CN105245332B - Two side's quantum key agreement protocols based on four particle χ states - Google Patents
Two side's quantum key agreement protocols based on four particle χ states Download PDFInfo
- Publication number
- CN105245332B CN105245332B CN201510688396.8A CN201510688396A CN105245332B CN 105245332 B CN105245332 B CN 105245332B CN 201510688396 A CN201510688396 A CN 201510688396A CN 105245332 B CN105245332 B CN 105245332B
- Authority
- CN
- China
- Prior art keywords
- alice
- bob
- sequence
- quantum
- state
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 239000002245 particle Substances 0.000 title claims abstract description 58
- 238000005259 measurement Methods 0.000 claims abstract description 44
- PCTMTFRHKVHKIS-BMFZQQSSSA-N (1s,3r,4e,6e,8e,10e,12e,14e,16e,18s,19r,20r,21s,25r,27r,30r,31r,33s,35r,37s,38r)-3-[(2r,3s,4s,5s,6r)-4-amino-3,5-dihydroxy-6-methyloxan-2-yl]oxy-19,25,27,30,31,33,35,37-octahydroxy-18,20,21-trimethyl-23-oxo-22,39-dioxabicyclo[33.3.1]nonatriaconta-4,6,8,10 Chemical compound C1C=C2C[C@@H](OS(O)(=O)=O)CC[C@]2(C)[C@@H]2[C@@H]1[C@@H]1CC[C@H]([C@H](C)CCCC(C)C)[C@@]1(C)CC2.O[C@H]1[C@@H](N)[C@H](O)[C@@H](C)O[C@H]1O[C@H]1/C=C/C=C/C=C/C=C/C=C/C=C/C=C/[C@H](C)[C@@H](O)[C@@H](C)[C@H](C)OC(=O)C[C@H](O)C[C@H](O)CC[C@@H](O)[C@H](O)C[C@H](O)C[C@](O)(C[C@H](O)[C@H]2C(O)=O)O[C@H]2C1 PCTMTFRHKVHKIS-BMFZQQSSSA-N 0.000 claims description 12
- 238000000034 method Methods 0.000 claims description 3
- 239000002096 quantum dot Substances 0.000 abstract description 10
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 abstract description 9
- 238000004891 communication Methods 0.000 description 15
- 238000001514 detection method Methods 0.000 description 5
- 230000009466 transformation Effects 0.000 description 4
- 238000012544 monitoring process Methods 0.000 description 3
- 229910000831 Steel Inorganic materials 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 230000003111 delayed effect Effects 0.000 description 2
- 238000001035 drying Methods 0.000 description 2
- 239000010959 steel Substances 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- ZPUCINDJVBIVPJ-LJISPDSOSA-N cocaine Chemical compound O([C@H]1C[C@@H]2CC[C@@H](N2C)[C@H]1C(=O)OC)C(=O)C1=CC=CC=C1 ZPUCINDJVBIVPJ-LJISPDSOSA-N 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003053 immunization Effects 0.000 description 1
- 230000005610 quantum mechanics Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Landscapes
- Optical Communication System (AREA)
- Optical Modulation, Optical Deflection, Nonlinear Optics, Optical Demodulation, Optical Logic Elements (AREA)
Abstract
The invention discloses a kind of two side's quantum key agreement protocols based on four particle χ states:Step 1:Alice and Bob consults the coding of quantum state;Step 2:Alice prepares n χ state | χ00>ABCDAnd all particles are divided into four orderly sequences, select 2m and inveigle photon insetion sequence to be sent to Bob;Step 3:Bob is gone to measure corresponding trick photon with correct measurement base, and measurement result is informed into Alice;Alice compares measurement result and inveigles the original state of photon, calculates error rate;Step 4 is performed if error rate is low, otherwise performs step 2;Step 4:Alice performs Bell measurements to particle, and Bob performs to sequence
Description
Technical Field
The invention belongs to the field of Quantum communication, and particularly relates to a Quantum key agreement (Quantum key agreement) protocol, in particular to a two-party Quantum key agreement protocol based on a four-particle x state.
