CN105490804A - Two-party quantum key negotiation protocol based on three-particle GHZ state - Google Patents
Two-party quantum key negotiation protocol based on three-particle GHZ state Download PDFInfo
- Publication number
- CN105490804A CN105490804A CN201510687524.7A CN201510687524A CN105490804A CN 105490804 A CN105490804 A CN 105490804A CN 201510687524 A CN201510687524 A CN 201510687524A CN 105490804 A CN105490804 A CN 105490804A
- Authority
- CN
- China
- Prior art keywords
- bob
- alice
- base
- sequence
- measurement
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 239000002245 particle Substances 0.000 title claims abstract description 77
- 238000005259 measurement Methods 0.000 claims abstract description 57
- 150000002500 ions Chemical class 0.000 claims description 12
- 238000004364 calculation method Methods 0.000 claims description 3
- 239000002096 quantum dot Substances 0.000 abstract description 10
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 abstract description 8
- 238000004891 communication Methods 0.000 description 21
- 230000009466 transformation Effects 0.000 description 5
- 238000004458 analytical method Methods 0.000 description 4
- 238000012544 monitoring process Methods 0.000 description 4
- 238000012795 verification Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000000034 method Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- ZPUCINDJVBIVPJ-LJISPDSOSA-N cocaine Chemical compound O([C@H]1C[C@@H]2CC[C@@H](N2C)[C@H]1C(=O)OC)C(=O)C1=CC=CC=C1 ZPUCINDJVBIVPJ-LJISPDSOSA-N 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000036039 immunity Effects 0.000 description 1
- 230000005610 quantum mechanics Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Optical Communication System (AREA)
Abstract
The present invention discloses a two-party quantum key negotiation protocol based on a three-particle GHZ state, comprising the following steps: step 1: Alice and Bob negotiate codes of quantum states; step 2: Alice prepares n+q GHZ states and divides all the particles into sequences; Alice sends a sequence SC to Bob; step 3: Bob selects and measures q sample particle(s); Alice selects measurement bases to measure corresponding particles; Bob calculates an error rate; and if the error rate is low, step 4 is performed, otherwise step 2 is performed; step 4: Alice performs a Bell measurement on two particles with the same sequence number in the sequences; Bob performs X-base measurement on the particles in the sequences; and Alice and Bob respectively obtain the same shared key according to measurement results and the codes of the quantum states. According to the present invention, the two-party quantum key negotiation protocol can resist existing participant attacks and external attacks as well as Trojan horse attacks, is safe in noiseless quantum channels and quantum noise channels, and can achieve a relatively high quantum bit efficiency.
Description
Technical field
The invention belongs to quantum communications field, be specifically related to a kind of quantum key and consult (Quantumkeyagreement) agreement, particularly a kind of two side's quantum key agreement protocols based on three ions.
Background technology
Quantum cryptography is the new technology of communication and network security, and its fail safe is ensured by fundamental principles of quantum mechanics.Be the different of computationally secure mostly from conventional cipher, quantum cryptography can realize unconditional security, has attracted a large amount of concern thus.It is the new important branch of of quantum cryptography that quantum key consults (QKA) agreement, it allows participant to consult a classical shared secret key by disclosed quantum channel, and the contribution of each participant is identical, the subset that any one participant or participant are formed all can not independently determine this shared key.Utilization sub-key consults the shared secret key of (QKA) agreement foundation and the cryptographic algorithm of one-time pad, and communicating pair can realize the secure communication of unconditional security.
Existing most of quantum key agreement protocol is based on single-particle or Bell state, based on multiparticle Entangled State quantum key agreement can be counted on one's fingers, and they or the external attacks such as Te Luoyi wooden horse can not be resisted, be unsafe, or quantum bit rate is too low.
