CN105245332A - Four-particle x state-based two-party quantum key agreement protocol - Google Patents
Four-particle x state-based two-party quantum key agreement protocol Download PDFInfo
- Publication number
- CN105245332A CN105245332A CN201510688396.8A CN201510688396A CN105245332A CN 105245332 A CN105245332 A CN 105245332A CN 201510688396 A CN201510688396 A CN 201510688396A CN 105245332 A CN105245332 A CN 105245332A
- Authority
- CN
- China
- Prior art keywords
- alice
- bob
- sequence
- state
- quantum
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 239000002245 particle Substances 0.000 title claims abstract description 61
- 238000005259 measurement Methods 0.000 claims abstract description 27
- 238000003780 insertion Methods 0.000 claims description 3
- 230000037431 insertion Effects 0.000 claims description 3
- 239000002096 quantum dot Substances 0.000 abstract description 10
- PCTMTFRHKVHKIS-BMFZQQSSSA-N (1s,3r,4e,6e,8e,10e,12e,14e,16e,18s,19r,20r,21s,25r,27r,30r,31r,33s,35r,37s,38r)-3-[(2r,3s,4s,5s,6r)-4-amino-3,5-dihydroxy-6-methyloxan-2-yl]oxy-19,25,27,30,31,33,35,37-octahydroxy-18,20,21-trimethyl-23-oxo-22,39-dioxabicyclo[33.3.1]nonatriaconta-4,6,8,10 Chemical compound C1C=C2C[C@@H](OS(O)(=O)=O)CC[C@]2(C)[C@@H]2[C@@H]1[C@@H]1CC[C@H]([C@H](C)CCCC(C)C)[C@@]1(C)CC2.O[C@H]1[C@@H](N)[C@H](O)[C@@H](C)O[C@H]1O[C@H]1/C=C/C=C/C=C/C=C/C=C/C=C/C=C/[C@H](C)[C@@H](O)[C@@H](C)[C@H](C)OC(=O)C[C@H](O)C[C@H](O)CC[C@@H](O)[C@H](O)C[C@H](O)C[C@](O)(C[C@H](O)[C@H]2C(O)=O)O[C@H]2C1 PCTMTFRHKVHKIS-BMFZQQSSSA-N 0.000 abstract 1
- 238000004891 communication Methods 0.000 description 21
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 7
- 230000009466 transformation Effects 0.000 description 5
- 238000004458 analytical method Methods 0.000 description 4
- 238000012544 monitoring process Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000000034 method Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- ZPUCINDJVBIVPJ-LJISPDSOSA-N cocaine Chemical compound O([C@H]1C[C@@H]2CC[C@@H](N2C)[C@H]1C(=O)OC)C(=O)C1=CC=CC=C1 ZPUCINDJVBIVPJ-LJISPDSOSA-N 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000036039 immunity Effects 0.000 description 1
- 230000005610 quantum mechanics Effects 0.000 description 1
Landscapes
- Optical Modulation, Optical Deflection, Nonlinear Optics, Optical Demodulation, Optical Logic Elements (AREA)
- Optical Communication System (AREA)
Abstract
The invention discloses a four-particle x state-based two-party quantum key agreement protocol. The protocol includes following steps that: step 1, Alice and Bob negotiate on quantum-state codes; step 2, Alice prepares n x-state|x<00>>ABCD, and divides all the particles into four ordered sequences, and selects out 2m decoy photons and inserts the decoy photons into the sequences and transmits the sequences to Bob; step 3, Bob measures corresponding decoy photons with a correct measurement base, and informs Alice of measurement results; Alice compares the measurement results and the initial states of the decoy photons, and calculates an error rate, and executes step 4 if the error rate is low, otherwise, executes step 2; and step 4, Alice performs Bell measurement on the particles, Bob executes Z convolution Z-base measurement on the sequences, and Alice and Bob both obtain a shared key. The protocol of the invention can resist existing participant attacks, external attacks and Troy Trojan horse attacks; and the protocol is safe in a noise-free quantum channel and a quantum noise channel. The quantum bit efficiency of the protocol of the invention is higher than that of an existing secure multi-particle entangled state-based quantum key agreement protocol.