Background
Quantum cryptography is a new technology for communication and network security, and the security of the quantum cryptography is ensured by the basic principle of quantum mechanics. Unlike traditional cryptography, which is mostly computational security, quantum cryptography enables unconditional security, thereby attracting much attention. The Quantum Key Agreement (QKA) protocol is a new important branch of quantum cryptography that allows participants to agree on a classical shared secret key over a public quantum channel, and the contributions of the participants are the same, and any one participant or a subset of participants cannot independently determine the shared key. By using a shared secret key established by a Quantum Key Agreement (QKA) protocol and an encryption algorithm of a one-time pad, two communication parties can realize unconditional and safe secret communication.
Most of the existing quantum key agreement protocols are based on single particle or Bell state, quantum key agreement yield numbers based on multi-particle entangled state, and they either can not resist external attacks such as Trojan horse and the like, are unsafe or have too low quantum bit rate.
D.S. Shen, W.P.Ma and L.L.Wang, in the paper "Two-party Quantum key arrangement with four-Quantum cluster states" (Quantum inf.Process.2014: 2313-2324), proposed a Two-party QKA protocol with higher Quantum bit efficiency. The protocol comprises the following specific steps: first, both parties a and B each generate some four-particle cluster states. The correspondent a (correspondent B) inserts the sequence consisting of the third (first) particle in the cluster state into the decoy photon and sends it to the correspondent B (correspondent a), and retains and its particle sequence. Secondly, after both communication parties receive the corresponding particle sequences, eavesdropping monitoring is carried out together. Thirdly, the two communication parties perform their unitary transformation on the received particle sequences. And then after inserting the decoy photons, sending the decoy photons to each other. Fourthly, after both communication parties receive the corresponding particle sequences, the interception monitoring is carried out together. Fifth, the correspondent a (correspondent B) performs a respective unitary transformation on the sequence constituted by the first (third) particles in the cluster state. Then both sides perform cluster-based measurements on their respective cluster states, and both sides will obtain the same measurement result. And obtaining the shared secret key according to the correspondence of the codes and the measurement results. The protocol has the following defects: since the protocol is a Ping-Pong protocol, i.e., the same particle is transmitted back and forth in the quantum channel, the protocol cannot resist Invisible Photonic Eavesdropping (IPE) trojan attacks and delayed photonic trojan attacks.
In the paper "Quantum key element against noise collection coherence" (int.j. The. Theor. Phys.2014: 2891-2901), the two-party QKA protocol capable of immunizing combined noise is proposed by w.huang, q.su, x.wu, y.b.li and y.sun using the DF state of four particles. The protocol comprises the following specific steps: first, correspondent a generates two random bit strings, one as the individual contribution string of the shared key and one as the control string of the selected measurement basis. Secondly, the communication party A prepares a sequence of DF state of four particles according to the personal contribution string and the control string of the selected measuring base, inserts the decoy photon and sends the decoy photon to the communication party B. Thirdly, after the communication party B receives the DF state sequence of four particles, the two parties jointly execute eavesdropping monitoring. If detected, correspondent B publishes his personal contribution string sharing the key. Fourth, the correspondent a can calculate the shared secret key of both parties from the personal contribution strings of itself and the correspondent B. Fifth, correspondent a discloses his control string that selects the measurement basis. With this control string, the correspondent B can measure all DF states, and from the measurement result, the personal contribution string of the correspondent a's shared key can be obtained. Therefore, the communication party B can also calculate the shared secret key of both parties. The protocol has the following defects: the qubit efficiency of this protocol is too low, and its qubit efficiency is only 10%.
Disclosure of Invention
In view of the above drawbacks and deficiencies of the prior art, an object of the present invention is to provide a quantum key agreement protocol based on GHZ state.
