CN105959113B - For preventing the quantum key distribution method of detector side channel attack - Google Patents

For preventing the quantum key distribution method of detector side channel attack Download PDF

Info

Publication number
CN105959113B
CN105959113B CN201610528535.5A CN201610528535A CN105959113B CN 105959113 B CN105959113 B CN 105959113B CN 201610528535 A CN201610528535 A CN 201610528535A CN 105959113 B CN105959113 B CN 105959113B
Authority
CN
China
Prior art keywords
receiving end
detector
side channel
key distribution
quantum key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610528535.5A
Other languages
Chinese (zh)
Other versions
CN105959113A (en
Inventor
贾磊磊
谭勇刚
王松林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Regular Quantum Beijing Technology Co ltd
Original Assignee
Luoyang Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Luoyang Normal University filed Critical Luoyang Normal University
Priority to CN201610528535.5A priority Critical patent/CN105959113B/en
Publication of CN105959113A publication Critical patent/CN105959113A/en
Application granted granted Critical
Publication of CN105959113B publication Critical patent/CN105959113B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Abstract

The present invention relates to for preventing the quantum key distribution method of detector side channel attack, under conditions of not needing to improve detection device used in existing preparation measurement quantum key distribution scheme, the Quantum Correlation between Alice and Bob is checked by detecting to the receiving end side Bob into row stochastic Bell, so that detecting detector side channel attack whether there is.During preparation measures quantum key distribution, existing detector side channel attack can be effectively detected, detector side channel information leakage problem is solved.

