our the quantum bit efficiency of agreement is: wherein χ state in n presentation protocol | χ 00> aBCDquantity, m represents and inveigles the quantity of particle.Make m=n, Wo Menyou &eta; = 1 3 = 33.3 % .

Claims (4)

1., based on two side's quantum key agreement protocols of four particle χ states, it is characterized in that, specifically comprise the steps:
Step 1:Alice and Bob consults the coding of following quantum state;
Step 2:Alice prepares n χ state | χ 00> aBCD, and by this n χ state | χ 00> aBCDall particles be divided into four orderly sequences:
S A={A 1,A 2,…,A n},S B={B 1,B 2,…,B n},
S c={ C 1, C 2..., C nand S d={ D 1, D 2..., D n}
Wherein sequence S a, S b, S c, S drespectively by each χ state | χ 00> aBCDparticle A, B, C, D form; Alice from set | 0>, | 1>, |+>, | select 2m in->} at random and inveigle photon, and by this 2m trick photon radom insertion sequence S cand S d, and ensure that inserting m in each sequence inveigles photon, obtains new sequence S' respectively cand S' d; Alice oneself reservation queue S aand S b, by sequence S' cand S' dsend to Bob; N, m are the positive integer being greater than 1;
Step 3: when Bob receives sequence S' cand S' dafter, inform Alice by classical authenticated channel; Alice announces and inveigles photon at sequence S' cand S' din position and corresponding measurement base | 0>, | 1>} or |+>, |->}; Bob goes to measure with correct measurement base and inveigles photon accordingly, and measurement result is informed Alice by classical authenticated channel; Alice compares and measures result and inveigles the initial condition of photon, mistake in computation rate; If error rate is lower than prespecified limit gate value, then perform step 4, otherwise, perform step 2;
Step 4:Alice is to sequence S aand S bevery two particles that middle sequence number is identical perform Bell and measure, and Bob is to sequence S cand S devery two particles that middle sequence number is identical perform base is measured; According to the coding of the quantum state that Alice and Bob in the measurement result of Alice and Bob and step 1 consults, Alice and Bob obtains the shared key of identical 2n bit respectively.
Z &CircleTimes; Z = { | 00 > , | 01 > , | 10 > , | 11 > }
2., as claimed in claim 1 based on two side's quantum key agreement protocols of four particle χ states, it is characterized in that, in described step 1, the coding of the quantum state that Alice and Bob consults: | φ +> aB→ 00, | ψ -> aB→ 01, | ψ +> aB→ 10, | φ -> aB→ 11, | 00> cD→ 00, | 01> cD→ 01, | 10> cD→ 10, | 11> cD→ 11.
3., as claimed in claim 1 based on two side's quantum key agreement protocols of four particle χ states, it is characterized in that, in described step 2,
| &chi; 00 > A B C D = 1 2 2 ( | 0000 > + | 0011 > - | 0101 > + | 0110 > + | 1001 > + | 1010 > + | 1100 > - | 1111 > ) A B C D .
4., as claimed in claim 1 based on two side's quantum key agreement protocols of four particle χ states, it is characterized in that, in described step 3, described limit gate value gets 0.1 ~ 0.2.
CN201510688396.8A 2015-10-21 2015-10-21 Two side's quantum key agreement protocols based on four particle χ states Expired - Fee Related CN105245332B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510688396.8A CN105245332B (en) 2015-10-21 2015-10-21 Two side's quantum key agreement protocols based on four particle χ states

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510688396.8A CN105245332B (en) 2015-10-21 2015-10-21 Two side's quantum key agreement protocols based on four particle χ states

Publications (2)

Publication Number Publication Date
CN105245332A true CN105245332A (en) 2016-01-13
CN105245332B CN105245332B (en) 2018-04-03

Family

ID=55042845

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510688396.8A Expired - Fee Related CN105245332B (en) 2015-10-21 2015-10-21 Two side's quantum key agreement protocols based on four particle χ states

Country Status (1)

