CN105490804A - Two-party quantum key negotiation protocol based on three-particle GHZ state - Google Patents

Two-party quantum key negotiation protocol based on three-particle GHZ state Download PDF

Info

Publication number
CN105490804A
CN105490804A CN201510687524.7A CN201510687524A CN105490804A CN 105490804 A CN105490804 A CN 105490804A CN 201510687524 A CN201510687524 A CN 201510687524A CN 105490804 A CN105490804 A CN 105490804A
Authority
CN
China
Prior art keywords
bob
alice
base
sequence
measurement
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510687524.7A
Other languages
Chinese (zh)
Other versions
CN105490804B (en
Inventor
何业锋
侯红霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian University of Posts and Telecommunications
Original Assignee
Xian University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Posts and Telecommunications filed Critical Xian University of Posts and Telecommunications
Priority to CN201510687524.7A priority Critical patent/CN105490804B/en
Publication of CN105490804A publication Critical patent/CN105490804A/en
Application granted granted Critical
Publication of CN105490804B publication Critical patent/CN105490804B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Optical Communication System (AREA)

Abstract

The present invention discloses a two-party quantum key negotiation protocol based on a three-particle GHZ state, comprising the following steps: step 1: Alice and Bob negotiate codes of quantum states; step 2: Alice prepares n+q GHZ states and divides all the particles into sequences; Alice sends a sequence SC to Bob; step 3: Bob selects and measures q sample particle(s); Alice selects measurement bases to measure corresponding particles; Bob calculates an error rate; and if the error rate is low, step 4 is performed, otherwise step 2 is performed; step 4: Alice performs a Bell measurement on two particles with the same sequence number in the sequences; Bob performs X-base measurement on the particles in the sequences; and Alice and Bob respectively obtain the same shared key according to measurement results and the codes of the quantum states. According to the present invention, the two-party quantum key negotiation protocol can resist existing participant attacks and external attacks as well as Trojan horse attacks, is safe in noiseless quantum channels and quantum noise channels, and can achieve a relatively high quantum bit efficiency.