Description
Technical field
The invention belongs to quantum communications field, be specifically related to a kind of quantum key and consult (Quantumkeyagreement) agreement, particularly a kind of two side's quantum key agreement protocols based on four particle χ states.
Background technology
Quantum cryptography is the new technology of communication and network security, and its fail safe is ensured by fundamental principles of quantum mechanics.Be the different of computationally secure mostly from conventional cipher, quantum cryptography can realize unconditional security, has attracted a large amount of concern thus.It is the new important branch of of quantum cryptography that quantum key consults (QKA) agreement, it allows participant to consult a classical shared secret key by disclosed quantum channel, and the contribution of each participant is identical, the subset that any one participant or participant are formed all can not independently determine this shared key.Utilization sub-key consults the shared secret key of (QKA) agreement foundation and the cryptographic algorithm of one-time pad, and communicating pair can realize the secure communication of unconditional security.
Existing most of quantum key agreement protocol is based on single-particle or Bell state, based on multiparticle Entangled State quantum key agreement can be counted on one's fingers, and they or the external attacks such as Te Luoyi wooden horse can not be resisted, be unsafe, or quantum bit rate is too low.
D.S.Shen, W.P.MaandL.L.Wang utilizes the Cluster State of four particles to propose a both sides QKA agreement in paper " Two-partyquantumkeyagreementwithfour-qubitclusterstates " (QuantumInf.Process.2014:2313-2324), and this agreement has the sub-bit efficiency of higher amount.The concrete steps of agreement are: the first, the Cluster State of some four particles of each self-generating of communicating pair A and B.Communication party A (communication party B) issues communication party B (communication party A) by being inserted after trick photon by the sequence that (first) particle is formed of the 3rd in Cluster State, and retains and its particle sequence.The second, after communicating pair receives corresponding particle sequence, perform eavesdropping monitoring together.3rd, the unitary transformation of the particle sequence execution that communicating pair just receives separately oneself.Then insert after inveigling photon and it is issued the other side mutually.4th, after communicating pair receives corresponding particle sequence, perform eavesdropping monitoring together.5th, communication party A (communication party B) performs respective unitary transformation to by the sequence that (the 3rd) particle is formed of first in Cluster State.Then both sides perform the measurement of cluster base to respective Cluster State, and both sides can obtain identical measurement result.The privacy key shared can be obtained according to coding and the correspondence of measurement result.This agreement Shortcomings part is: because this agreement is a Ping-Pong agreement, namely same particle has been transmitted one back and forth in quantum channel, and therefore this agreement cannot be resisted invisible photon eavesdropping (IPE) Trojan attack and be postponed photon Trojan attack.
W.Huang, Q.Su, X.Wu, Y.B.LiandY.Sun utilize the DF state of four particles to propose the both sides QKA agreement of an energy immunity associating noise in paper " Quantumkeyagreementagainstcollectivedecoherence " (Int.J.Theor.Phys.2014:2891-2901).The concrete steps of agreement are: the first, and communication party A generates two random bit strings, and an individual as shared key contributes string, and one as selecting the control string measuring base.The second, communication party A contributes string and selection to measure the sequence of the DF state of control string preparation four particles of base according to individual, and issues communication party B after inserting trick photon.3rd, after communication party B receives the sequence of DF state of four particles, both sides perform eavesdropping monitoring jointly.If by detecting, the individual that communication party B announces his shared key contributes string.4th, communication party A contributes string according to oneself and the individual of communication party B, can calculate the shared secret key of both sides.The control string of base is measured in 5th, the communication party A selection disclosing him.Utilize this to control string, communication party B can measure all DF states, and the individual that can obtain the shared key of communication party A according to measurement result contributes string.Therefore, communication party B also can calculate the shared secret key of both sides.This agreement Shortcomings part is: the quantum bit efficiency of this agreement is too low, and its quantum bit efficiency is only 10%.