In order to realize the task, the invention adopts the following technical scheme to solve the problem:
a two-party quantum key agreement protocol based on a four-particle x state specifically comprises the following steps:
step 1: alice and Bob negotiate the following quantum state encodings;
step 2: alice prepares n χ states | χ 00 > ABCD And the n x states | x are combined 00 > ABCD All particles of (a) are divided into four ordered sequences:
S A ={A 1 ,A 2 ,…,A n },S B ={B 1 ,B 2 ,…,B n },
S C ={C 1 ,C 2 ,…,C n and S D ={D 1 ,D 2 ,…,D n }
Wherein the sequence S A ,S B ,S C ,S D Respectively formed by each x state | x 00 > ABCD The particles A, B, C and D; alice selects from the set { |0>,|1>,|+>,|->, randomly selecting 2m decoy photons, and randomly inserting the 2m decoy photons into the sequence S C And S D Ensuring that m decoy photons are inserted into each sequence to respectively obtain a new sequence S' C And S' D (ii) a Alice self-retaining sequence S A And S B Prepared from sequence S' C And S' D Sending the data to Bob; n and m are positive integers greater than 1;
and step 3: when Bob receives the sequence S' C And S' D Then, the information is informed to Alice through a classical authentication channel; alice publishes that the decoy photon is at sequence S' C And S' D Is associated with the corresponding measurement basis 0>,|1> + { | +>,|-> bob measures the corresponding decoy photons by using the correct measurement basis and informs the measurement result to Alice through a classical authentication channel; alice compares the measurement result with the initial state of the decoy photon, and calculates the error rate; if the error rate is lower than the predefined threshold value, executing step 4, otherwise, executing step 2;
and 4, step 4: alice pair sequence S A And S B Bell measurements are performed for every two particles with the same sequence number, and Bob performs on the sequence S C And S D Every two particles with the same middle sequence number executeBase measurement; and according to the measurement results of Alice and Bob and the quantum state codes negotiated by Alice and Bob in the step 1, obtaining the same shared secret key with 2n bits by Alice and Bob respectively.
Further, in step 1, the encoding of the quantum state negotiated by Alice and Bob: i phi + > AB →00, |ψ - > AB →01,|ψ + > AB →10,|φ - > AB →11,|00> CD →00,|01> CD →01,|10> CD →10, |11> CD →11。
Further, in the step 2,
further, in the step 3, the threshold value is 0.1 to 0.2.
The invention has the beneficial effects that:
the two-party quantum key agreement protocol based on the four-particle x state can ensure that two communication parties can establish shared classical secret keys between the two communication parties in a public way; by using the classic secret key and the one-time pad encryption algorithm, two communication parties can realize unconditional and safe secret communication, and obviously, the invention can resist the existing participant attack and external attack. Since each particle in the protocol of the present invention is transmitted only once, an attacker also cannot successfully perform a trojan horse attack. The protocol was found by analysis to be secure not only on noiseless quantum channels, but it is also secure on quantum noise channels. In addition, the quantum bit efficiency of the protocol of the invention is higher than that of the existing safe quantum key agreement protocol based on the multi-particle entangled state.
