CN106027232B - A kind of quantum dialogue method based on x state and entanglement transfer - Google Patents
A kind of quantum dialogue method based on x state and entanglement transfer Download PDFInfo
- Publication number
- CN106027232B CN106027232B CN201610223688.9A CN201610223688A CN106027232B CN 106027232 B CN106027232 B CN 106027232B CN 201610223688 A CN201610223688 A CN 201610223688A CN 106027232 B CN106027232 B CN 106027232B
- Authority
- CN
- China
- Prior art keywords
- particle
- sender
- recipient
- quantum
- state
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
Abstract
The present invention relates to a kind of quantum dialogue method based on x state and entanglement transfer, communicating pair uses x state to carry out two-way communication as quantum channel, guarantee that the safety of particle is sent using eavesdropping detection, so that remote legitimate correspondence both sides being capable of secure exchange their mutual secret informations.Compared with existing agreement, quantum dialogue method of the invention has following three essential characteristic, pertains only to the Bell base measurement of dibit particle during actualizing first, will not relate to the combined measurement of more bit particles being physically difficult to realize;Next pertains only to dibit control non-sum single-bit H door operation, these operations can be realized in an ion trap;Finally this quantum resource of X state can be recycled in the agreement, improves resource utilization.
Description
Technical field
The present invention relates to field of quantum security communication more particularly to a kind of quantum dialogue sides based on x state and entanglement transfer
Method.
Background technique
In recent years, Quantum Secure Direct Communication (quantum secure direct communication, write a Chinese character in simplified form QSDC)
[1-5] is suggested and attracts wide attention.It allow sender with determine and safe mode directly transmit classified information (and
It is not random key) give recipient.Meanwhile a well-designed QSDC agreement also can theoretically reach unconditional security
Property.What initial QSDC agreement was completed is all one-way communication, so that two users cannot exchange secret information simultaneously.2004
Zhang [6-8] etc. and Nguyen proposes that quantum dialogue is this concept of BQSDC to overcome the problems, such as this, secret in this agreement
Close message can be along positive and negative both direction simultaneous transmission.Then, numerous studies personnel conduct in-depth research this, such as
Man [9-10] etc. proposes the quantum session protocol based on GHZ state and entanglement transfer, and 2009, Shan [11] etc. was proposed
One quantum session protocol based on two Bell state entanglement transfers in chamber QED.2010, Shi etc. [12] utilized a list
A photon and an auxiliary single photon propose one without quantum session protocol;Gao [13] etc. proposes two and is based on
Two Bell state entanglement transfers without quantum session protocol.
The preparation of multiparticle Entangled State is always the emphasis of quantum theory research, implements the department of physics of multiparticle Entangled State preparation
System mainly has chamber QED system, ion trap systems, and chamber assists photon scattering system, nonlinear crystal SPDC system.1997,
Haroche group is experimentally successfully prepared for EPR state [14] using atom and the interaction of chamber resonance.Nineteen ninety-five Cirac
Ion trap scheme [15] are proposed with Zoller.Retzker etc. is realized in ion trap systems using identical laser coupled intensity
Polyion internal electron state tangles [16].X state tangles one of resource as important in quantum communications, has and GHZ state
With W state it is entirely different tangle property and good stability;Wang Xinwen etc. proposes a simple scheme, in ion trap systems
In be prepared for real four quantum bits Entangled State | x00>3214[17]。
In general, the rotation process of single quantum bit is easy to accomplish, thus the physics for studying quantum calculation is real
Existing problem is actually just attributed to the operation that the controlled logic gate between two quantum bits how is realized in a physical system
Problem.The initial ion trap scheme of Quantum logic gates is to propose [18] by Cirac.Recently, Childs and Chuang [20] are pointed out,
Several ion external movement Fock states is occupied with higher, can realize ion trap in the case where being not required to ion auxiliary energy level and participating in
The basic logic unit of quantum calculation.Monroe [19] etc. experimentally realizes the internal and external degree of freedom of the single cooling ion of imprison
Between the controlled NOT logic door operation of quantum.
In view of the above shortcomings, the designer, is actively subject to research and innovation, a kind of use X state as amount to found
The two-way quantum secure direct communication agreement of child resource makes it with more the utility value in industry.