D.S.Shen, W.P.MaandL.L.Wang utilizes the Cluster State of four particles to propose a both sides QKA agreement in paper " Two-partyquantumkeyagreementwithfour-qubitclusterstates " (QuantumInf.Process.2014:2313-2324), and this agreement has the sub-bit efficiency of higher amount.The concrete steps of agreement are: the first, the Cluster State of some four particles of each self-generating of communicating pair A and B.Communication party A (communication party B) issues communication party B (communication party A) by being inserted after trick photon by the sequence that (first) particle is formed of the 3rd in Cluster State, and retains and its particle sequence.The second, after communicating pair receives corresponding particle sequence, perform eavesdropping monitoring together.3rd, the unitary transformation of the particle sequence execution that communicating pair just receives separately oneself.Then insert after inveigling photon and it is issued the other side mutually.4th, after communicating pair receives corresponding particle sequence, perform eavesdropping monitoring together.5th, communication party A (communication party B) performs respective unitary transformation to by the sequence that (the 3rd) particle is formed of first in Cluster State.Then both sides perform the measurement of cluster base to respective Cluster State, and both sides can obtain identical measurement result.The privacy key shared can be obtained according to coding and the correspondence of measurement result.This agreement Shortcomings part is: because this agreement is a Ping-Pong agreement, namely same particle has been transmitted one back and forth in quantum channel, and therefore this agreement cannot be resisted invisible photon eavesdropping (IPE) Trojan attack and be postponed photon Trojan attack.
W.Huang, Q.Su, X.Wu, Y.B.LiandY.Sun utilize the DF state of four particles to propose the both sides QKA agreement of an energy immunity associating noise in paper " Quantumkeyagreementagainstcollectivedecoherence " (Int.J.Theor.Phys.2014:2891-2901).The concrete steps of agreement are: the first, and communication party A generates two random bit strings, and an individual as shared key contributes string, and one as selecting the control string measuring base.The second, communication party A contributes string and selection to measure the sequence of the DF state of control string preparation four particles of base according to individual, and issues communication party B after inserting trick photon.3rd, after communication party B receives the sequence of DF state of four particles, both sides perform eavesdropping monitoring jointly.If by detecting, the individual that communication party B announces his shared key contributes string.4th, communication party A contributes string according to oneself and the individual of communication party B, can calculate the shared secret key of both sides.The control string of base is measured in 5th, the communication party A selection disclosing him.Utilize this to control string, communication party B can measure all DF states, and the individual that can obtain the shared key of communication party A according to measurement result contributes string.Therefore, communication party B also can calculate the shared secret key of both sides.This agreement Shortcomings part is: the quantum bit efficiency of this agreement is too low, and its quantum bit efficiency is only 10%.
Summary of the invention
For the defect existed in above-mentioned prior art or deficiency, the object of the invention is to, a kind of two side's quantum key agreement protocols based on three ions are provided.
In order to realize above-mentioned task, the present invention adopts following technical scheme to be solved:
Based on two side's quantum key agreement protocols of three ions, specifically comprise the steps:
Step 1:Alice and Bob consults the coding of quantum state; | φ
+>
aB→ 0, | φ
->
aB→ 1, |+>
c→ 0, |->
c→ 1;
Step 2:Alice prepares n+q GHZ state | η >
aBC, and all particles are divided into three orderly sequences:
S
a={ A
1, A
2..., A
n+q, S
b={ B
1, B
2..., B
n+qand S
c={ C
1, C
2..., C
n+q,
Wherein sequence S
a, S
b, S
crespectively by each GHZ state | η >
aBCparticle A, B, C form; Alice oneself reservation queue S
aand S
b, by sequence S
csend to Bob; N, q are the positive integer being greater than 1;
Step 3: when Bob receives sequence S
c, at random from sequence S
cin select q sample particles, select Z base or X base to measure at random to this q sample particles; Then, Bob by this q sample particles at sequence S
cin position and corresponding base of measuring tell Alice; Alice selects the measurement base of oneself according to the measurement base of Bob, and measures sequence S with the measurement base of oneself
aand S
bin corresponding particle, then measurement result is informed Bob by classical authenticated channel; Bob compares the measurement result of two people, and according to the measurement correlation calculations error rate of GHZ state; If error rate is lower than prespecified limit gate value, then perform step 4, otherwise, perform step 2;
Step 4:Alice is by sequence S
aand S
bin sample particles remove, obtain sequence S' respectively
aand S'
b; Bob is by sequence S
cin sample particles remove, obtain sequence S'
c;
S'
a=A '
1, A'
2..., A'
n, S'
b=B '
1, B'
2..., B'
nand S'
c=C '
1, C'
2..., C'
n;
Alice is to sequence S'
aand S'
btwo particles that middle sequence number is identical perform Bell and measure; Bob is to sequence S'
cin particle perform X base and measure; According to the coding of the quantum state that Alice and Bob in measurement result and step 1 consults, Alice and Bob obtains the shared key of identical n-bit respectively.