Detailed Description
1. Preliminary knowledge
It is well known that { |0>,|1> forms Z base, { | +>,|-> forms an X group, wherein The four Bell states are defined as follows:
they form a set of completely orthogonal bases of four-dimensional Hilbert space, the Bell bases. The χ states are the most entangled states of the four particles, which form a set of completely orthogonal bases of 16-dimensional Hilbert space. In the protocol of the present invention we use a χ state as the quantum source, i.e., as follows
According to the expression, if x state is x 00 > ABCD Performing Bell measurements on particles A and B, and performing Bell measurements on particles C and DBased on the measurements, the system collapses to the state | φ with a probability of 1/4 + > AB |00> CD ,|ψ - > AB |01> CD ,|ψ + > AB |10> CD And | phi - > AB |11> CD 。
2. The invention relates to a two-party quantum key agreement protocol based on four-particle x state
The invention relates to a two-party quantum key agreement protocol based on a four-particle x state, which specifically comprises the following steps:
step 1: alice and Bob negotiate the encoding of the following quantum states: i phi + > AB →00,|ψ - > AB →01, |ψ + > AB →10,|φ - > AB →11,|00> CD →00,|01> CD →01,|10> CD →10,|11> CD →11。
And 2, step: alice prepares n χ states | χ 00 > ABCD And the n x states | x are combined 00 > ABCD All particles of (a) are divided into four ordered sequences:
S A ={A 1 ,A 2 ,…,A n },S B ={B 1 ,B 2 ,…,B n },
S C ={C 1 ,C 2 ,…,C n and S D ={D 1 ,D 2 ,…,D n }
Wherein the sequence S A ,S B ,S C ,S D Respectively formed by each x state | x 00 > ABCD The particles A, B, C and D; alice selects from the set { |0>,|1>,|+>,|->, randomly selecting 2m decoy photons, and randomly inserting the 2m decoy photons into the sequence S C And S D And ensuring that each sequence is just inserted with m decoy photons to respectively obtain a new sequence S' C And S' D (ii) a Alice self-retaining sequence S A And S B Prepared from sequence S' C And S' D Sending the data to Bob; n and m are positive integers greater than 1;
and step 3: when Bob received sequence S' C And S' D Then, the information is informed to Alice through a classical authentication channel; alice publishes that the decoy photon is at sequence S' C And S' D Is associated with the corresponding measurement basis 0>,|1> + { | +>,|-> bob measures the corresponding decoy photons by using the correct measurement basis and informs the measurement result to Alice through a classical authentication channel; alice compares the measurement result with the initial state of the decoy photon, and calculates the error rate; if the error rate is lower than the preset threshold value, executing the step 4, otherwise, executing the step 2; the threshold value is 0.1-0.2.
And 4, step 4: alice pair sequence S A And S B Bell measurements are performed for every two particles with the same sequence number, and Bob performs on the sequence S C And S D Every two particles with the same middle sequence number executeBase measurement; according to the measurement results of Alice and Bob and the amount negotiated by Alice and Bob in step 1Encoding of the sub-states, alice and Bob get the same shared secret key of 2n bits, respectively.
According toIt can be seen that the X state | X 00 > ABCD Performing Bell measurements on particles A and B, and performing Bell measurements on particles C and DBased on the measurements, the system collapses to the state | φ with a probability of 1/4 + > AB |00> CD ,|ψ - > AB |01> CD ,|ψ + > AB |10> CD And | phi - > AB |11> CD . Therefore, alice and Bob can get the same 2 n-bit shared key.
4 safety and efficiency analysis
A secure QKA protocol is not only resistant to external attacks, but also to participant attacks.
4.1 participant attack
We will now show that a dishonest participant cannot get this shared key alone. Without loss of generality, assuming that Alice is a dishonest participant, she wants the 2l bits in the shared secret to all be 0S, and she needs to use Bell-based measurement sequence S A And S B The corresponding pair of particles in (1). However, the measurement of each pair of particles is randomly | φ, depending on the nature of the quantum entangled state + > AB ,|ψ - > AB ,|ψ + > AB And | phi - > AB I.e., alice gets 00, 01, 10, or 11 with a 25% probability. Thus, every 2 bits of the 2l bits are randomly 00, 01, 10, or 11. Therefore, alice cannot decide independentlyAny one bit in the shared key. Therefore, the protocol is resistant to participant attacks.
4.2 external attacks
Assuming that Eve is an eavesdropper who wants to steal the shared key, there are possible ways she could attack: trojan horse attacks, measurement-replay attacks, interception-replay attacks, and entanglement-measurement attacks.
Trojan horse attack: in the present protocol, eve cannot successfully perform an Invisible Photonic Eavesdropping (IPE) trojan attack and a delayed photonic trojan attack because each photon in the quantum channel is transmitted only once.
Measurement-retransmission attack: eve can be on sequence S' C And S' D The particle in (a) performs a measurement-retransmission attack. However, the measurement of Eve will affect the sequence S' C And S' D The state of the decoy particles. In the second eavesdropping test, alice and Bob can detect the eavesdropping by 1- (3/4) m (m represents the number of decoy particles used to detect this attack) the Eve's attack was discovered.