Description

For preventing the quantum key distribution method of detector side channel attack
Technical field
The present invention relates to quantum cryptography field, especially a kind of quantum cryptography for preventing detector side channel attack point Method of completing the square.
Background technique
Preparation measurement quantum key distribution scheme has the advantages that speed is fast, password production rate is high, is easily achieved.However it visits The attack for surveying device side channel greatly destroys its safety, and listener-in Eve can benefit under conditions of without prejudice to quantum principles Its invalid information is obtained with the defect of detector, it means that she can eavesdrop communication without being found.Detector side channel is attacked It hits and very big harm is caused to the safety of quantum key distribution.Therefore larger improvement must be carried out to detector, to avoid detection The attack of device wing passage.
It takes some measures at present to prevent these attacks, quantum cryptography system for example unrelated with measuring device System.In this case, the safety of measurement result depends on the monogynous tangled, realize it is increasingly complex, password production rate compared with It is low.Or it just prevents from attacking using more perfect detector.
Summary of the invention
The object of the present invention is to provide a kind of for preventing the quantum key distribution method of detector side channel attack, to Solve the problems, such as that existing method dependence is tangled or detector.
To achieve the above object, the solution of the present invention includes:
Step 1: transmitting terminal A selects an information embedded mode at random, random 0 or 1 are incorporated into the quantum state of photon, sent out Give receiving end B;
Step 2: both of which is arranged in receiving end B:Signal mode and test pattern;Receiving end B is randomly choosed according to probability One of mode;In the signal mode, it randomly chooses an information reading manner and reads photon carries 0 or 1;Work as receiving end When B selection signal mode, transmitting terminal A and receiving end B announce their information insertion and reading manner by common signal channel, will believe Those of consistent with the reading manner bit of embedded mode is ceased as cipher bits;In test pattern, specific information is selected to read Mode carries out Bell test;When receiving end B selects test pattern, transmitting terminal A and receiving end B calculate S by common signal channelCHSH Value come announce they base lose selection and measurement result.
Step 3: transmitting terminal A and receiving end B carry out error correcting and privacy amplification to cipher bits after password distribution, For generating security password;The SCHSHValue for carrying out privacy amplification, according to SCHSHSize and formula (6) judge to be marked The amount of the information of note number, if the amount of labeled information exceeds preset threshold value, abandon;If in preset threshold value hereinafter, Mark information can then be eliminated by relevant means.Due to specifically eliminate means and the application inquire into content without It closes, and the paper in quantum cryptography field relates to more, therefore details are not described herein.
Further, the information embedded mode of the transmitting terminal A includes oblique line baseWith straight line baseLetter Under number mode, receiving end B basic vector existsWithMiddle random selection.
Further, under test pattern, receiving end B basic vector existsWithIn with Machine selection;SCHSH≡<A1B1+A1B2+A2B1-A2B2>。
Further, the upper limit of the information content of labeled receiving end B is estimated by following formula:
Wherein H2(x)=- xlog2x-(1-x)log2(1-x) is binary information entropy.
Further, receiving end B is respectively labeled as D in addition to being used to decode 0 and 1 detector0And D1, also there is a spy Survey device Dt;A time window is arranged in each detector, and detector can effectively detect the signal pulse of entrance in window, Effective pulse cannot be obtained in window external detector;D0And D1Detection efficient be labeled as η, and DtDetection efficient be ηt, than Compared with η and ηt, work as ηtWhen > η, detector side channel attack is judged.
According to the habit of this field, transmitting terminal A is Alice, and receiving end B is Bob, listener-in Eve.The present invention is not needing Under conditions of being improved to detection device used in existing preparation measurement quantum key distribution scheme, by receiving end The side Bob detects to check the Quantum Correlation between Alice and Bob into row stochastic Bell, attacks to detect detector side channel Hitting whether there is.During preparation measures quantum key distribution, existing detector side channel attack can be effectively detected, is solved Detector side channel information leakage problem.Advantages of the present invention further includes:Change preparation measurement quantum key distribution side is not needed Case (is such as changed to the quantum cryptography system unrelated with measuring device), it is ensured that dispensing rate, password production rate of quantum cryptography etc. It is unaffected.The efficiency for worrying detector is not had in the program, because photon only labeled in scheme can be used to calculate CHSH multinomial.The program realizes in preparation measurement quantum key distribution mode, therefore without the concern for tangling.
Specific embodiment
The present invention will be further described in detail below.
Basic ideas of the invention are to be tested in quantum key distribution using preparation-measurement Bell, and basic principle is:
According to the habit of this field, transmitting terminal A is Alice, and receiving end B is Bob, listener-in Eve.If Alice possesses one A single-photon source (weak coherent light source can be used in actual experiment), she is randomly chosenOrPhoton is prepared with 0 or 1 B, before measuring photon B, the state of photon B remains quantum state prepared by Alice;
Bob is randomly chosen in baseWithUpper measurement enters the photon in laboratory;
Alice and Bob is selected with their base and preparation (measurement) result calculates CHSH multinomial, if CHSH inequality Classical limit is broken, and illustrates that Quantum Correlation exists, otherwise Quantum Correlation is not present.
If Alice to the base of photon B become estranged value selection be completely random, in SCHSH≡<A1B1+A1B2+ A2B1-A2B2>In it is available
Similarly have,
WithWithTo substitute B1、B2, obtainTherefore available
Quantum theory and local hidden variable theories be it is completely incompatible, the conflict of no loophole Bell inequality means office Domain hidden variable theory can be excluded.Otherwise, mean that quantum is managed if the conflict that can not obtain no loophole Bell inequality By being wrong.Recently, the conflict of no loophole Bell inequality has obtained the verification experimental verification of three groups.These important results Mean that local hidden variable theories are incorrect.Based on the fact that we can pass through a simple effective method Prevent the attack of preparation-measurement quantum key distribution process detector side channel present in.It is not needing to experimental provision Under conditions of improving, the amount between Alice and Bob is checked by being tested into row stochastic Bell the receiving end side Bob Son association, so that detecting detector side channel attack whether there is.