Description

Based on two side's quantum key agreement protocols of three ions
Technical field
The invention belongs to quantum communications field, be specifically related to a kind of quantum key and consult (Quantumkeyagreement) agreement, particularly a kind of two side's quantum key agreement protocols based on three ions.
Background technology
Quantum cryptography is the new technology of communication and network security, and its fail safe is ensured by fundamental principles of quantum mechanics.Be the different of computationally secure mostly from conventional cipher, quantum cryptography can realize unconditional security, has attracted a large amount of concern thus.It is the new important branch of of quantum cryptography that quantum key consults (QKA) agreement, it allows participant to consult a classical shared secret key by disclosed quantum channel, and the contribution of each participant is identical, the subset that any one participant or participant are formed all can not independently determine this shared key.Utilization sub-key consults the shared secret key of (QKA) agreement foundation and the cryptographic algorithm of one-time pad, and communicating pair can realize the secure communication of unconditional security.
Existing most of quantum key agreement protocol is based on single-particle or Bell state, based on multiparticle Entangled State quantum key agreement can be counted on one's fingers, and they or the external attacks such as Te Luoyi wooden horse can not be resisted, be unsafe, or quantum bit rate is too low.
D.S.Shen, W.P.MaandL.L.Wang utilizes the Cluster State of four particles to propose a both sides QKA agreement in paper " Two-partyquantumkeyagreementwithfour-qubitclusterstates " (QuantumInf.Process.2014:2313-2324), and this agreement has the sub-bit efficiency of higher amount.The concrete steps of agreement are: the first, the Cluster State of some four particles of each self-generating of communicating pair A and B.Communication party A (communication party B) issues communication party B (communication party A) by being inserted after trick photon by the sequence that (first) particle is formed of the 3rd in Cluster State, and retains and its particle sequence.The second, after communicating pair receives corresponding particle sequence, perform eavesdropping monitoring together.3rd, the unitary transformation of the particle sequence execution that communicating pair just receives separately oneself.Then insert after inveigling photon and it is issued the other side mutually.4th, after communicating pair receives corresponding particle sequence, perform eavesdropping monitoring together.5th, communication party A (communication party B) performs respective unitary transformation to by the sequence that (the 3rd) particle is formed of first in Cluster State.Then both sides perform the measurement of cluster base to respective Cluster State, and both sides can obtain identical measurement result.The privacy key shared can be obtained according to coding and the correspondence of measurement result.This agreement Shortcomings part is: because this agreement is a Ping-Pong agreement, namely same particle has been transmitted one back and forth in quantum channel, and therefore this agreement cannot be resisted invisible photon eavesdropping (IPE) Trojan attack and be postponed photon Trojan attack.
W.Huang, Q.Su, X.Wu, Y.B.LiandY.Sun utilize the DF state of four particles to propose the both sides QKA agreement of an energy immunity associating noise in paper " Quantumkeyagreementagainstcollectivedecoherence " (Int.J.Theor.Phys.2014:2891-2901).The concrete steps of agreement are: the first, and communication party A generates two random bit strings, and an individual as shared key contributes string, and one as selecting the control string measuring base.The second, communication party A contributes string and selection to measure the sequence of the DF state of control string preparation four particles of base according to individual, and issues communication party B after inserting trick photon.3rd, after communication party B receives the sequence of DF state of four particles, both sides perform eavesdropping monitoring jointly.If by detecting, the individual that communication party B announces his shared key contributes string.4th, communication party A contributes string according to oneself and the individual of communication party B, can calculate the shared secret key of both sides.The control string of base is measured in 5th, the communication party A selection disclosing him.Utilize this to control string, communication party B can measure all DF states, and the individual that can obtain the shared key of communication party A according to measurement result contributes string.Therefore, communication party B also can calculate the shared secret key of both sides.This agreement Shortcomings part is: the quantum bit efficiency of this agreement is too low, and its quantum bit efficiency is only 10%.
Summary of the invention
For the defect existed in above-mentioned prior art or deficiency, the object of the invention is to, a kind of two side's quantum key agreement protocols based on three ions are provided.
In order to realize above-mentioned task, the present invention adopts following technical scheme to be solved:
Based on two side's quantum key agreement protocols of three ions, specifically comprise the steps:
Step 1:Alice and Bob consults the coding of quantum state; | φ +> aB→ 0, | φ -> aB→ 1, |+> c→ 0, |-> c→ 1;
Step 2:Alice prepares n+q GHZ state | η > aBC, and all particles are divided into three orderly sequences:
S a={ A 1, A 2..., A n+q, S b={ B 1, B 2..., B n+qand S c={ C 1, C 2..., C n+q,
Wherein sequence S a, S b, S crespectively by each GHZ state | η > aBCparticle A, B, C form; Alice oneself reservation queue S aand S b, by sequence S csend to Bob; N, q are the positive integer being greater than 1;