Summary of the invention
For the defect existed in above-mentioned prior art or deficiency, the object of the invention is to, a kind of quantum key agreement protocol based on GHZ state is provided.
In order to realize above-mentioned task, the present invention adopts following technical scheme to be solved:
Based on two side's quantum key agreement protocols of four particle χ states, specifically comprise the steps:
Step 1:Alice and Bob consults the coding of following quantum state;
Step 2:Alice prepares n χ state | χ
00>
aBCD, and by this n χ state | χ
00>
aBCDall particles be divided into four orderly sequences:
S
A={A
1,A
2,…,A
n},S
B={B
1,B
2,…,B
n},
S
c={ C
1, C
2..., C
nand S
d={ D
1, D
2..., D
n}
Wherein sequence S
a, S
b, S
c, S
drespectively by each χ state | χ
00>
aBCDparticle A, B, C, D form; Alice from set | 0>, | 1>, |+>, | select 2m in->} at random and inveigle photon, and by this 2m trick photon radom insertion sequence S
cand S
d, and ensure that inserting m in each sequence inveigles photon, obtains new sequence S' respectively
cand S'
d; Alice oneself reservation queue S
aand S
b, by sequence S'
cand S'
dsend to Bob; N, m are the positive integer being greater than 1;
Step 3: when Bob receives sequence S'
cand S'
dafter, inform Alice by classical authenticated channel; Alice announces and inveigles photon at sequence S'
cand S'
din position and corresponding measurement base | 0>, | 1>} or |+>, |->}; Bob goes to measure with correct measurement base and inveigles photon accordingly, and measurement result is informed Alice by classical authenticated channel; Alice compares and measures result and inveigles the initial condition of photon, mistake in computation rate; If error rate is lower than prespecified limit gate value, then perform step 4, otherwise, perform step 2;
Step 4:Alice is to sequence S
aand S
bevery two particles that middle sequence number is identical perform Bell and measure, and Bob is to sequence S
cand S
devery two particles that middle sequence number is identical perform
base is measured; According to the coding of the quantum state that Alice and Bob in the measurement result of Alice and Bob and step 1 consults, Alice and Bob obtains the shared key of identical 2n bit respectively.
Further, in described step 1, the coding of the quantum state that Alice and Bob consults: | φ
+>
aB→ 00, | ψ
->
aB→ 01, | ψ
+>
aB→ 10, | φ
->
aB→ 11, | 00>
cD→ 00, | 01>
cD→ 01, | 10>
cD→ 10, | 11>
cD→ 11.
Further, in described step 2,
Further, in described step 3, described limit gate value gets 0.1 ~ 0.2.
Beneficial effect of the present invention:
Two side's quantum key agreement protocols based on four particle χ states of the present invention can guarantee that communicating pair sets up the classical privacy key shared between them liberally; Utilize the cryptographic algorithm of this classical privacy key and one-time pad, communicating pair can realize the secure communication of unconditional security, and obvious the present invention can resist existing participant and attack and external attack.Because each particle in agreement of the present invention is only transmitted once, therefore assailant successfully can not perform Trojan horse attack.Find that this agreement is not only safe at noiseless quantum channel by analyzing, and it is also safe on quantum noise channel.In addition, the quantum bit efficiency of agreement of the present invention is higher than the existing safe quantum key agreement protocol based on multiparticle Entangled State.
Embodiment
1, pre-knowledge
As everyone knows, | 0>, | 1>} defines Z base, |+>, |->} defines X base, wherein
Four Bell state are defined as follows:
They form one group of complete orthogonal basis in four-dimensional Hilbert space, i.e. Bell base.χ state is the maximal entangled state of four particles, and they can form one group of complete orthogonal basis in 16 dimension Hilbert spaces.In agreement of the present invention, we use a following χ state as quantum information source, namely
According to expression formula, if to χ state | χ
00>
aBCDparticle A and B perform Bell measure, particle C and D is performed
base measure, then system with 1/4 probability be collapsed to state | φ
+>
aB| 00>
cD, | ψ
->
aB| 01>
cD, | ψ
+>
aB| 10>
cDwith | φ
->
aB| 11>
cD.