Summary of the invention
In order to solve the above technical problems, being talked with the object of the present invention is to provide a kind of based on the quantum of x state and entanglement transfer
Method uses X state as the two-way quantum secure direct communication agreement of quantum resource.
Quantum dialogue method based on x state and entanglement transfer of the invention, comprising steps of
Step 1: preparing quantum state
Sender prepares N number of four photon to (A1k, A2k, B1k, B2k) (k=1,2,3 ... ... N), by this N number of four photon pair
Every a pair of all compositions X state in sequence:
All particles are divided into two orderly particle sequence S by senderA, SB:
SA={ A11,A12,.....A1n,A21,A22,......,A2n}
SB={ B11,B12,......B1n,B21,B22,.....B2n};
Step 2: eavesdropping detection is distributed with particle
Sender oneself retains sequence SA, eavesdropping proceeds as follows in order to prevent:
(1) sender is in sequence SBPosition that is middle that enough trick particles are added, and telling recipient to inveigle particle,
It is middle inveigle particle be four kinds of random quantum states (| 0 >, | 1 >, |+>, | ->),
(2) recipient receiving end be randomly chosen Z base (| 0 >, | 1 >) or X base (|+>, | ->) measurement,
(3) recipient by common common signal channel accuse it is that sender measures every time as a result,
(4) whether sender is more than preset threshold value by the calculating bit error rate, judges current communication with the presence or absence of surreptitiously
It listens, if the bit error rate is more than threshold value, then it represents that there are listener-ins to open again then sender and recipients abandon specifically communicating
Begin;
Step 3: modulation quantum channel
Recipient is to B1kAnd B2kCarry out CZ operation (wherein B1kTo control particle, B2kFor intended particle), it can be obtained
Step 4: coding and decryption
Sender and recipient are respectively to particle A after Rejection of samples particle1k, B2kApply tenth of the twelve Earthly Branches operation Ui(i=1,2,3,4)
Encode dibit secret information, correspondingly A1k, B2kIt is changed into U respectivelyiA1k,UiB2k;Then sender uses respectively with recipient
Bell base measures A1kA2k,B1kB2k, and measurement result is published to other side by classical channel;From the announcement of recipient, sender
According to oneself to A1kThe tenth of the twelve Earthly Branches operation and to A1kA2kBell base measurement result read recipient dibit secret information;It is another
Aspect, from the announcement result of sender, recipient is according to oneself to B2kThe tenth of the twelve Earthly Branches operation and it is right
B1kB2kBell base measurement result, read the dibit secret information of sender;
Step 5: the recycling of particle
After sending a message, sender and recipient are to particle A1k, B2kTenth of the twelve Earthly Branches operation U can be appliedi, later from described
Step 2 restarts to execute.
Further, CZ operation can be replaced with H with control not operation in the step 3, recipient is right first
B2kSingle-bit H door operation is carried out, then to B1kAnd B2kCarry out CNOT operation (wherein B1kTo control particle, B2kFor intended particle),
Finally, again to B2kCarry out single-bit H door operation.
According to the above aspect of the present invention, the present invention uses two-way quantum secure direct communication agreement of the X state as quantum resource, the association
View guarantees that the secret of information sends using eavesdropping detection, and enabling remote legitimate correspondence both sides secure exchange, they are mutual
Secret information;Quantum dialogue method of the invention has following three essential characteristic, pertains only to during actualizing first
The Bell base of dibit particle measures, and will not relate to the combined measurement of more bit particles being physically difficult to realize;Its deuterzooid
Invention agreement pertains only to dibit control non-sum single-bit H door operation, both quantum logic operations are all physically realizable;
Finally this quantum resource of X state can be recycled in the agreement, improves resource utilization.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention,
And can be implemented in accordance with the contents of the specification, the following is a detailed description of the preferred embodiments of the present invention and the accompanying drawings.
Detailed description of the invention
Fig. 1 is two-way quantum session structure schematic diagram of the invention;
Fig. 2 is two-way quantum conversation process figure of the invention;
Fig. 3 is the transformational relation table of any two Bell state;
Fig. 4 is measurement result.