Further, in described step 1, described Alice and Bob consults being encoded to of quantum state: | φ
+>
aB→ 0, | φ
->
aB→ 1, |+>
c→ 0, |->
c→ 1.
Further, in described step 2,
Further, in described step 3, described Alice selects the measurement base of oneself specifically to refer to according to the measurement base of Bob: if the measurement base of Bob is Z base, then Alice selects
base (| 00>, | 01>, | 10>, | 11>}) as oneself measurement base; If the measurement base of Bob is X base, then Alice select Bell base (| φ
+>, | φ
->, | ψ
+>, | ψ
->}) as the measurement base of oneself.
Further, in described step 3, the measurement correlation of described GHZ state refers to:
According to above formula, if to GHZ state | η >
aBCparticle A and B perform
base is measured, and performs Z base measure particle C, then system with 1/2 probability be collapsed to state | 00>
aB| 0>
cwith | 11>
aB| 1>
c; If to GHZ state | η >
aBCparticle A and B perform Bell and measure, X base is performed to particle C and measures, then system with 1/2 probability be collapsed to state | φ
+>
aB|+>
cwith | φ
->
aB|->
c.
Further, in described step 3, described limit gate value gets 0.1 ~ 0.2.
Beneficial effect of the present invention:
Two side's quantum key agreement protocols based on three ions of the present invention can not only be resisted existing participant and attack and external attack, and can resist Trojan horse attack.And be all safe on noiseless quantum channel and quantum noise channel.Further, this agreement also can reach higher quantum bit efficiency.The present invention can guarantee that communicating pair sets up the classical privacy key shared between them liberally.Utilize the cryptographic algorithm of this classical privacy key and one-time pad, communicating pair can realize the secure communication of unconditional security.
Embodiment
1, pre-knowledge
As everyone knows, | 0>, | 1>} defines Z base, |+>, |->} defines X base, wherein
four Bell state are defined as follows:
They form one group of complete orthogonal basis in four-dimensional Hilbert space.GHZ state is the maximal entangled state of three particles, they form one group of complete orthogonal basis in octuple Hilbert space.In agreement of the present invention, we use a following GHZ state as quantum information source, namely
According to expression formula, if to GHZ state | η >
aBCparticle A and B perform Bell and measure, X base is performed to particle C and measures, then system with 1/2 probability be collapsed to state | φ
+>
aB|+>
cwith | φ
->
aB|->
c.
2, quantum key agreement protocol of the present invention
Two side's quantum key agreement protocols based on three ions of the present invention, specifically comprise the steps:
Step 1:Alice and Bob consults the coding of following quantum state: | φ
+>
aB→ 0, | φ
->
aB→ 1, |+>
c→ 0, |->
c→ 1;
Step 2:Alice prepares n+q GHZ state | η >
aBC, and all particles are divided into three orderly sequences:
S
a={ A
1, A
2..., A
n+q, S
b={ B
1, B
2..., B
n+qand S
c={ C
1, C
2..., C
n+q,
Wherein sequence S
a, S
b, S
crespectively by each GHZ state | η >
aBCparticle A, B, C form; Alice oneself reservation queue S
aand S
b, by sequence S
csend to Bob; N, q are the positive integer being greater than 1; Such as, n=64.