Interception-retransmission attack: if Eve performs an intercept-retransmit attack, she first intercepts the sequence S' C And S' D And then send her forged sequence to Bob. When the agreement is over, she again matches sequence S' C And S' D The particles in (a) perform the corresponding measurements. However, eve does not know the position and initial state of the decoy particles, so her forged sequence cannot be monitored by eavesdropping in the second step. When m decoy particles are used to monitor this eavesdropping attack, the corresponding eavesdropping detection rate is 1- (1/2) m . Thus, the intercept-retransmit attack of Eve also fails.
Entanglement-measurement attack: eve can also de-entangle this transport particle (sequence S ') with its pre-prepared auxiliary particle' C And S' D Particles in) and then resends the transmitted particles to Bob. When the protocol is over, she measures the corresponding helper particles again, thereby extracting useful information about the shared key. However, eve does not know the location of the decoy photon before eavesdropping detection, and her entanglement operation U must also be performed on the decoy photon. And the decoy state becomes as followsTwo particle entangled states of:
U(|0>|E>)=a|0>|e 00 >+b|1>|e 01 >,
U(|1>|E>)=c|0>|e 10 >+d|1>|e 11 >,
wherein | e 00 >,|e 01 >,|e 10 >, & | e 11 >, is a pure state uniquely determined by the unitary transformation U, and | a; & gtis non-linear 2 +|b| 2 =1, |c| 2 +|d| 2 And =1. Obviously, the CNOT transform is a special case of unitary transform U. If Eve wants to detect by eavesdropping in the second step, eve's unitary transformation U must satisfy the conditions b = c =0 and a | e 00 >=d|e 11 &And (d) drying the steel. When equationWhen true, eve cannot distinguish the auxiliary photon a | e 00 >, and d | e 11 >, so that Eve cannot obtain useful information of the shared key by observing the auxiliary photons. However, if a | e 00 >≠d|e 11 &The attack of Eve will interfere with the decoy state | +> | -&And (d) drying the steel. Thus, eve's attack will be discovered by Alice and Bob. The eavesdropping detection rate of each decoy photon is:
4.3 Quantum noise channel
In quantum noise channels, the Quantum Bit Error Rate (QBER) τ introduced by the noise ranges approximately from 2% to 8.9%, depending on the channel conditions such as distance. If Eve's attack introduces a qubit error rate less than τ, she can hide her attack behavior with noise. According to the security analysis described above, the eavesdropping detection rate of each decoy photon in this protocol is at least 25%, which is much greater than τ. Therefore, choosing the appropriate eavesdropping detection threshold ensures that the protocol is also secure over quantum noise channels.
According to the above analysis, this protocol is secure over both noiseless quantum channels and quantum noise channels.
5 efficiency analysis
For a QKA protocol, the Cabello qubit efficiency is defined as:where c represents the number of classical bits negotiated and q represents the number of qubits used in the protocol. Thus, the qubit efficiency of our protocol is:wherein n represents the χ state | χ in the protocol 00 > ABCD M represents the number of decoy particles. Let m = n, we have
Claims (2)
1. A two-party quantum key negotiation method based on a four-particle x state is characterized by comprising the following steps:
step 1: alice and Bob negotiate the encoding of the following quantum states: i phi + > AB →00,|ψ - > AB →01,|ψ + > AB →10,|φ - > AB →11,|00> CD →00,|01> CD →01,|10> CD →10,|11> CD →11;
And 2, step: alice prepares n x states | x 00 > ABCD And the n x states | x |, are processed 00 > ABCD All particles of (a) are divided into four ordered sequences:
S A ={A 1 ,A 2 ,…,A n },S B ={B 1 ,B 2 ,…,B n },
S C ={C 1 ,C 2 ,…,C n and S D ={D 1 ,D 2 ,…,D n }
Wherein the sequence S A ,S B ,S C ,S D Respectively formed by each x state | x 00 > ABCD The particles A, B, C and D; alice selects from the set { |0>,|1>,|+>,|-> } randomly selects 2m decoy photons, and randomly inserts the 2m decoy photons into the sequence S C And S D Ensuring that m decoy photons are inserted into each sequence to respectively obtain a new sequence S' C And S' D (ii) a Alice self-retaining sequence S A And S B Prepared from sequence S' C And S' D Sending the data to Bob; n and m are positive integers greater than 1;