Symbol and tenth of the twelve Earthly Branches operating instruction are as follows in figure:
X state: | x >=| 0000 >+| 0011 >+| 1100 >-| 1111 >
H:
CN:
Four kinds of tenth of the twelve Earthly Branches operation: I=| 0><0 |+| 1><1 |, σz=| 0><0 |+| 1><1 |, σx=| 0><1 |+| 1><0 |, i σy=|
0><1|-|1><0|
Four kinds of tenth of the twelve Earthly Branches operate corresponding coding: U0=I, U1=σz、U2=i σy、U3=σx
Specific embodiment
With reference to the accompanying drawings and examples, specific embodiments of the present invention will be described in further detail.Implement below
Example is not intended to limit the scope of the invention for illustrating the present invention.
As depicted in figs. 1 and 2, the quantum dialogue method of the invention based on x state and entanglement transfer includes the following steps:
S1) prepared by quantum state: Alice (sender) prepares N number of four photon to (A1k, A2k, B1k B2k) (k=1,2,
3 ... ... N), this N number of four photon is to four photon of each of sequence to all composition X states:
All particles are divided into two orderly particle sequence S by AliceA, SB
SA={ A11,A12…A1n,A21,A22…A2n}
SB={ B11,B12…B1n,B21,B22…B2n}。
S2) eavesdropping detection is distributed with particle
Alice oneself retains sequence SA, eavesdropping needs to proceed as follows in order to prevent:
(1) Alice is in sequence SBThe middle position that enough trick particles are added and Bob (recipient) is told to inveigle particle
Set, wherein inveigle particle be four kinds of random quantum states (| 0 >, | 1 >, |+>, | ->)), such SBBecome SB' send Bob to, be
Prevent Eve from eavesdropping, Alice wouldn't disclose the state for sending particle.
(2) Bob receiving end be randomly chosen Z base (| 0 >, | 1 >) or X base (|+>, | ->) measurement, according to uncertainty principle
He can only once use a kind of tool.
(3) Bob tells the Alice result of his each measurement by common common signal channel.
(4) ideally, the measurement result of Bob and Alice, which are used to prepare, inveigles the base of particle to be consistent, Alice
Whether can be more than preset threshold value by calculating the bit error rate, judge current communication with the presence or absence of eavesdropping, if the bit error rate
More than threshold value, then it represents that there are listener-ins to restart then Alice and Bob just abandon specifically communicating.
Eavesdropping testing principle depends on that whether there is or not the accuracy of Bob measurement result when eavesdropping is different.Eavesdropping is examined below
Principle is surveyed to be further described:
(1) accuracy without eavesdropping Bob measurement result
Alice by inveigle particle be sent to Bob, to single particle Bob use at random Z base (| 0 >, | 1 >) or X base (|+>,
| ->) measurement, therefore be 1/2 without accuracy of choosing when eavesdropping to measurement base.For example, trick particle is | 0 > when Bob selects Z base X
A possibility that base is all 1/2, and wherein Z base is correctly to measure base, therefore the accuracy of Bob measurement single particle is 1/2.
(2) accuracy of Bob measurement result when having eavesdropping
When Eve is eavesdropped, since Eve does not know which kind of form particle is in, what Eve can be random uses Z base or X
Base measurement, therefore Eve choosing is 1/2 to the probability of measurement base, can be damaged to particle when Eve selects wrong measurement base, at this time Bob
Accuracy to single particle measurement is 1/4, opposite to have dropped 1/4 without Bob measurement single particle accuracy when eavesdropping.
S3) Channel Modulation
The sequence S after Rejection of samples particleB' become S againB.Have for dibit CZ operationCause
The control Z operation of this dibit may be implemented such as down conversion:
|00>12- > | 00 >12, | 01 >12- > | 01 >12, | 10 >12- > | 10 >12, | 11 >12- >-| 11 >12
Then Bob passes through B1kTo B2kIt is available to carry out CZ operation
Due toTherefore operating us for CZ can also be non-using single-bit H and dibit control
Operation replaces.
Wherein,Therefore dibit CNOT operation is just like down conversion: | 00 >-> | 00 >, | 01
>-> | 01 >, | 10 >-> | 11 >, | 11 >-> | 10 >
To H, have therefore
Bob is first to B2kIt is available to carry out single-bit H door operation
Then, Bob is to B1kAnd B2kCarry out CNOT operation (wherein B1kTo control particle, B2kFor intended particle)
Finally, Bob is again to B2kCarry out single-bit H door operation
Ion trap scheme can be taken for single-bit H door operation and dibit CNOT operation.