Step 3: when Bob receives sequence S
c, at random from sequence S
cin select q sample particles, select Z base or X base to measure at random to this q sample particles; Then, Bob by this q sample particles at sequence S
cin position and corresponding base of measuring tell Alice; Alice selects the measurement base of oneself according to the measurement base of Bob, and measures sequence S with the measurement base of oneself
aand S
bin corresponding particle, then measurement result is informed Bob by classical authenticated channel; Bob compares the measurement result of two people, and according to the measurement correlation calculations error rate of GHZ state; If error rate is lower than prespecified limit gate value, then perform step 4, otherwise, perform step 2;
Described limit gate value gets 0.1 ~ 0.2.
Above-mentioned Alice selects the measurement base of oneself specifically to refer to according to the measurement base of Bob: if the measurement base of Bob is Z base, then Alice selects
base (| 00>, | 01>, | 10>, | 11>}) as oneself measurement base; If the measurement base of Bob is X base, then Alice select Bell base (| φ
+>, | φ
->, | ψ
+>, | ψ
->}) as the measurement base of oneself.
The measurement correlation of above-mentioned GHZ state refers to:
According to above formula, if to GHZ state | η >
aBCparticle A and B perform
base is measured, and performs Z base measure particle C, then system with 1/2 probability be collapsed to state | 00>
aB| 0>
cwith | 11>
aB| 1>
c; If to GHZ state | η >
aBCparticle A and B perform Bell and measure, X base is performed to particle C and measures, then system with 1/2 probability be collapsed to state | φ
+>
aB|+>
cwith | φ
->
aB|->
c.
Step 4:Alice is by sequence S
aand S
bin sample particles remove, obtain sequence S' respectively
aand S'
b; Bob is by sequence S
cin sample particles remove, obtain sequence S'
c;
S'
a=A '
1, A'
2..., A'
n, S'
b=B '
1, B'
2..., B'
nand S'
c=C '
1, C'
2..., C'
n;
Alice is to sequence S'
aand S'
btwo particles that middle sequence number is identical perform Bell and measure; Bob is to sequence S'
cin particle perform X base and measure; According to the coding of the quantum state that Alice and Bob in measurement result and step 1 consults, Alice and Bob obtains the shared key of identical n-bit respectively.
According to
expressed measurement correlation is known, and the shared key that Alice and Bob obtains is identical.
4 fail safes and efficiency analysis
The QKA agreement of a safety can not only resist external attack, and can resist participant's attack.
4.1 participants attack
Below, explanation dishonest participant can not be obtained alone this shared key by us.Without loss of generality, suppose that Alice is a dishonest participant, she wants to allow the l bit in shared key be 0, and she needs to measure sequence S' with Bell base
aand S'
bin corresponding l to particle.But according to the characteristic of Quantum Entangled States, what measurement result was random is | φ
+>
aBwith | φ
->
aB, namely Alice with 50% probability obtain 0 or 1.Therefore, every in l bit random is 0 or 1.So Alice cannot any one bit in Independent Decisiveness shared key.So this agreement can be resisted participant and be attacked.
4.2 external attack
Suppose that Eve is a listener-in wanting to steal shared key, the possible method that she attacks has: Trojan horse attack, measurement-multi-sending attack, intercepting and capturing-multi-sending attack and tangle-measure attack.
Trojan horse attack: in this agreement, because each photon in quantum channel is only transmitted once, therefore Eve successfully can not perform invisible photon eavesdropping (IPE) Trojan attack and postpone photon Trojan attack.