and step 3: when Bob received sequence S' C And S' D Then, the information is informed to Alice through a classical authentication channel; alice publishes that the decoy photon is at sequence S' C And S' D With the corresponding measurement basis 0>,|1> + { | +>,|-> }; bob measures the corresponding decoy photons by using the correct measurement basis and informs the measurement result to Alice through a classical authentication channel; alice compares the measurement result with the initial state of the decoy photon, and calculates the error rate; if the error rate is lower than the predefined threshold value, executing step 4, otherwise, executing step 2;
and 4, step 4: alice pair sequence S A And S B Every two of the same medium serial numbersBell measurements are performed for each particle, while Bob performs measurements on the sequence S C And S D Every two particles with the same middle sequence number executeBase measurement; according to the measurement results of Alice and Bob and the quantum state codes negotiated by Alice and Bob in the step 1, alice and Bob respectively obtain the same shared secret key with 2n bits;
2. the method of claim 1, wherein in step 3, the threshold value is 0.1-0.2.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510688396.8A CN105245332B (en) | 2015-10-21 | 2015-10-21 | Two side's quantum key agreement protocols based on four particle χ states |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510688396.8A CN105245332B (en) | 2015-10-21 | 2015-10-21 | Two side's quantum key agreement protocols based on four particle χ states |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105245332A CN105245332A (en) | 2016-01-13 |
CN105245332B true CN105245332B (en) | 2018-04-03 |
Family
ID=55042845
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510688396.8A Expired - Fee Related CN105245332B (en) | 2015-10-21 | 2015-10-21 | Two side's quantum key agreement protocols based on four particle χ states |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105245332B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113489550A (en) * | 2021-07-02 | 2021-10-08 | 浙江工商大学 | Quantum encryption quantum conversation method based on single photon with polarization and empty mode freedom degrees |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105846999B (en) * | 2016-06-14 | 2019-02-15 | 泰山学院 | Multi-party quantum key agreement method based on one-way transmission circuit |
CN108923914B (en) * | 2018-06-21 | 2020-05-08 | 西北大学 | Quantum key distribution method based on 4-particle cluster state |
CN108768645B (en) * | 2018-07-31 | 2020-06-19 | 西北大学 | Fault-tolerant asymmetric quantum conversation method based on decoherence-free subspace |
CN109412797B (en) * | 2018-11-05 | 2020-09-25 | 北京捷安通科技有限公司 | Key negotiation method and client based on bit error rate decision state base |
CN110557250B (en) * | 2019-09-12 | 2021-07-02 | 苏州大学 | Multi-party quantum key negotiation method based on four-particle x state |
CN110932849B (en) * | 2019-11-27 | 2021-07-27 | 苏州大学 | Multi-party quantum key negotiation method based on parameter unknown non-maximum entangled Bell state |
CN110932848B (en) * | 2019-11-27 | 2021-08-24 | 苏州大学 | Multi-party quantum key negotiation method based on non-maximum entanglement Bell state with known parameters |
CN110912695B (en) * | 2019-12-05 | 2020-08-04 | 成都信息工程大学 | Quantum arbitration signature method and system based on six-particle invisible transmission state |
CN112332988B (en) * | 2021-01-06 | 2021-03-16 | 成都信息工程大学 | Agile quantum privacy query method based on anti-rotation noise |
CN114697024B (en) * | 2022-04-08 | 2022-09-16 | 北京邮电大学 | Quantum privacy comparison method and system based on single photon and rotation encryption and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103248628A (en) * | 2013-05-15 | 2013-08-14 | 北京邮电大学 | Quantum safety communication eavesdropping detection method based on four-particle W state |
CN103281176A (en) * | 2013-06-03 | 2013-09-04 | 浙江工商大学 | Non-information leakage controlled quantum conversation protocol based on using entanglement exchange measurement correlation and reducing transmission efficiency |