2, two side's quantum key agreement protocols based on four particle χ states of the present invention
Two side's quantum key agreement protocols based on four particle χ states of the present invention, specifically comprise the steps:
Step 1:Alice and Bob consults the coding of following quantum state: | φ
+>
aB→ 00, | ψ
->
aB→ 01, | ψ
+>
aB→ 10, | φ
->
aB→ 11, | 00>
cD→ 00, | 01>
cD→ 01, | 10>
cD→ 10, | 11>
cD→ 11.
Step 2:Alice prepares n χ state | χ
00>
aBCD, and by this n χ state | χ
00>
aBCDall particles be divided into four orderly sequences:
S
A={A
1,A
2,…,A
n},S
B={B
1,B
2,…,B
n},
S
c={ C
1, C
2..., C
nand S
d={ D
1, D
2..., D
n}
Wherein sequence S
a, S
b, S
c, S
drespectively by each χ state | χ
00>
aBCDparticle A, B, C, D form; Alice from set | 0>, | 1>, |+>, | select 2m in->} at random and inveigle photon, and by this 2m trick photon radom insertion sequence S
cand S
d, and ensure that just in time inserting m in each sequence inveigles photon, obtains new sequence S' respectively
cand S'
d; Alice oneself reservation queue S
aand S
b, by sequence S'
cand S'
dsend to Bob; N, m are the positive integer being greater than 1;
Step 3: when Bob receives sequence S'
cand S'
dafter, inform Alice by classical authenticated channel; Alice announces and inveigles photon at sequence S'
cand S'
din position and corresponding measurement base | 0>, | 1>} or |+>, |->}; Bob goes to measure with correct measurement base and inveigles photon accordingly, and measurement result is informed Alice by classical authenticated channel; Alice compares and measures result and inveigles the initial condition of photon, mistake in computation rate; If error rate is lower than prespecified limit gate value, then perform step 4, otherwise, perform step 2; Described limit gate value gets 0.1 ~ 0.2.
Step 4:Alice is to sequence S
aand S
bevery two particles that middle sequence number is identical perform Bell and measure, and Bob is to sequence S
cand S
devery two particles that middle sequence number is identical perform
base is measured; According to the coding of the quantum state that Alice and Bob in the measurement result of Alice and Bob and step 1 consults, Alice and Bob obtains the shared key of identical 2n bit respectively.
According to
Known, if to χ state | χ
00>
aBCDparticle A and B perform Bell measure, particle C and D is performed
base measure, then system with 1/4 probability be collapsed to state | φ
+>
aB| 00>
cD, | ψ
->
aB| 01>
cD, | ψ
+>
aB| 10>
cDwith | φ
->
aB| 11>
cD.Therefore, Alice and Bob can obtain the shared key of identical 2n bit.
4 fail safes and efficiency analysis
The QKA agreement of a safety can not only resist external attack, and can resist participant's attack.
4.1 participants attack
Below, explanation dishonest participant can not be obtained alone this shared key by us.Without loss of generality, suppose that Alice is a dishonest participant, she wants to allow the 2l bit in shared key be 0 entirely, and she needs to measure sequence S with Bell base
aand S
bin corresponding l to particle.But according to the characteristic of Quantum Entangled States, the measurement result of every a pair particle is all randomly | φ
+>
aB, | ψ
->
aB, | ψ
+>
aBwith | φ
->
aB, namely Alice with 25% probability obtain 00,01,10 or 11.Therefore, every 2 in 2l bit is 00,01,10 or 11 randomly.So Alice cannot any one bit in Independent Decisiveness shared key.So this agreement can be resisted participant and be attacked.
4.2 external attack
Suppose that Eve is a listener-in wanting to steal shared key, the possible method that she attacks has: Trojan horse attack, measurement-multi-sending attack, intercepting and capturing-multi-sending attack and tangle-measure attack.