Measurement-multi-sending attack: Eve can to sequence S
cin particle perform measurement-multi-sending attack.But the measurement of Eve will affect sequence S
a, S
band S
cthe state of middle sample particles, makes no longer to meet between corresponding three particles to tangle correlation.In the eavesdropping of second step detects, Alice and Bob can with 1-(3/4)
mthe probability of (m represents the quantity for detecting the sample GHZ state that this is attacked) finds the attack of Eve.
Intercepting and capturing-multi-sending attack: if Eve performs intercepting and capturing-multi-sending attack, first she intercept and capture sequence S
c, then send her forgery sequence to Bob.After agreement terminates, she is again to sequence S
cin particle perform corresponding measurement.But, the sequence S that the particle in the sequence that Eve forges and Alice retain
aand S
bin corresponding particle do not meet and tangle correlation, therefore not by the safety monitoring of second step.When m sample GHZ state is used to monitor this eavesdropping attack, corresponding eavesdropping verification and measurement ratio is 1-(1/2)
m.Therefore, the intercepting and capturing-multi-sending attack of Eve also have failed.
Tangle-measure attack: Eve also can go to tangle this transmission particle (sequence S with oneself pre-prepd auxiliary particle
cin particle), then transmission particle is issued Bob again.After agreement terminates, she measures corresponding auxiliary particle again, thus extracts the useful information about shared key.If tangling of Eve is operating as U, and there is U (| 0>|E>)=a|0>|e
00>+b|1>|e
01> and U (| 1>|E>)=c|0>|e
10>+d|1>|e
11> sets up, wherein | and e
00>, | e
01>, | e
10> and | e
11> is by the well-determined pure state of unitary transformation U, and | a|
2+ | b|
2=1, | c|
2+ | d|
2=1.Obviously, CNOT conversion is the special circumstances of unitary transformation U.GHZ state through Eve tangle operation after, system becomes:
If Eve wants to be detected by eavesdropping at second step, the unitary transformation U of Eve must satisfy condition b=c=0 and a|e
00>=d|e
11>.As equation a|e
00>=d|e
11when > sets up, Eve can not distinguish auxiliary photon a|e
00> and d|e
11>, thus Eve does not obtain the useful information of shared key by observing auxiliary photon.But, if a|e
00> ≠ d|e
11the attack of >, Eve will disturb sample state | η >
aBC.Therefore, the attack of Eve will be found by Alice and Bob.The eavesdropping verification and measurement ratio of each trick photon is:
4.3 quantum noise channels
In quantum noise channel, the span of quantum bit error rate (QBER) τ introduced by noise is similar at 2%-8.9%, and it depends on the situation of channel as factors such as distances.If the quantum bit error rate that the attack of Eve is introduced is less than τ, so she just can hide her attack with noise.According to above-mentioned safety analysis, in this agreement, the eavesdropping verification and measurement ratio of each trick photon is at least 25%, and it is much larger than τ.Therefore, suitable eavesdropping detectability gate value is selected can to guarantee that this agreement is also safe on quantum noise channel.
According to above-mentioned analysis, this agreement is all safe on noiseless quantum channel and quantum noise channel.