Step 3: when Bob receives sequence S c, at random from sequence S cin select q sample particles, select Z base or X base to measure at random to this q sample particles; Then, Bob by this q sample particles at sequence S cin position and corresponding base of measuring tell Alice; Alice selects the measurement base of oneself according to the measurement base of Bob, and measures sequence S with the measurement base of oneself aand S bin corresponding particle, then measurement result is informed Bob by classical authenticated channel; Bob compares the measurement result of two people, and according to the measurement correlation calculations error rate of GHZ state; If error rate is lower than prespecified limit gate value, then perform step 4, otherwise, perform step 2;
Step 4:Alice is by sequence S aand S bin sample particles remove, obtain sequence S' respectively aand S' b; Bob is by sequence S cin sample particles remove, obtain sequence S' c;
S' a=A ' 1, A' 2..., A' n, S' b=B ' 1, B' 2..., B' nand S' c=C ' 1, C' 2..., C' n;
Alice is to sequence S' aand S' btwo particles that middle sequence number is identical perform Bell and measure; Bob is to sequence S' cin particle perform X base and measure; According to the coding of the quantum state that Alice and Bob in measurement result and step 1 consults, Alice and Bob obtains the shared key of identical n-bit respectively.
Further, in described step 1, described Alice and Bob consults being encoded to of quantum state: | φ +> aB→ 0, | φ -> aB→ 1, |+> c→ 0, |-> c→ 1.
Further, in described step 2,
Further, in described step 3, described Alice selects the measurement base of oneself specifically to refer to according to the measurement base of Bob: if the measurement base of Bob is Z base, then Alice selects base (| 00>, | 01>, | 10>, | 11>}) as oneself measurement base; If the measurement base of Bob is X base, then Alice select Bell base (| φ +>, | φ ->, | ψ +>, | ψ ->}) as the measurement base of oneself.
Further, in described step 3, the measurement correlation of described GHZ state refers to:
According to above formula, if to GHZ state | η > aBCparticle A and B perform base is measured, and performs Z base measure particle C, then system with 1/2 probability be collapsed to state | 00> aB| 0> cwith | 11> aB| 1> c; If to GHZ state | η > aBCparticle A and B perform Bell and measure, X base is performed to particle C and measures, then system with 1/2 probability be collapsed to state | φ +> aB|+> cwith | φ -> aB|-> c.
Further, in described step 3, described limit gate value gets 0.1 ~ 0.2.
Beneficial effect of the present invention:
Two side's quantum key agreement protocols based on three ions of the present invention can not only be resisted existing participant and attack and external attack, and can resist Trojan horse attack.And be all safe on noiseless quantum channel and quantum noise channel.Further, this agreement also can reach higher quantum bit efficiency.The present invention can guarantee that communicating pair sets up the classical privacy key shared between them liberally.Utilize the cryptographic algorithm of this classical privacy key and one-time pad, communicating pair can realize the secure communication of unconditional security.
Embodiment
1, pre-knowledge
As everyone knows, | 0>, | 1>} defines Z base, |+>, |->} defines X base, wherein four Bell state are defined as follows:
They form one group of complete orthogonal basis in four-dimensional Hilbert space.GHZ state is the maximal entangled state of three particles, they form one group of complete orthogonal basis in octuple Hilbert space.In agreement of the present invention, we use a following GHZ state as quantum information source, namely
According to expression formula, if to GHZ state | η > aBCparticle A and B perform Bell and measure, X base is performed to particle C and measures, then system with 1/2 probability be collapsed to state | φ +> aB|+> cwith | φ -> aB|-> c.
2, quantum key agreement protocol of the present invention
Two side's quantum key agreement protocols based on three ions of the present invention, specifically comprise the steps:
Step 1:Alice and Bob consults the coding of following quantum state: | φ +> aB→ 0, | φ -> aB→ 1, |+> c→ 0, |-> c→ 1;
Step 2:Alice prepares n+q GHZ state | η > aBC, and all particles are divided into three orderly sequences:
S a={ A 1, A 2..., A n+q, S b={ B 1, B 2..., B n+qand S c={ C 1, C 2..., C n+q,
Wherein sequence S a, S b, S crespectively by each GHZ state | η > aBCparticle A, B, C form; Alice oneself reservation queue S aand S b, by sequence S csend to Bob; N, q are the positive integer being greater than 1; Such as, n=64.
Step 3: when Bob receives sequence S c, at random from sequence S cin select q sample particles, select Z base or X base to measure at random to this q sample particles; Then, Bob by this q sample particles at sequence S cin position and corresponding base of measuring tell Alice; Alice selects the measurement base of oneself according to the measurement base of Bob, and measures sequence S with the measurement base of oneself aand S bin corresponding particle, then measurement result is informed Bob by classical authenticated channel; Bob compares the measurement result of two people, and according to the measurement correlation calculations error rate of GHZ state; If error rate is lower than prespecified limit gate value, then perform step 4, otherwise, perform step 2;
Described limit gate value gets 0.1 ~ 0.2.
Above-mentioned Alice selects the measurement base of oneself specifically to refer to according to the measurement base of Bob: if the measurement base of Bob is Z base, then Alice selects base (| 00>, | 01>, | 10>, | 11>}) as oneself measurement base; If the measurement base of Bob is X base, then Alice select Bell base (| φ +>, | φ ->, | ψ +>, | ψ ->}) as the measurement base of oneself.
The measurement correlation of above-mentioned GHZ state refers to:
According to above formula, if to GHZ state | η > aBCparticle A and B perform base is measured, and performs Z base measure particle C, then system with 1/2 probability be collapsed to state | 00> aB| 0> cwith | 11> aB| 1> c; If to GHZ state | η > aBCparticle A and B perform Bell and measure, X base is performed to particle C and measures, then system with 1/2 probability be collapsed to state | φ +> aB|+> cwith | φ -> aB|-> c.
Step 4:Alice is by sequence S aand S bin sample particles remove, obtain sequence S' respectively aand S' b; Bob is by sequence S cin sample particles remove, obtain sequence S' c;
S' a=A ' 1, A' 2..., A' n, S' b=B ' 1, B' 2..., B' nand S' c=C ' 1, C' 2..., C' n;
Alice is to sequence S' aand S' btwo particles that middle sequence number is identical perform Bell and measure; Bob is to sequence S' cin particle perform X base and measure; According to the coding of the quantum state that Alice and Bob in measurement result and step 1 consults, Alice and Bob obtains the shared key of identical n-bit respectively.
According to expressed measurement correlation is known, and the shared key that Alice and Bob obtains is identical.
4 fail safes and efficiency analysis
The QKA agreement of a safety can not only resist external attack, and can resist participant's attack.
4.1 participants attack
Below, explanation dishonest participant can not be obtained alone this shared key by us.Without loss of generality, suppose that Alice is a dishonest participant, she wants to allow the l bit in shared key be 0, and she needs to measure sequence S' with Bell base aand S' bin corresponding l to particle.But according to the characteristic of Quantum Entangled States, what measurement result was random is | φ +> aBwith | φ -> aB, namely Alice with 50% probability obtain 0 or 1.Therefore, every in l bit random is 0 or 1.So Alice cannot any one bit in Independent Decisiveness shared key.So this agreement can be resisted participant and be attacked.
4.2 external attack
Suppose that Eve is a listener-in wanting to steal shared key, the possible method that she attacks has: Trojan horse attack, measurement-multi-sending attack, intercepting and capturing-multi-sending attack and tangle-measure attack.
Trojan horse attack: in this agreement, because each photon in quantum channel is only transmitted once, therefore Eve successfully can not perform invisible photon eavesdropping (IPE) Trojan attack and postpone photon Trojan attack.
Measurement-multi-sending attack: Eve can to sequence S cin particle perform measurement-multi-sending attack.But the measurement of Eve will affect sequence S a, S band S cthe state of middle sample particles, makes no longer to meet between corresponding three particles to tangle correlation.In the eavesdropping of second step detects, Alice and Bob can with 1-(3/4) mthe probability of (m represents the quantity for detecting the sample GHZ state that this is attacked) finds the attack of Eve.
Intercepting and capturing-multi-sending attack: if Eve performs intercepting and capturing-multi-sending attack, first she intercept and capture sequence S c, then send her forgery sequence to Bob.After agreement terminates, she is again to sequence S cin particle perform corresponding measurement.But, the sequence S that the particle in the sequence that Eve forges and Alice retain aand S bin corresponding particle do not meet and tangle correlation, therefore not by the safety monitoring of second step.When m sample GHZ state is used to monitor this eavesdropping attack, corresponding eavesdropping verification and measurement ratio is 1-(1/2) m.Therefore, the intercepting and capturing-multi-sending attack of Eve also have failed.
Tangle-measure attack: Eve also can go to tangle this transmission particle (sequence S with oneself pre-prepd auxiliary particle cin particle), then transmission particle is issued Bob again.After agreement terminates, she measures corresponding auxiliary particle again, thus extracts the useful information about shared key.If tangling of Eve is operating as U, and there is U (| 0>|E>)=a|0>|e 00>+b|1>|e 01> and U (| 1>|E>)=c|0>|e 10>+d|1>|e 11> sets up, wherein | and e 00>, | e 01>, | e 10> and | e 11> is by the well-determined pure state of unitary transformation U, and | a| 2+ | b| 2=1, | c| 2+ | d| 2=1.Obviously, CNOT conversion is the special circumstances of unitary transformation U.GHZ state through Eve tangle operation after, system becomes:
If Eve wants to be detected by eavesdropping at second step, the unitary transformation U of Eve must satisfy condition b=c=0 and a|e 00>=d|e 11>.As equation a|e 00>=d|e 11when > sets up, Eve can not distinguish auxiliary photon a|e 00> and d|e 11>, thus Eve does not obtain the useful information of shared key by observing auxiliary photon.But, if a|e 00> ≠ d|e 11the attack of >, Eve will disturb sample state | η > aBC.Therefore, the attack of Eve will be found by Alice and Bob.The eavesdropping verification and measurement ratio of each trick photon is:
4.3 quantum noise channels
In quantum noise channel, the span of quantum bit error rate (QBER) τ introduced by noise is similar at 2%-8.9%, and it depends on the situation of channel as factors such as distances.If the quantum bit error rate that the attack of Eve is introduced is less than τ, so she just can hide her attack with noise.According to above-mentioned safety analysis, in this agreement, the eavesdropping verification and measurement ratio of each trick photon is at least 25%, and it is much larger than τ.Therefore, suitable eavesdropping detectability gate value is selected can to guarantee that this agreement is also safe on quantum noise channel.
According to above-mentioned analysis, this agreement is all safe on noiseless quantum channel and quantum noise channel.
5 efficiency analysiss
For a QKA agreement, Cabello quantum bit efficiency is defined as: wherein c represents the quantity of the classical bit of negotiation, the quantity of the quantum bit used in q presentation protocol.Therefore, our the quantum bit efficiency of agreement is: the wherein quantity of GHZ state in n presentation protocol, m represents the quantity of the GHZ state as sample.Make m=n, Wo Menyou