Trojan horse attack: in this agreement, because each photon in quantum channel is only transmitted once, therefore Eve successfully can not perform invisible photon eavesdropping (IPE) Trojan attack and postpone photon Trojan attack.
Measurement-multi-sending attack: Eve can to sequence S'
cand S'
din particle perform measurement-multi-sending attack.But the measurement of Eve will affect sequence S'
cand S'
dthe state of middle trick particle.In the eavesdropping of second step detects, Alice and Bob can with 1-(3/4)
mthe probability of (m represents the quantity for detecting the trick particle that this is attacked) finds the attack of Eve.
Intercepting and capturing-multi-sending attack: if Eve performs intercepting and capturing-multi-sending attack, first she intercept and capture sequence S'
cand S'
d, then send her forgery sequence to Bob.After agreement terminates, she is again to sequence S'
cand S'
din particle perform corresponding measurement.But Eve does not also know position and the initial state of inveigling particle, and the sequence that therefore she forges can not be monitored by the eavesdropping of second step.When inveigling particle to be used to monitor this eavesdropping attack for m, corresponding eavesdropping verification and measurement ratio is 1-(1/2)
m.Therefore, the intercepting and capturing-multi-sending attack of Eve also have failed.
Tangle-measure attack: Eve also can go to tangle this transmission particle (sequence S' with oneself pre-prepd auxiliary particle
cand S'
din particle), then transmission particle is issued Bob again.After agreement terminates, she measures corresponding auxiliary particle again, thus extracts the useful information about shared key.But Eve is before eavesdropping detects and do not know to inveigle the position of photon, she tangles operation U and certainly also can be performed on trick photon.Further, state is inveigled to become following two particle Entangled State:
U(|0>|E>)=a|0>|e
00>+b|1>|e
01>,
U(|1>|E>)=c|0>|e
10>+d|1>|e
11>,
Wherein | e
00>, | e
01>, | e
10> and | e
11> is by the well-determined pure state of unitary transformation U, and | a|
2+ | b|
2=1, | c|
2+ | d|
2=1.Obviously, CNOT conversion is the special circumstances of unitary transformation U.If Eve wants to be detected by eavesdropping at second step, the unitary transformation U of Eve must satisfy condition b=c=0 and a|e
00>=d|e
11>.Work as equation
during establishment, Eve can not distinguish auxiliary photon a|e
00> and d|e
11>, thus Eve does not obtain the useful information of shared key by observing auxiliary photon.But, if a|e
00> ≠ d|e
11the attack of >, Eve will disturb trick state |+> and |->.Therefore, the attack of Eve will be found by Alice and Bob.The eavesdropping verification and measurement ratio of each trick photon is:
4.3 quantum noise channels
In quantum noise channel, the span of quantum bit error rate (QBER) τ introduced by noise is similar at 2%-8.9%, and it depends on the situation of channel as factors such as distances.If the quantum bit error rate that the attack of Eve is introduced is less than τ, so she just can hide her attack with noise.According to above-mentioned safety analysis, in this agreement, the eavesdropping verification and measurement ratio of each trick photon is at least 25%, and it is much larger than τ.Therefore, suitable eavesdropping detectability gate value is selected can to guarantee that this agreement is also safe on quantum noise channel.
According to above-mentioned analysis, this agreement is all safe on noiseless quantum channel and quantum noise channel.