5 efficiency analysiss
For a QKA agreement, Cabello quantum bit efficiency is defined as:
wherein c represents the quantity of the classical bit of negotiation, the quantity of the quantum bit used in q presentation protocol.Therefore, our the quantum bit efficiency of agreement is:
the wherein quantity of GHZ state in n presentation protocol, m represents the quantity of the GHZ state as sample.Make m=n, Wo Menyou
Claims (6)
1., based on two side's quantum key agreement protocols of three ions, it is characterized in that, specifically comprise the steps:
Step 1:Alice and Bob consults the coding of quantum state; | φ
+>
aB→ 0, | φ
->
aB→ 1, |+>
c→ 0, |->
c→ 1;
Step 2:Alice prepares n+q GHZ state | η >
aBC, and all particles are divided into three orderly sequences:
S
a={ A
1, A
2..., A
n+q, S
b={ B
1, B
2..., B
n+qand S
c={ C
1, C
2..., C
n+q,
Wherein sequence S
a, S
b, S
crespectively by each GHZ state | η >
aBCparticle A, B, C form; Alice oneself reservation queue S
aand S
b, by sequence S
csend to Bob; N, q are the positive integer being greater than 1;
Step 3: when Bob receives sequence S
c, at random from sequence S
cin select q sample particles, select Z base or X base to measure at random to this q sample particles; Then, Bob by this q sample particles at sequence S
cin position and corresponding base of measuring tell Alice; Alice selects the measurement base of oneself according to the measurement base of Bob, and measures sequence S with the measurement base of oneself
aand S
bin corresponding particle, then measurement result is informed Bob by classical authenticated channel; Bob compares the measurement result of two people, and according to the measurement correlation calculations error rate of GHZ state; If error rate is lower than prespecified limit gate value, then perform step 4, otherwise, perform step 2;
Step 4:Alice is by sequence S
aand S
bin sample particles remove, obtain sequence S ' respectively
awith S '
b; Bob is by sequence S
cin sample particles remove, obtain sequence S '
c;
S '
a={ A
1', A '
2..., A '
n, S '
b={ B
1', B '
2..., B '
nand S '
c={ C
1', C '
2..., C '
n;
Alice is to sequence S '
awith S '
btwo particles that middle sequence number is identical perform Bell and measure; Bob is to sequence S '
cin particle perform X base and measure; According to the coding of the quantum state that Alice and Bob in measurement result and step 1 consults, Alice and Bob obtains the shared key of identical n-bit respectively.
2. as claimed in claim 1 based on two side's quantum key agreement protocols of three ions, it is characterized in that, in described step 1, described Alice and Bob consults being encoded to of quantum state: | φ
+>
aB→ 0, | φ
->
aB→ 1, |+>
c→ 0, |->
c→ 1.
3., as claimed in claim 1 based on two side's quantum key agreement protocols of three ions, it is characterized in that, in described step 2,
4. as claimed in claim 1 based on two side's quantum key agreement protocols of three ions, it is characterized in that, in described step 3, described Alice selects the measurement base of oneself specifically to refer to according to the measurement base of Bob: if the measurement base of Bob is Z base, then Alice selects
base (| 00>, | 01>, | 10>, | 11>}) as oneself measurement base; If the measurement base of Bob is X base, then Alice select Bell base (| φ
+>, | φ
->, | ψ
+>, | ψ
->}) as the measurement base of oneself.
5., as claimed in claim 1 based on two side's quantum key agreement protocols of three ions, it is characterized in that, in described step 3, the measurement correlation of described GHZ state refers to:
According to above formula, if to GHZ state | η >
aBCparticle A and B perform
base is measured, and performs Z base measure particle C, then system with 1/2 probability be collapsed to state | 00>
aB| 0>
cwith | 11>
aB| 1>
c; If to GHZ state | η >
aBCparticle A and B perform Bell and measure, X base is performed to particle C and measures, then system with 1/2 probability be collapsed to state | φ
+>
aB|+>
cwith | φ
->
aB|->
c.