Illustrate method of the invention by taking improved BB84 scheme as an example below, it should be noted that method of the invention is not It can be only used for BB84 scheme, can be also used for other quantum cryptography allocation plans.
Based on preparation-measurement Bell test BB84 scheme:
Step 1: generating n single photon in the laboratory Alice, Alice is in oblique line baseStraight line baseWith 0, any value in 1 randomly chooses to prepare these photons, and then these photons have been sent to Bob.
Step 2: there are two types of modes by Bob:The probability of his selection signal mode is p, and selecting the probability of test pattern is 1-p (preferred, only Bob oneself knows the value of p).Basic vector is measured in signal mode to existWithIn select at random It selects, basic vector is measured in test pattern and is existedWithMiddle random selection.
When Bob selection signal mode, Alice and Bob announce their measurement basic vector by common signal channel, they are him Measurement result be stored in cipher bits as a filter in identical basic vector.
When Bob selects test pattern, Alice and Bob calculate S by common signal channelCHSHValue announce their base Lose selection and measurement result.
Step 3: Alice and Bob carry out error correcting and privacy amplification to the cipher bits of screening after password distribution, If security password can be generated, password distribution task is just completed, and otherwise task just has failed.Above-mentioned error correction process Related to the result of above-mentioned signal mode, privacy amplification is related to the measurement result of test pattern.Error correcting passes through error code Rate judges whether there is the process of fatal eavesdropping.
The principle of above scheme is, by increasing a test pattern in password assigning process, to pass through test pattern As a result privacy amplification is carried out, so as to generate security password.
Specific theory analysis is as follows:Because Alice randomly chooses the basic vector and value of photon B, stateThe preparation of state is consistent under conditions of conjugated radicle loses, Eve It cannot find out prepared by which state.If she carries out state recognition task to photon, interference just must be introduced into.Not any Under conditions of loss, it can be assumed that Eve is acted on photon B with a probe.If depending on the phase interaction between probe and photon It is available with for unitary evolution
Herein | E>The blank state of Eve probe, f and e be respectively photon B polarize constant and polarization be flipped it is general Rate, e usually also indicate that quantum bit error rate in the information of Eve eavesdropping.Information content H between Alice and Bob2(e) it usually uses Correct their Bit String mistakes, and binary entropy is H2(x)=- xlog2x-(1-x)log2x。
After under Eve attack,<A2B1>The result recalculated is
Similarly, available
After Eve attack, obtainIn preparation-measurement quantum key distribution, the eavesdropping energy of Eve Hard to bear collective's attack restricts.The upper limit of the information content of Eve label Bob can be estimated by following formula:
Wherein H2(x)=- xlog2x-(1-x)log2(1-x) is binary information entropy.
If the detector of Bob is simultaneously less perfect, it would be possible that the leakage of detector side channel information can occur.Eve meeting Detector side channel is attacked using the shortcomings that Bob detector side channel.In the embodiment above, Bob is not needed The detector of Bob is improved.Further, Bob can also increase the improvement to detector, be described as follows:
If Bob is respectively labeled as D in addition to being used to decode 0 and 1 detector0And D1, he also possesses a detector Dt, it is The influence of secret mark number is reduced, password generates and often adds time window to each detector in process, in window Detector can effectively detect the signal pulse of entrance, cannot obtain effective pulse in window external detector, be experimentally Time window is realized by open and close detector.Assuming that DtPossess and D0And D1The same detection efficient still possesses sufficiently large Time window come guarantee it is all can be by D0And D1The signal detected can be by DtIt detects.D0And D1Detection efficient be labeled as η and DtDetection efficient be ηtIf η in the case where without detector side channel attackt=η.Once detector side channel occurs Attack, it can be found that ηt> η,Therefore Eve is obtained in detector side channel attack process Information content can effectively be estimated:
Theory analysis is as follows:
Theorem 1:The attack of detector side channel can be carried out successfully, and if only if the bit value for the Alice that Eve is obtained Measurement result relative to Bob is partially or completely determining.
Eve and photon B interact to obtain Alice to the state of photon B, after Bob measured the photon received, He and Alice announce their basic vector selection.The entropy reduction of Eve state can make Eve obtain information from Alice to be limited.
IE=Ha priori-Ha posteriori (7)
Under the attack of detector side channel, the task of Eve is to eliminate the uncertainty of Alice state, although the detection of Bob There are various defects for device, but assume that leakage is necessary not extra information from his laboratory.Otherwise, quantum key distribution Safety cannot be guaranteed that this illustrates that Eve should be from detector steal information indirectly.If Alice is to the state of photon B Prepare identical, then Ha priori=1.
In view of Ha posteriori=∑rP (r) H (i | r), the probability that Bob obtains measurement result as r, H (i are represented with P (r) | r) indicate the probability that the quantum state of Alice when measurement result is r is i.Ideally, the measurement result of Bob should equably divide Cloth is 0 and 1.If Eve does not interact with photon B, the then H after the base selection that Bob announces hima posteriori=1, Therefore IE=0, Eve can not steal over there any information from Alice.In order to meet IE> 0, Ha posterior< 1 must expire Foot, and because ∑ must be met at any timerP (r)=1, then Eve just cannot get H (i | r)=1, this indicates Eve in Bob It is determined under conditions of acquisition measurement result r to the message part of the quantum state i of Alice or completely.
So if detector side channel attack can successfully be implemented, Eve must control detector D0And D1It generates Detection efficient is poor, this inefficient is random and can not be found on average by Bob from the time.But this efficiency Difference can pass through η/ηtIt estimates and is embodied inOn, therefore can be used to estimate that Eve is being detected Acquired information content in device side-channel attack.
Specific embodiment of the present invention is presented above, but the present invention is not limited to described embodiment. Under the thinking that the present invention provides, to the skill in above-described embodiment by the way of being readily apparent that those skilled in the art Art means are converted, are replaced, are modified, and play the role of with the present invention in relevant art means it is essentially identical, realize Goal of the invention it is also essentially identical, the technical solution formed in this way is to be finely adjusted to be formed to above-described embodiment, this technology Scheme is still fallen in protection scope of the present invention.