Claims (6)

1., based on two side's quantum key agreement protocols of three ions, it is characterized in that, specifically comprise the steps:
Step 1:Alice and Bob consults the coding of quantum state; | φ +> aB→ 0, | φ -> aB→ 1, |+> c→ 0, |-> c→ 1;
Step 2:Alice prepares n+q GHZ state | η > aBC, and all particles are divided into three orderly sequences:
S a={ A 1, A 2..., A n+q, S b={ B 1, B 2..., B n+qand S c={ C 1, C 2..., C n+q,
Wherein sequence S a, S b, S crespectively by each GHZ state | η > aBCparticle A, B, C form; Alice oneself reservation queue S aand S b, by sequence S csend to Bob; N, q are the positive integer being greater than 1;
Step 3: when Bob receives sequence S c, at random from sequence S cin select q sample particles, select Z base or X base to measure at random to this q sample particles; Then, Bob by this q sample particles at sequence S cin position and corresponding base of measuring tell Alice; Alice selects the measurement base of oneself according to the measurement base of Bob, and measures sequence S with the measurement base of oneself aand S bin corresponding particle, then measurement result is informed Bob by classical authenticated channel; Bob compares the measurement result of two people, and according to the measurement correlation calculations error rate of GHZ state; If error rate is lower than prespecified limit gate value, then perform step 4, otherwise, perform step 2;
Step 4:Alice is by sequence S aand S bin sample particles remove, obtain sequence S ' respectively awith S ' b; Bob is by sequence S cin sample particles remove, obtain sequence S ' c;
S ' a={ A 1', A ' 2..., A ' n, S ' b={ B 1', B ' 2..., B ' nand S ' c={ C 1', C ' 2..., C ' n;
Alice is to sequence S ' awith S ' btwo particles that middle sequence number is identical perform Bell and measure; Bob is to sequence S ' cin particle perform X base and measure; According to the coding of the quantum state that Alice and Bob in measurement result and step 1 consults, Alice and Bob obtains the shared key of identical n-bit respectively.
2. as claimed in claim 1 based on two side's quantum key agreement protocols of three ions, it is characterized in that, in described step 1, described Alice and Bob consults being encoded to of quantum state: | φ +> aB→ 0, | φ -> aB→ 1, |+> c→ 0, |-> c→ 1.
3., as claimed in claim 1 based on two side's quantum key agreement protocols of three ions, it is characterized in that, in described step 2, | η > A B C = 1 2 ( | 000 > + | 111 > ) A B C .
4. as claimed in claim 1 based on two side's quantum key agreement protocols of three ions, it is characterized in that, in described step 3, described Alice selects the measurement base of oneself specifically to refer to according to the measurement base of Bob: if the measurement base of Bob is Z base, then Alice selects base (| 00>, | 01>, | 10>, | 11>}) as oneself measurement base; If the measurement base of Bob is X base, then Alice select Bell base (| φ +>, | φ ->, | ψ +>, | ψ ->}) as the measurement base of oneself.
5., as claimed in claim 1 based on two side's quantum key agreement protocols of three ions, it is characterized in that, in described step 3, the measurement correlation of described GHZ state refers to:
| η > A B C = 1 2 ( | 000 > + | 111 > ) A B C = 1 2 ( | φ + > A B | + > C + | φ - > A B | - > C ) ;
According to above formula, if to GHZ state | η > aBCparticle A and B perform base is measured, and performs Z base measure particle C, then system with 1/2 probability be collapsed to state | 00> aB| 0> cwith | 11> aB| 1> c; If to GHZ state | η > aBCparticle A and B perform Bell and measure, X base is performed to particle C and measures, then system with 1/2 probability be collapsed to state | φ +> aB|+> cwith | φ -> aB|-> c.
6., as claimed in claim 1 based on two side's quantum key agreement protocols of three ions, it is characterized in that, in described step 3, described limit gate value gets 0.1 ~ 0.2.
CN201510687524.7A 2015-10-21 2015-10-21 Two side's quantum key agreement protocols based on three ions Expired - Fee Related CN105490804B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510687524.7A CN105490804B (en) 2015-10-21 2015-10-21 Two side's quantum key agreement protocols based on three ions