6., as claimed in claim 1 based on two side's quantum key agreement protocols of three ions, it is characterized in that, in described step 3, described limit gate value gets 0.1 ~ 0.2.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510687524.7A CN105490804B (en) | 2015-10-21 | 2015-10-21 | Two side's quantum key agreement protocols based on three ions |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510687524.7A CN105490804B (en) | 2015-10-21 | 2015-10-21 | Two side's quantum key agreement protocols based on three ions |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105490804A true CN105490804A (en) | 2016-04-13 |
CN105490804B CN105490804B (en) | 2018-04-17 |
Family
ID=55677552
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510687524.7A Expired - Fee Related CN105490804B (en) | 2015-10-21 | 2015-10-21 | Two side's quantum key agreement protocols based on three ions |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105490804B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105846999A (en) * | 2016-06-14 | 2016-08-10 | 泰山学院 | Multi-side quantum secret key negotiation method based on unidirectional transmission loop |
CN105933114A (en) * | 2016-06-24 | 2016-09-07 | 苏州大学 | Quantum dialogue method for asymmetric capacity based on GHZ state and Bell state |
CN109150521A (en) * | 2018-10-22 | 2019-01-04 | 苏州大学张家港工业技术研究院 | The long-range real coefficient quantum state preparation method of probability based on unknown parameter GHZ channel |
CN109347567A (en) * | 2018-12-12 | 2019-02-15 | 暨南大学 | GHZ maximum tangles the entanglement concentration method and system of pure state |
CN110098930A (en) * | 2019-05-27 | 2019-08-06 | 成都信息工程大学 | A kind of two side's quantum key agreement methods and system based on Bell state |
CN110233732A (en) * | 2019-05-24 | 2019-09-13 | 西北大学 | A kind of dynamic quantum rotation gate proxy blind signing method based on cluster state |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100150349A1 (en) * | 2008-12-12 | 2010-06-17 | Electronics And Telecommunications Research Institute | Method and system for performing quantum bit commitment protocol |
US20110126011A1 (en) * | 2009-11-24 | 2011-05-26 | Electronics And Telecommunications Research Institute | Method of user-authenticated quantum key distribution |
CN102801518A (en) * | 2012-09-05 | 2012-11-28 | 浙江工商大学 | Quantum steganography protocol based on gigahertz (GHZ) state dense coding and entanglement exchange |
CN103297226A (en) * | 2013-06-03 | 2013-09-11 | 浙江工商大学 | Controlled bi-directional quantum secure direct communication protocol free of information leakage |
CN103338187A (en) * | 2013-06-03 | 2013-10-02 | 浙江工商大学 | Information leakage-free bidirectional quantum secure direct communication protocol based on any two gigahertz (GHZ) state/entanglement exchange result collection codes |
CN103888476A (en) * | 2014-04-14 | 2014-06-25 | 西北大学 | Quantum secure direct communication protocol based on three-particle GHZ entangled state |
-
2015
- 2015-10-21 CN CN201510687524.7A patent/CN105490804B/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100150349A1 (en) * | 2008-12-12 | 2010-06-17 | Electronics And Telecommunications Research Institute | Method and system for performing quantum bit commitment protocol |
US20110126011A1 (en) * | 2009-11-24 | 2011-05-26 | Electronics And Telecommunications Research Institute | Method of user-authenticated quantum key distribution |
CN102801518A (en) * | 2012-09-05 | 2012-11-28 | 浙江工商大学 | Quantum steganography protocol based on gigahertz (GHZ) state dense coding and entanglement exchange |
CN103297226A (en) * | 2013-06-03 | 2013-09-11 | 浙江工商大学 | Controlled bi-directional quantum secure direct communication protocol free of information leakage |
CN103338187A (en) * | 2013-06-03 | 2013-10-02 | 浙江工商大学 | Information leakage-free bidirectional quantum secure direct communication protocol based on any two gigahertz (GHZ) state/entanglement exchange result collection codes |
CN103888476A (en) * | 2014-04-14 | 2014-06-25 | 西北大学 | Quantum secure direct communication protocol based on three-particle GHZ entangled state |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105846999A (en) * | 2016-06-14 | 2016-08-10 | 泰山学院 | Multi-side quantum secret key negotiation method based on unidirectional transmission loop |