Claims (5)

1. for preventing the quantum key distribution method of detector side channel attack, which is characterized in that steps are as follows:
Step 1: transmitting terminal A selects an information embedded mode at random, random 0 or 1 are incorporated into the quantum state of photon, issues and connects Receiving end B;
Step 2: both of which is arranged in receiving end B:Signal mode and test pattern;Receiving end B is randomly choosed wherein according to probability One mode;In the signal mode, it randomly chooses an information reading manner and reads photon carries 0 or 1;When receiving end B is selected When selecting signal mode, transmitting terminal A and receiving end B announce their information insertion and reading manner by common signal channel, by information Those of consistent with the reading manner bit of embedded mode is as cipher bits;In test pattern, specific information reading side is selected Formula carries out Bell test;When receiving end B selects test pattern, transmitting terminal A and receiving end B calculate S by common signal channelCHSH's Value come announce they base lose selection and measurement result;
Step 3: transmitting terminal A and receiving end B carry out error correcting and privacy amplification to cipher bits after password distribution, it is used for Generate security password;The SCHSHValue for carrying out privacy amplification.
2. according to claim 1 for preventing the quantum key distribution method of detector side channel attack, feature exists In the information embedded mode of the transmitting terminal A includes oblique line baseWith straight line baseUnder signal mode, receiving end B basic vector existsWithMiddle random selection.
3. according to claim 2 for preventing the quantum key distribution method of detector side channel attack, feature exists In under test pattern, receiving end B basic vector existsWithMiddle random selection;SCHSH≡< A1B1+A1B2+A2B1-A2B2>。
4. according to claim 3 for preventing the quantum key distribution method of detector side channel attack, feature exists In the upper limit of the information content of labeled receiving end B is estimated by following formula:
Wherein H2(x)=- xlog2x-(1-x)log2(1-x) is binary information entropy.
5. according to claim 1 for preventing the quantum key distribution side of detector side channel attack described in any one of -4 Method, which is characterized in that receiving end B is respectively labeled as D in addition to being used to decode 0 and 1 detector0And D1, also there is a detector Dt;A time window is arranged in each detector, and detector can effectively detect the signal pulse of entrance in window, in window Mouth external detector cannot obtain effective pulse;D0And D1Detection efficient be labeled as η, and DtDetection efficient be ηt, compare η And ηt, work as ηtWhen > η, detector side channel attack is judged.
CN201610528535.5A 2016-07-06 2016-07-06 For preventing the quantum key distribution method of detector side channel attack Active CN105959113B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610528535.5A CN105959113B (en) 2016-07-06 2016-07-06 For preventing the quantum key distribution method of detector side channel attack

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610528535.5A CN105959113B (en) 2016-07-06 2016-07-06 For preventing the quantum key distribution method of detector side channel attack

Publications (2)

Publication Number Publication Date
CN105959113A CN105959113A (en) 2016-09-21
CN105959113B true CN105959113B (en) 2018-11-30

Family

ID=56899582

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610528535.5A Active CN105959113B (en) 2016-07-06 2016-07-06 For preventing the quantum key distribution method of detector side channel attack

Country Status (1)

Country Link
CN (1) CN105959113B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107528686B (en) * 2017-08-30 2019-11-22 洛阳师范学院 A kind of generation method of the quantum cryptography unrelated with equipment based on actual detection system
US11336462B1 (en) 2019-09-10 2022-05-17 Wells Fargo Bank, N.A. Systems and methods for post-quantum cryptography optimization
US11366897B1 (en) 2020-01-17 2022-06-21 Wells Fargo Bank, N.A. Systems and methods for layered quantum computing detection
US11334667B1 (en) 2020-01-17 2022-05-17 Wells Fargo Bank, N.A. Systems and methods for disparate quantum computing threat detection