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510687524.7A CN105490804B (en) 2015-10-21 2015-10-21 Two side's quantum key agreement protocols based on three ions

Publications (2)

Publication Number Publication Date
CN105490804A true CN105490804A (en) 2016-04-13
CN105490804B CN105490804B (en) 2018-04-17

Family

ID=55677552

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510687524.7A Expired - Fee Related CN105490804B (en) 2015-10-21 2015-10-21 Two side's quantum key agreement protocols based on three ions

Country Status (1)

Country Link
CN (1) CN105490804B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105846999A (en) * 2016-06-14 2016-08-10 泰山学院 Multi-side quantum secret key negotiation method based on unidirectional transmission loop
CN105933114A (en) * 2016-06-24 2016-09-07 苏州大学 Quantum dialogue method for asymmetric capacity based on GHZ state and Bell state
CN109150521A (en) * 2018-10-22 2019-01-04 苏州大学张家港工业技术研究院 The long-range real coefficient quantum state preparation method of probability based on unknown parameter GHZ channel
CN109347567A (en) * 2018-12-12 2019-02-15 暨南大学 GHZ maximum tangles the entanglement concentration method and system of pure state
CN110098930A (en) * 2019-05-27 2019-08-06 成都信息工程大学 A kind of two side's quantum key agreement methods and system based on Bell state
CN110233732A (en) * 2019-05-24 2019-09-13 西北大学 A kind of dynamic quantum rotation gate proxy blind signing method based on cluster state

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100150349A1 (en) * 2008-12-12 2010-06-17 Electronics And Telecommunications Research Institute Method and system for performing quantum bit commitment protocol
US20110126011A1 (en) * 2009-11-24 2011-05-26 Electronics And Telecommunications Research Institute Method of user-authenticated quantum key distribution
CN102801518A (en) * 2012-09-05 2012-11-28 浙江工商大学 Quantum steganography protocol based on gigahertz (GHZ) state dense coding and entanglement exchange
CN103297226A (en) * 2013-06-03 2013-09-11 浙江工商大学 Controlled bi-directional quantum secure direct communication protocol free of information leakage
CN103338187A (en) * 2013-06-03 2013-10-02 浙江工商大学 Information leakage-free bidirectional quantum secure direct communication protocol based on any two gigahertz (GHZ) state/entanglement exchange result collection codes
CN103888476A (en) * 2014-04-14 2014-06-25 西北大学 Quantum secure direct communication protocol based on three-particle GHZ entangled state

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100150349A1 (en) * 2008-12-12 2010-06-17 Electronics And Telecommunications Research Institute Method and system for performing quantum bit commitment protocol
US20110126011A1 (en) * 2009-11-24 2011-05-26 Electronics And Telecommunications Research Institute Method of user-authenticated quantum key distribution
CN102801518A (en) * 2012-09-05 2012-11-28 浙江工商大学 Quantum steganography protocol based on gigahertz (GHZ) state dense coding and entanglement exchange
CN103297226A (en) * 2013-06-03 2013-09-11 浙江工商大学 Controlled bi-directional quantum secure direct communication protocol free of information leakage
CN103338187A (en) * 2013-06-03 2013-10-02 浙江工商大学 Information leakage-free bidirectional quantum secure direct communication protocol based on any two gigahertz (GHZ) state/entanglement exchange result collection codes
CN103888476A (en) * 2014-04-14 2014-06-25 西北大学 Quantum secure direct communication protocol based on three-particle GHZ entangled state