Country Link
CN (1) CN105245332B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105846999A (en) * 2016-06-14 2016-08-10 泰山学院 Multi-side quantum secret key negotiation method based on unidirectional transmission loop
CN108768645A (en) * 2018-07-31 2018-11-06 西北大学 A kind of asymmetric quantum dialogue method of fault tolerant based on decoherence free subspace
CN108923914A (en) * 2018-06-21 2018-11-30 西北大学 A kind of quantum key delivering method based on 4 Particle Cluster states
CN109412797A (en) * 2018-11-05 2019-03-01 北京邮电大学 Cryptographic key negotiation method and client based on bit error rate judgement state base
CN110557250A (en) * 2019-09-12 2019-12-10 苏州大学 multi-party quantum key negotiation method based on four-particle x state
CN110912695A (en) * 2019-12-05 2020-03-24 成都信息工程大学 Quantum arbitration signature method and system based on six-particle invisible transmission state
CN110932849A (en) * 2019-11-27 2020-03-27 苏州大学 Multi-party quantum key negotiation method based on parameter unknown non-maximum entangled Bell state
CN110932848A (en) * 2019-11-27 2020-03-27 苏州大学 Multi-party quantum key negotiation method based on non-maximum entanglement Bell state with known parameters
CN112332988A (en) * 2021-01-06 2021-02-05 成都信息工程大学 Agile quantum privacy query method based on anti-rotation noise
CN114697024A (en) * 2022-04-08 2022-07-01 北京邮电大学 Quantum privacy comparison method and system based on single photon and rotation encryption and storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113489550B (en) * 2021-07-02 2022-07-01 浙江工商大学 Quantum encryption quantum conversation method based on single photon with polarization and empty mode freedom degrees

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110126011A1 (en) * 2009-11-24 2011-05-26 Electronics And Telecommunications Research Institute Method of user-authenticated quantum key distribution
CN103248628A (en) * 2013-05-15 2013-08-14 北京邮电大学 Quantum safety communication eavesdropping detection method based on four-particle W state
CN103281176A (en) * 2013-06-03 2013-09-04 浙江工商大学 Non-information leakage controlled quantum conversation protocol based on using entanglement exchange measurement correlation and reducing transmission efficiency
CN103297226A (en) * 2013-06-03 2013-09-11 浙江工商大学 Controlled bi-directional quantum secure direct communication protocol free of information leakage

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110126011A1 (en) * 2009-11-24 2011-05-26 Electronics And Telecommunications Research Institute Method of user-authenticated quantum key distribution
CN103248628A (en) * 2013-05-15 2013-08-14 北京邮电大学 Quantum safety communication eavesdropping detection method based on four-particle W state
CN103281176A (en) * 2013-06-03 2013-09-04 浙江工商大学 Non-information leakage controlled quantum conversation protocol based on using entanglement exchange measurement correlation and reducing transmission efficiency
CN103297226A (en) * 2013-06-03 2013-09-11 浙江工商大学 Controlled bi-directional quantum secure direct communication protocol free of information leakage

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
KUAN-HUNG CHEN等: "《Multiparty Quantum Key Agreement with GHZ State》", 《2015 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS》 *