5 efficiency analysiss
For a QKA agreement, Cabello quantum bit efficiency is defined as:
wherein c represents the quantity of the classical bit of negotiation, the quantity of the quantum bit used in q presentation protocol.Therefore, our the quantum bit efficiency of agreement is:
wherein χ state in n presentation protocol | χ
00>
aBCDquantity, m represents and inveigles the quantity of particle.Make m=n, Wo Menyou
Claims (4)
1., based on two side's quantum key agreement protocols of four particle χ states, it is characterized in that, specifically comprise the steps:
Step 1:Alice and Bob consults the coding of following quantum state;
Step 2:Alice prepares n χ state | χ
00>
aBCD, and by this n χ state | χ
00>
aBCDall particles be divided into four orderly sequences:
S
A={A
1,A
2,…,A
n},S
B={B
1,B
2,…,B
n},
S
c={ C
1, C
2..., C
nand S
d={ D
1, D
2..., D
n}
Wherein sequence S
a, S
b, S
c, S
drespectively by each χ state | χ
00>
aBCDparticle A, B, C, D form; Alice from set | 0>, | 1>, |+>, | select 2m in->} at random and inveigle photon, and by this 2m trick photon radom insertion sequence S
cand S
d, and ensure that inserting m in each sequence inveigles photon, obtains new sequence S' respectively
cand S'
d; Alice oneself reservation queue S
aand S
b, by sequence S'
cand S'
dsend to Bob; N, m are the positive integer being greater than 1;
Step 3: when Bob receives sequence S'
cand S'
dafter, inform Alice by classical authenticated channel; Alice announces and inveigles photon at sequence S'
cand S'
din position and corresponding measurement base | 0>, | 1>} or |+>, |->}; Bob goes to measure with correct measurement base and inveigles photon accordingly, and measurement result is informed Alice by classical authenticated channel; Alice compares and measures result and inveigles the initial condition of photon, mistake in computation rate; If error rate is lower than prespecified limit gate value, then perform step 4, otherwise, perform step 2;
Step 4:Alice is to sequence S
aand S
bevery two particles that middle sequence number is identical perform Bell and measure, and Bob is to sequence S
cand S
devery two particles that middle sequence number is identical perform
base is measured; According to the coding of the quantum state that Alice and Bob in the measurement result of Alice and Bob and step 1 consults, Alice and Bob obtains the shared key of identical 2n bit respectively.
2., as claimed in claim 1 based on two side's quantum key agreement protocols of four particle χ states, it is characterized in that, in described step 1, the coding of the quantum state that Alice and Bob consults: | φ
+>
aB→ 00, | ψ
->
aB→ 01, | ψ
+>
aB→ 10, | φ
->
aB→ 11, | 00>
cD→ 00, | 01>
cD→ 01, | 10>
cD→ 10, | 11>
cD→ 11.
3., as claimed in claim 1 based on two side's quantum key agreement protocols of four particle χ states, it is characterized in that, in described step 2,
4., as claimed in claim 1 based on two side's quantum key agreement protocols of four particle χ states, it is characterized in that, in described step 3, described limit gate value gets 0.1 ~ 0.2.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510688396.8A CN105245332B (en) | 2015-10-21 | 2015-10-21 | Two side's quantum key agreement protocols based on four particle χ states |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510688396.8A CN105245332B (en) | 2015-10-21 | 2015-10-21 | Two side's quantum key agreement protocols based on four particle χ states |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105245332A true CN105245332A (en) | 2016-01-13 |
CN105245332B CN105245332B (en) | 2018-04-03 |
Family
ID=55042845
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510688396.8A Expired - Fee Related CN105245332B (en) | 2015-10-21 | 2015-10-21 | Two side's quantum key agreement protocols based on four particle χ states |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105245332B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105846999A (en) * | 2016-06-14 | 2016-08-10 | 泰山学院 | Multi-side quantum secret key negotiation method based on unidirectional transmission loop |
CN108768645A (en) * | 2018-07-31 | 2018-11-06 | 西北大学 | A kind of asymmetric quantum dialogue method of fault tolerant based on decoherence free subspace |
CN108923914A (en) * | 2018-06-21 | 2018-11-30 | 西北大学 | A kind of quantum key delivering method based on 4 Particle Cluster states |