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105846999A (en) * 2016-06-14 2016-08-10 泰山学院 Multi-side quantum secret key negotiation method based on unidirectional transmission loop
CN105846999B (en) * 2016-06-14 2019-02-15 泰山学院 Multi-party quantum key agreement method based on one-way transmission circuit
CN105933114A (en) * 2016-06-24 2016-09-07 苏州大学 Quantum dialogue method for asymmetric capacity based on GHZ state and Bell state
CN105933114B (en) * 2016-06-24 2019-03-08 苏州大学 The quantum dialogue method of asymmetric capacity based on GHZ state and Bell state
CN109150521A (en) * 2018-10-22 2019-01-04 苏州大学张家港工业技术研究院 The long-range real coefficient quantum state preparation method of probability based on unknown parameter GHZ channel
CN109150521B (en) * 2018-10-22 2021-02-02 苏州大学 Probability remote real coefficient quantum state preparation method based on unknown parameter GHZ channel
CN109347567A (en) * 2018-12-12 2019-02-15 暨南大学 GHZ maximum tangles the entanglement concentration method and system of pure state
CN109347567B (en) * 2018-12-12 2021-07-20 暨南大学 Entanglement concentration method and system for GHZ maximum entanglement pure state
CN110233732A (en) * 2019-05-24 2019-09-13 西北大学 A kind of dynamic quantum rotation gate proxy blind signing method based on cluster state
CN110098930A (en) * 2019-05-27 2019-08-06 成都信息工程大学 A kind of two side's quantum key agreement methods and system based on Bell state
CN110098930B (en) * 2019-05-27 2020-04-07 成都信息工程大学 Bell state-based two-party quantum key negotiation method and system

Also Published As

Publication number Publication date
CN105490804B (en) 2018-04-17

Similar Documents

Publication Publication Date Title
CN105245332A (en) Four-particle x state-based two-party quantum key agreement protocol
CN105227301B (en) Quantum key agreement protocol based on GHZ states
CN105490804A (en) Two-party quantum key negotiation protocol based on three-particle GHZ state
CN105245331B (en) Two side's quantum key agreement protocols based on four particle GHZ states
CN106685654B (en) Quantum key distribution method with bidirectional identity authentication
CN106888085B (en) Multi-party quantum conversation method based on maximum entangled GHZ state
CN109327308B (en) Quantum key distribution method and system with bidirectional identity authentication function
CN107493168B (en) Quanta identity authentication method and its application method during quantum key distribution
CN106789009B (en) Multi-party quantum privacy comparison method based on d-level cat state and d-level Bell state entanglement exchange
CN108092771A (en) A kind of anti-tamper controlled quantum safety direct communication method and system
CN108173654B (en) Two-party key agreement method and system based on half-quantum technology
Min et al. Novel multi-party quantum key agreement protocol with g-like states and bell states
CN106685659B (en) Quantum secret sharing method capable of resisting interception of retransmission, man-in-the-middle and entanglement attacks
CN105871544A (en) Two-party quantum private comparison method based on five-quantum bit entangled state
CN103227800A (en) Quantum secure communication wiretap detection method based on five-qubit Cluster state
Li et al. Improved eavesdropping detection strategy based on four-particle cluster state in quantum direct communication protocol
CN111082937B (en) Bidirectional identity authentication method based on single photon
CN110635907B (en) Controlled quantum conversation method with identity authentication function based on GHZ-like state
CN105227303A (en) GHZ-W state based on expansion communicates and identity authentication protocol with the determination secure quantum of quantum one-time pad
Gao et al. A ping-pong quantum dialogue scheme using genuine four-particle entangled states
CN110098929B (en) Two-party quantum privacy comparison method based on two-particle pure entangled state
CN109495262B (en) Quantum key distribution method with dense coding characteristic in quantum communication network
Yin et al. Two-step efficient quantum dialogue with three-particle entangled W state
CN111901112A (en) Quantum secret information equal exchange method, system and application based on dense coding
Gan Quantum key distribution scheme with high efficiency

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180417