S4 it) encodes
The sequence S after Rejection of samples particleB' become S againB, subsequent Alice, Bob are respectively to particle A1k, B2kApply tenth of the twelve Earthly Branches operation
Ui(i=1,2,3,4) encodes their dibit secret information, correspondingly A1k, B2kIt is changed into U respectivelyiA1k,UiB2k。
1 pair of coding is described further with reference to the accompanying drawing.
Bell state is two particle maximal entangled state, can be indicated with following formula:
Definition
U0=I, U1=σz、U2=i σy、U3=σx
Wherein I=| 0><0 |+| 1><1 |, σz=| 0><0 |+| 1><1 |,
σx=| 0><1 |+| 1><0 |, i σy=| 0><1 |-| 1><0 | it is four single-particle tenth of the twelve Earthly Branches operations.By Uk(k=0,1,2,
3) after being applied to first and second particle, a Bell state translates into another Bell state.Transforming relationship such as Fig. 3 institute
Show.Enable each UkCorresponding dibit information, i.e. U0=00, U1=01, U2=10 and U3=11.
Alice, Bob are respectively to A1, B2Carry out four kinds of positive operation I, σx、σz、iσyThis makes it possible to obtain A1A2B1B216
Kind combination, further Alice, Bob are respectively to the A of each combination1A2, B1B2Carry out the measurement of Bell base,Such as when
Alice is to A1Carry out σxOperation, Bob is to B2Carry out σzOperation obtains
Remaining 15 kinds possible combination calculating process are similar.Table is made in all measurement results, (wherein U as shown in Figure 40=
I、U1=σz、U2=i σy、U3=σx)。
Observation table can be seen that each row and column share 16 expression formulas, and this 16 expression formulas are different,
This illustrates A after entanglement transfer1A2、B1B2Each result combine really unique corresponding A1B1、A2B2An initial pool.
S5) measurement and decoding
Alice, Bob use Bell base to measure A respectively1A2With B1B2, and their measurement result is passed through into classical channel and is announced
To other side;From the announcement of Bob, Alice is according to oneself to A1The tenth of the twelve Earthly Branches operation and he to A1A2Bell base measurement result read Bob
Dibit secret information;On the other hand, from the announcement of Alice, Bob is according to oneself to B2The tenth of the twelve Earthly Branches operation and he to B1B2's
Bell base measurement result, Bob can also read the dibit secret information of Alice.
S6) the recycling of particle
It, can be respectively to particle A after Alice, Bob send a message1, B2Apply tenth of the twelve Earthly Branches operation, later again from step S2
Start to execute.
Embodiment:
Now withFor dialog procedure is explained further.Assume after Bob completes Channel Modulation
The dibit information of Alice is the dibit information 01 of 10, Bob.Alice, Bob are respectively to Ak1、Bk2Bell base is carried out to measure
It arrives:
If the measurement result of Alic and Bob is respectivelyThen Alice is according to oneself to Ak1's
Operation is i σy(it is encoded to U2), the secret information that Bob can be uniquely determined from Fig. 4 is U1(01).Similarly, Bob is according to certainly
Oneself is to Bk2Operation be σz, the operation that Alice can be uniquely determined from Fig. 4 is i σy, Bob obtains the secret letter of Alice accordingly
Breath is U2(10)。
The above is only a preferred embodiment of the present invention, it is not intended to restrict the invention, it is noted that for this skill
For the those of ordinary skill in art field, without departing from the technical principles of the invention, can also make it is several improvement and
Modification, these improvements and modifications also should be regarded as protection scope of the present invention.