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105846999A (en) * 2016-06-14 2016-08-10 泰山学院 Multi-side quantum secret key negotiation method based on unidirectional transmission loop
CN105846999B (en) * 2016-06-14 2019-02-15 泰山学院 Multi-party quantum key agreement method based on one-way transmission circuit
CN108923914A (en) * 2018-06-21 2018-11-30 西北大学 A kind of quantum key delivering method based on 4 Particle Cluster states
CN108768645A (en) * 2018-07-31 2018-11-06 西北大学 A kind of asymmetric quantum dialogue method of fault tolerant based on decoherence free subspace
CN108768645B (en) * 2018-07-31 2020-06-19 西北大学 Fault-tolerant asymmetric quantum conversation method based on decoherence-free subspace
CN109412797A (en) * 2018-11-05 2019-03-01 北京邮电大学 Cryptographic key negotiation method and client based on bit error rate judgement state base
CN110557250A (en) * 2019-09-12 2019-12-10 苏州大学 multi-party quantum key negotiation method based on four-particle x state
CN110557250B (en) * 2019-09-12 2021-07-02 苏州大学 Multi-party quantum key negotiation method based on four-particle x state
CN110932848A (en) * 2019-11-27 2020-03-27 苏州大学 Multi-party quantum key negotiation method based on non-maximum entanglement Bell state with known parameters
CN110932849A (en) * 2019-11-27 2020-03-27 苏州大学 Multi-party quantum key negotiation method based on parameter unknown non-maximum entangled Bell state
CN110932849B (en) * 2019-11-27 2021-07-27 苏州大学 Multi-party quantum key negotiation method based on parameter unknown non-maximum entangled Bell state
CN110932848B (en) * 2019-11-27 2021-08-24 苏州大学 Multi-party quantum key negotiation method based on non-maximum entanglement Bell state with known parameters
CN110912695B (en) * 2019-12-05 2020-08-04 成都信息工程大学 Quantum arbitration signature method and system based on six-particle invisible transmission state
CN110912695A (en) * 2019-12-05 2020-03-24 成都信息工程大学 Quantum arbitration signature method and system based on six-particle invisible transmission state
CN112332988A (en) * 2021-01-06 2021-02-05 成都信息工程大学 Agile quantum privacy query method based on anti-rotation noise
CN112332988B (en) * 2021-01-06 2021-03-16 成都信息工程大学 Agile quantum privacy query method based on anti-rotation noise
CN114697024A (en) * 2022-04-08 2022-07-01 北京邮电大学 Quantum privacy comparison method and system based on single photon and rotation encryption and storage medium
CN114697024B (en) * 2022-04-08 2022-09-16 北京邮电大学 Quantum privacy comparison method and system based on single photon and rotation encryption and storage medium

Also Published As

Publication number Publication date
CN105245332B (en) 2018-04-03

Similar Documents

Publication Publication Date Title
CN105245332A (en) Four-particle x state-based two-party quantum key agreement protocol
CN105227301A (en) Based on the quantum key agreement protocol of GHZ state
CN105245331A (en) Four-particle GHZ state-based two-party quantum key agreement protocol
CN105490804A (en) Two-party quantum key negotiation protocol based on three-particle GHZ state
CN107493168B (en) Quanta identity authentication method and its application method during quantum key distribution
CN106685654B (en) Quantum key distribution method with bidirectional identity authentication
CN106789009B (en) Multi-party quantum privacy comparison method based on d-level cat state and d-level Bell state entanglement exchange
CN103281328B (en) The anti-quantum dialogue method of correlation is measured based on single Quantum Entangled States
CN108092771A (en) A kind of anti-tamper controlled quantum safety direct communication method and system
CN105871544B (en) Two side&#39;s quantum privacy comparative approach based on five quantum bit Entangled States
CN108173654B (en) Two-party key agreement method and system based on half-quantum technology
CN106685659B (en) Quantum secret sharing method capable of resisting interception of retransmission, man-in-the-middle and entanglement attacks
CN103227800A (en) Quantum secure communication wiretap detection method based on five-qubit Cluster state
CN111901112A (en) Quantum secret information equal exchange method, system and application based on dense coding
CN111082937B (en) Bidirectional identity authentication method based on single photon
CN105227303A (en) GHZ-W state based on expansion communicates and identity authentication protocol with the determination secure quantum of quantum one-time pad
CN110635907A (en) Controlled quantum conversation method with identity authentication function based on GHZ-like state
CN110098929B (en) Two-party quantum privacy comparison method based on two-particle pure entangled state
CN110912695B (en) Quantum arbitration signature method and system based on six-particle invisible transmission state
CN109495262B (en) Quantum key distribution method with dense coding characteristic in quantum communication network
Wang et al. Multiparty controlled quantum secure direct communication with phase encryption
Yin et al. Two-step efficient quantum dialogue with three-particle entangled W state
CN107070643A (en) A kind of quantum key distribution device and method
Subramaniam et al. Limits on detecting eavesdropper in qkd protocols
CN109450630A (en) A kind of quantum safety direct communication method based on Omega state and ultra dense coding

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180403