CN105846999B (en) * | 2016-06-14 | 2019-02-15 | 泰山学院 | Multi-party quantum key agreement method based on one-way transmission circuit |
CN105933114A (en) * | 2016-06-24 | 2016-09-07 | 苏州大学 | Quantum dialogue method for asymmetric capacity based on GHZ state and Bell state |
CN105933114B (en) * | 2016-06-24 | 2019-03-08 | 苏州大学 | The quantum dialogue method of asymmetric capacity based on GHZ state and Bell state |
CN109150521A (en) * | 2018-10-22 | 2019-01-04 | 苏州大学张家港工业技术研究院 | The long-range real coefficient quantum state preparation method of probability based on unknown parameter GHZ channel |
CN109150521B (en) * | 2018-10-22 | 2021-02-02 | 苏州大学 | Probability remote real coefficient quantum state preparation method based on unknown parameter GHZ channel |
CN109347567A (en) * | 2018-12-12 | 2019-02-15 | 暨南大学 | GHZ maximum tangles the entanglement concentration method and system of pure state |
CN109347567B (en) * | 2018-12-12 | 2021-07-20 | 暨南大学 | Entanglement concentration method and system for GHZ maximum entanglement pure state |
CN110233732A (en) * | 2019-05-24 | 2019-09-13 | 西北大学 | A kind of dynamic quantum rotation gate proxy blind signing method based on cluster state |
CN110098930A (en) * | 2019-05-27 | 2019-08-06 | 成都信息工程大学 | A kind of two side's quantum key agreement methods and system based on Bell state |
CN110098930B (en) * | 2019-05-27 | 2020-04-07 | 成都信息工程大学 | Bell state-based two-party quantum key negotiation method and system |
Also Published As
Publication number | Publication date |
---|---|
CN105490804B (en) | 2018-04-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105245332A (en) | Four-particle x state-based two-party quantum key agreement protocol | |
CN105227301B (en) | Quantum key agreement protocol based on GHZ states | |
CN105490804A (en) | Two-party quantum key negotiation protocol based on three-particle GHZ state | |
CN105245331B (en) | Two side's quantum key agreement protocols based on four particle GHZ states | |
CN106685654B (en) | Quantum key distribution method with bidirectional identity authentication | |
CN106888085B (en) | Multi-party quantum conversation method based on maximum entangled GHZ state | |
CN109327308B (en) | Quantum key distribution method and system with bidirectional identity authentication function | |
CN107493168B (en) | Quanta identity authentication method and its application method during quantum key distribution | |
CN106789009B (en) | Multi-party quantum privacy comparison method based on d-level cat state and d-level Bell state entanglement exchange | |
CN108092771A (en) | A kind of anti-tamper controlled quantum safety direct communication method and system | |
CN108173654B (en) | Two-party key agreement method and system based on half-quantum technology | |
Min et al. | Novel multi-party quantum key agreement protocol with g-like states and bell states | |
CN106685659B (en) | Quantum secret sharing method capable of resisting interception of retransmission, man-in-the-middle and entanglement attacks | |
CN105871544A (en) | Two-party quantum private comparison method based on five-quantum bit entangled state | |
CN103227800A (en) | Quantum secure communication wiretap detection method based on five-qubit Cluster state | |
Li et al. | Improved eavesdropping detection strategy based on four-particle cluster state in quantum direct communication protocol | |
CN111082937B (en) | Bidirectional identity authentication method based on single photon | |
CN110635907B (en) | Controlled quantum conversation method with identity authentication function based on GHZ-like state | |
CN105227303A (en) | GHZ-W state based on expansion communicates and identity authentication protocol with the determination secure quantum of quantum one-time pad | |
Gao et al. | A ping-pong quantum dialogue scheme using genuine four-particle entangled states | |
CN110098929B (en) | Two-party quantum privacy comparison method based on two-particle pure entangled state | |
CN109495262B (en) | Quantum key distribution method with dense coding characteristic in quantum communication network | |
Yin et al. | Two-step efficient quantum dialogue with three-particle entangled W state | |
CN111901112A (en) | Quantum secret information equal exchange method, system and application based on dense coding | |
Gan | Quantum key distribution scheme with high efficiency |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180417 |