CN109412797A (en) * | 2018-11-05 | 2019-03-01 | 北京邮电大学 | Cryptographic key negotiation method and client based on bit error rate judgement state base |
CN110557250A (en) * | 2019-09-12 | 2019-12-10 | 苏州大学 | multi-party quantum key negotiation method based on four-particle x state |
CN110912695A (en) * | 2019-12-05 | 2020-03-24 | 成都信息工程大学 | Quantum arbitration signature method and system based on six-particle invisible transmission state |
CN110932849A (en) * | 2019-11-27 | 2020-03-27 | 苏州大学 | Multi-party quantum key negotiation method based on parameter unknown non-maximum entangled Bell state |
CN110932848A (en) * | 2019-11-27 | 2020-03-27 | 苏州大学 | Multi-party quantum key negotiation method based on non-maximum entanglement Bell state with known parameters |
CN112332988A (en) * | 2021-01-06 | 2021-02-05 | 成都信息工程大学 | Agile quantum privacy query method based on anti-rotation noise |
CN114697024A (en) * | 2022-04-08 | 2022-07-01 | 北京邮电大学 | Quantum privacy comparison method and system based on single photon and rotation encryption and storage medium |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113489550B (en) * | 2021-07-02 | 2022-07-01 | 浙江工商大学 | Quantum encryption quantum conversation method based on single photon with polarization and empty mode freedom degrees |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110126011A1 (en) * | 2009-11-24 | 2011-05-26 | Electronics And Telecommunications Research Institute | Method of user-authenticated quantum key distribution |
CN103248628A (en) * | 2013-05-15 | 2013-08-14 | 北京邮电大学 | Quantum safety communication eavesdropping detection method based on four-particle W state |
CN103281176A (en) * | 2013-06-03 | 2013-09-04 | 浙江工商大学 | Non-information leakage controlled quantum conversation protocol based on using entanglement exchange measurement correlation and reducing transmission efficiency |
CN103297226A (en) * | 2013-06-03 | 2013-09-11 | 浙江工商大学 | Controlled bi-directional quantum secure direct communication protocol free of information leakage |
-
2015
- 2015-10-21 CN CN201510688396.8A patent/CN105245332B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110126011A1 (en) * | 2009-11-24 | 2011-05-26 | Electronics And Telecommunications Research Institute | Method of user-authenticated quantum key distribution |
CN103248628A (en) * | 2013-05-15 | 2013-08-14 | 北京邮电大学 | Quantum safety communication eavesdropping detection method based on four-particle W state |
CN103281176A (en) * | 2013-06-03 | 2013-09-04 | 浙江工商大学 | Non-information leakage controlled quantum conversation protocol based on using entanglement exchange measurement correlation and reducing transmission efficiency |
CN103297226A (en) * | 2013-06-03 | 2013-09-11 | 浙江工商大学 | Controlled bi-directional quantum secure direct communication protocol free of information leakage |
Non-Patent Citations (1)
Title |
---|
KUAN-HUNG CHEN等: "《Multiparty Quantum Key Agreement with GHZ State》", 《2015 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS》 * |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105846999A (en) * | 2016-06-14 | 2016-08-10 | 泰山学院 | Multi-side quantum secret key negotiation method based on unidirectional transmission loop |
CN105846999B (en) * | 2016-06-14 | 2019-02-15 | 泰山学院 | Multi-party quantum key agreement method based on one-way transmission circuit |
CN108923914A (en) * | 2018-06-21 | 2018-11-30 | 西北大学 | A kind of quantum key delivering method based on 4 Particle Cluster states |
CN108768645A (en) * | 2018-07-31 | 2018-11-06 | 西北大学 | A kind of asymmetric quantum dialogue method of fault tolerant based on decoherence free subspace |
CN108768645B (en) * | 2018-07-31 | 2020-06-19 | 西北大学 | Fault-tolerant asymmetric quantum conversation method based on decoherence-free subspace |
CN109412797A (en) * | 2018-11-05 | 2019-03-01 | 北京邮电大学 | Cryptographic key negotiation method and client based on bit error rate judgement state base |
CN110557250A (en) * | 2019-09-12 | 2019-12-10 | 苏州大学 | multi-party quantum key negotiation method based on four-particle x state |
CN110557250B (en) * | 2019-09-12 | 2021-07-02 | 苏州大学 | Multi-party quantum key negotiation method based on four-particle x state |
CN110932848A (en) * | 2019-11-27 | 2020-03-27 | 苏州大学 | Multi-party quantum key negotiation method based on non-maximum entanglement Bell state with known parameters |