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2430123A (en) * 2005-09-09 2007-03-14 Toshiba Res Europ Ltd A quantum communication system
CN1929372A (en) * 2006-09-22 2007-03-14 西南大学 Highly effective quantum key distribution method
GB2441364A (en) * 2006-08-31 2008-03-05 Toshiba Res Europ Ltd A quantum communication system which selects different protocols on the basis of security
CN103199994A (en) * 2013-02-19 2013-07-10 华南师范大学 Active phase compensation method and device of joint scan
CN105049200A (en) * 2015-08-14 2015-11-11 清华大学 Data post-processing method of quantum key distribution system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2430123A (en) * 2005-09-09 2007-03-14 Toshiba Res Europ Ltd A quantum communication system
GB2441364A (en) * 2006-08-31 2008-03-05 Toshiba Res Europ Ltd A quantum communication system which selects different protocols on the basis of security
CN1929372A (en) * 2006-09-22 2007-03-14 西南大学 Highly effective quantum key distribution method
CN103199994A (en) * 2013-02-19 2013-07-10 华南师范大学 Active phase compensation method and device of joint scan
CN105049200A (en) * 2015-08-14 2015-11-11 清华大学 Data post-processing method of quantum key distribution system

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
"Biased Random Number Generator Based on Bell’s Theorem";谭勇刚等;《Chinese Physics Letters》;20160315;第33卷(第3期);正文第9-12页 *
"CRYPTOGRAPHY FROM QUANTUM MECHANICAL VIEWPOINT";Minal Lopes等;《International Journal on Cryptography and Information Security (IJCIS)》;20140630;第4卷(第2期);正文第13-23页 *
"Quantum key distribution series network protocol with M-classical Bobs";张现周等;《Chinese Physics B》;20090516;第18卷(第6期);正文第2143-2148页 *
"Side-channel-free quantum key distribution";Samuel L. Braunstein等;《PHYSICAL REVIEW LETTERS》;20120330;正文第1-4页 *
"The Essence of More Nonlocality with Less Entanglement in Bell Tests";谭勇刚等;《Communications in Theoretical Physics》;20140101(第1期);正文第40-44页 *
"一种新型基于完全Bell测量的量子密钥分配协议";李恕海等;《中国密码学会2007年年会》;20071019;正文第257-263页 *
Mario Stipčević."Preventing detector blinding attack and other random number generator attacks on quantum cryptography by use of an explicit random number generator".《ResearchGate》.2014,正文第1-3页. *

Also Published As

Publication number Publication date
CN105959113A (en) 2016-09-21

Similar Documents

Publication Publication Date Title
CN105959113B (en) For preventing the quantum key distribution method of detector side channel attack
Huber et al. Weak randomness in device-independent quantum key distribution and the advantage of using high-dimensional entanglement
US10958428B2 (en) Apparatus for quantum key distribution on a quantum network and method using the same
CN109194479B (en) Measuring equipment-independent quantum key distribution method based on single photon multiple degrees of freedom
US10848303B2 (en) Methods and apparatuses for authentication in quantum key distribution and/or quantum data communication
US9306739B1 (en) Quantum key distribution protocol process
KR101767067B1 (en) Method and system for improving security of quantum encryption key distribution protocol
Bouda et al. Weak randomness seriously limits the security of quantum key distribution
Kunz-Jacques et al. Robust shot-noise measurement for continuous-variable quantum key distribution
Niemiec et al. The measure of security in quantum cryptography
KR20120071883A (en) Quantum authentication method and apparatus for quantum secret sharing protocol
CN110635907B (en) Controlled quantum conversation method with identity authentication function based on GHZ-like state
CN107070643B (en) Quantum key distribution device and method
CN206341226U (en) A kind of quantum key distribution device
Yan et al. Quantum secret sharing between multiparty and multiparty with four states
CN109039603B (en) Fault-tolerant semi-quantum key distribution method based on decoherence-free subspace
CN109792379B (en) Information processing method and device
Subramaniam et al. Limits on detecting eavesdropper in qkd protocols
Usenko et al. Large-alphabet quantum key distribution with two-mode coherently correlated beams
He Comment on “Bit-string oblivious transfer based on quantum state computational distinguishability”
Woodhead Tight asymptotic key rate for the Bennett-Brassard 1984 protocol with local randomization and device imprecisions
Qiao et al. Simulation of BB84 Quantum Key Distribution in depolarizing channel
RU2730554C1 (en) Method of detecting an attack on quantum states in a quantum communication channel
Tan et al. Comment on “Device-independent entanglement-based Bennett 1992 protocol”
Cleve Introduction to Quantum Information Processing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240201

Address after: 1003, 1st Floor, Building 7, No. 2 Wanhong West Street, West Eight Rooms, Dongzhimenwai, Chaoyang District, Beijing, 100015

Patentee after: Regular Quantum (Beijing) Technology Co.,Ltd.

Country or region after: China

Address before: No. 71 Longmen Road, High tech Development Zone, Luoyang City, Henan Province, 471022

Patentee before: LUOYANG NORMAL University

Country or region before: China