CN103297226A (en) * | 2013-06-03 | 2013-09-11 | 浙江工商大学 | Controlled bi-directional quantum secure direct communication protocol free of information leakage |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101314210B1 (en) * | 2009-11-24 | 2013-10-02 | 한국전자통신연구원 | A method of User-authenticated Quantum Key Distribution |
-
2015
- 2015-10-21 CN CN201510688396.8A patent/CN105245332B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103248628A (en) * | 2013-05-15 | 2013-08-14 | 北京邮电大学 | Quantum safety communication eavesdropping detection method based on four-particle W state |
CN103281176A (en) * | 2013-06-03 | 2013-09-04 | 浙江工商大学 | Non-information leakage controlled quantum conversation protocol based on using entanglement exchange measurement correlation and reducing transmission efficiency |
CN103297226A (en) * | 2013-06-03 | 2013-09-11 | 浙江工商大学 | Controlled bi-directional quantum secure direct communication protocol free of information leakage |
Non-Patent Citations (1)
Title |
---|
《Multiparty Quantum Key Agreement with GHZ State》;Kuan-Hung Chen等;《2015 IEEE International Conference on Systems, Man, and Cybernetics》;20151012;全文 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113489550A (en) * | 2021-07-02 | 2021-10-08 | 浙江工商大学 | Quantum encryption quantum conversation method based on single photon with polarization and empty mode freedom degrees |
CN113489550B (en) * | 2021-07-02 | 2022-07-01 | 浙江工商大学 | Quantum encryption quantum conversation method based on single photon with polarization and empty mode freedom degrees |
Also Published As
Publication number | Publication date |
---|---|
CN105245332A (en) | 2016-01-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105245332B (en) | Two side's quantum key agreement protocols based on four particle χ states | |
CN105490804B (en) | Two side's quantum key agreement protocols based on three ions | |
CN105227301B (en) | Quantum key agreement protocol based on GHZ states | |
Zhu et al. | Secure direct communication based on secret transmitting order of particles | |
Long et al. | Theoretically efficient high-capacity quantum-key-distribution scheme | |
CN106789009B (en) | Multi-party quantum privacy comparison method based on d-level cat state and d-level Bell state entanglement exchange | |
Xia et al. | Controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding | |
CN109327308B (en) | Quantum key distribution method and system with bidirectional identity authentication function | |
Shi | Bidirectional quantum secure communication scheme based on Bell states and auxiliary particles | |
CN108809644B (en) | Disorder high-capacity multiparty quantum key negotiation method based on high-energy level bell state | |
Dong et al. | Controlled three-party communication using GHZ-like state and imperfect Bell-state measurement | |
CN105245331B (en) | Two side's quantum key agreement protocols based on four particle GHZ states | |
CN106789021B (en) | Quantum grouping multi-user secret comparison method based on five-particle Brown state | |
Dehkordi et al. | Threshold quantum secret sharing between multiparty and multiparty using Greenberger–Horne–Zeilinger state | |
Li et al. | Improved eavesdropping detection strategy based on four-particle cluster state in quantum direct communication protocol | |
Yuan et al. | Deterministic secure four-qubit GHZ states three-step protocol for quantum communication | |
Wang et al. | Three-party quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom | |
CN111654373B (en) | Multipartite quantum privacy comparison method based on entanglement exchange between Bell entangled states of d-level quantum system | |
Gao et al. | A ping-pong quantum dialogue scheme using genuine four-particle entangled states | |
Crawford et al. | Quantum authentication: current and future research directions | |
Li et al. | Improved quantum “Ping-pong” protocol based on GHZ state and classical XOR operation | |
Gan | Quantum key distribution scheme with high efficiency | |
Yin et al. | Efficient quantum dialogue without information leakage | |
Xia et al. | Quantum dialogue using non-maximally entangled states based on entanglement swapping | |
CN110932849B (en) | Multi-party quantum key negotiation method based on parameter unknown non-maximum entangled Bell state |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180403 |