CN110932849A (en) * | 2019-11-27 | 2020-03-27 | 苏州大学 | Multi-party quantum key negotiation method based on parameter unknown non-maximum entangled Bell state |
CN110932849B (en) * | 2019-11-27 | 2021-07-27 | 苏州大学 | Multi-party quantum key negotiation method based on parameter unknown non-maximum entangled Bell state |
CN110932848B (en) * | 2019-11-27 | 2021-08-24 | 苏州大学 | Multi-party quantum key negotiation method based on non-maximum entanglement Bell state with known parameters |
CN110912695B (en) * | 2019-12-05 | 2020-08-04 | 成都信息工程大学 | Quantum arbitration signature method and system based on six-particle invisible transmission state |
CN110912695A (en) * | 2019-12-05 | 2020-03-24 | 成都信息工程大学 | Quantum arbitration signature method and system based on six-particle invisible transmission state |
CN112332988A (en) * | 2021-01-06 | 2021-02-05 | 成都信息工程大学 | Agile quantum privacy query method based on anti-rotation noise |
CN112332988B (en) * | 2021-01-06 | 2021-03-16 | 成都信息工程大学 | Agile quantum privacy query method based on anti-rotation noise |
CN114697024A (en) * | 2022-04-08 | 2022-07-01 | 北京邮电大学 | Quantum privacy comparison method and system based on single photon and rotation encryption and storage medium |
CN114697024B (en) * | 2022-04-08 | 2022-09-16 | 北京邮电大学 | Quantum privacy comparison method and system based on single photon and rotation encryption and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN105245332B (en) | 2018-04-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105245332A (en) | Four-particle x state-based two-party quantum key agreement protocol | |
CN105227301A (en) | Based on the quantum key agreement protocol of GHZ state | |
CN105245331A (en) | Four-particle GHZ state-based two-party quantum key agreement protocol | |
CN105490804A (en) | Two-party quantum key negotiation protocol based on three-particle GHZ state | |
CN107493168B (en) | Quanta identity authentication method and its application method during quantum key distribution | |
CN106685654B (en) | Quantum key distribution method with bidirectional identity authentication | |
CN106789009B (en) | Multi-party quantum privacy comparison method based on d-level cat state and d-level Bell state entanglement exchange | |
CN103281328B (en) | The anti-quantum dialogue method of correlation is measured based on single Quantum Entangled States | |
CN108092771A (en) | A kind of anti-tamper controlled quantum safety direct communication method and system | |
CN105871544B (en) | Two side's quantum privacy comparative approach based on five quantum bit Entangled States | |
CN108173654B (en) | Two-party key agreement method and system based on half-quantum technology | |
CN106685659B (en) | Quantum secret sharing method capable of resisting interception of retransmission, man-in-the-middle and entanglement attacks | |
CN103227800A (en) | Quantum secure communication wiretap detection method based on five-qubit Cluster state | |
CN111901112A (en) | Quantum secret information equal exchange method, system and application based on dense coding | |
CN111082937B (en) | Bidirectional identity authentication method based on single photon | |
CN105227303A (en) | GHZ-W state based on expansion communicates and identity authentication protocol with the determination secure quantum of quantum one-time pad | |
CN110635907A (en) | Controlled quantum conversation method with identity authentication function based on GHZ-like state | |
CN110098929B (en) | Two-party quantum privacy comparison method based on two-particle pure entangled state | |
CN110912695B (en) | Quantum arbitration signature method and system based on six-particle invisible transmission state | |
CN109495262B (en) | Quantum key distribution method with dense coding characteristic in quantum communication network | |
Wang et al. | Multiparty controlled quantum secure direct communication with phase encryption | |
Yin et al. | Two-step efficient quantum dialogue with three-particle entangled W state | |
CN107070643A (en) | A kind of quantum key distribution device and method | |
Subramaniam et al. | Limits on detecting eavesdropper in qkd protocols | |
CN109450630A (en) | A kind of quantum safety direct communication method based on Omega state and ultra dense coding |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180403 |