Claims (2)
1. a kind of quantum dialogue method based on x state and entanglement transfer, it is characterised in that comprising steps of
Step 1: preparing quantum state
Sender prepares N number of four photon to A1k, A2k, B1k, B2k, k=1,2,3 ... ... N, by this N number of four photon in sequence
Every a pair of all compositions X state:
All particles are divided into two orderly particle sequence S by senderA, SB:
SA={ A11,A12,.....A1n,A21,A22,......,A2n}
SB={ B11,B12,......B1n,B21,B22,.....B2n};
Step 2: eavesdropping detection is distributed with particle
Sender oneself retains sequence SA, eavesdropping proceeds as follows in order to prevent:
(1) sender is in sequence SBPosition that is middle that enough trick particles are added, and telling recipient to inveigle particle, wherein luring
Deceiving particle is four kinds of random quantum states | 0 >, | 1 >, |+>, | ->,
(2) recipient is randomly chosen Z base in receiving end | 0 >, | 1 > or X base |+>, | -> measurement,
(3) recipient by common common signal channel accuse it is that sender measures every time as a result,
(4) whether sender is more than preset threshold value by calculating the bit error rate, judges current communicate with the presence or absence of eavesdropping, such as
The fruit bit error rate is more than threshold value, then it represents that there are listener-ins to restart then sender and recipients abandon specifically communicating;
Step 3: modulation quantum channel
Recipient is to B1kAnd B2kCarry out CZ operation, wherein B1kTo control particle, B2kFor intended particle, can be obtained
Step 4: coding and decryption
Sender and recipient are respectively to particle A after Rejection of samples particle1k, B2kApply tenth of the twelve Earthly Branches operation Ui, wherein i=0,1,2,3
Encode dibit secret information, correspondingly A1k, B2kIt is changed into U respectivelyiA1k,UiB2k;Then sender uses respectively with recipient
Bell base measures A1kA2k,B1kB2k, and measurement result is published to other side by classical channel;From the announcement of recipient, sender
According to oneself to A1kThe tenth of the twelve Earthly Branches operation and to A1kA2kBell base measurement result read recipient dibit secret information;It is another
Aspect, from the announcement result of sender, recipient is according to oneself to B2kThe tenth of the twelve Earthly Branches operation and to B1kB2kBell base measure knot
Fruit reads the dibit secret information of sender;
Step 5: the recycling of particle
After sending a message, sender and recipient are to particle A1k, B2kTenth of the twelve Earthly Branches operation U can be appliedi, later from the step
Two restart to execute.
2. the quantum dialogue method according to claim 1 based on x state and entanglement transfer, it is characterised in that: the step
CZ operation can be replaced with H with control not operation in three, recipient is first to B2kSingle-bit H door operation is carried out, then right
B1kAnd B2kCarry out CNOT operation, wherein B1kTo control particle, B2kFor intended particle, finally, again to B2kCarry out single-bit H
Door operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610223688.9A CN106027232B (en) | 2016-04-12 | 2016-04-12 | A kind of quantum dialogue method based on x state and entanglement transfer |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610223688.9A CN106027232B (en) | 2016-04-12 | 2016-04-12 | A kind of quantum dialogue method based on x state and entanglement transfer |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106027232A CN106027232A (en) | 2016-10-12 |
CN106027232B true CN106027232B (en) | 2019-01-01 |
Family
ID=57081092
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610223688.9A Active CN106027232B (en) | 2016-04-12 | 2016-04-12 | A kind of quantum dialogue method based on x state and entanglement transfer |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106027232B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113489550A (en) * | 2021-07-02 | 2021-10-08 | 浙江工商大学 | Quantum encryption quantum conversation method based on single photon with polarization and empty mode freedom degrees |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108650089A (en) * | 2018-07-17 | 2018-10-12 | 江苏亨通问天量子信息研究院有限公司 | The safe direct information communication means of quantum based on three degree of freedom and system |
CN109525327B (en) * | 2018-12-11 | 2021-07-06 | 国网江苏省电力有限公司南京供电分公司 | Free space quantum secure direct communication method with preset threshold selected in real time |
CN109768802B (en) * | 2019-01-15 | 2021-05-18 | 西安电子科技大学 | Method for realizing fault-tolerant logic H gate based on RMQC code |
CN110505060B (en) * | 2019-09-02 | 2021-07-02 | 苏州大学 | Non-maximum entangled two-level bell state quantum conversation method |
CN113193921B (en) * | 2021-04-29 | 2023-01-17 | 苏州大学 | Quantum dialogue method based on multiple channel combination |
CN116435001B (en) * | 2023-06-13 | 2023-11-10 | 华翊博奥(北京)量子科技有限公司 | Chip ion trap |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102801521A (en) * | 2012-09-05 | 2012-11-28 | 浙江工商大学 | Quantum steganography protocol based on quantum electrodynamics (QED) |
CN103281176A (en) * | 2013-06-03 | 2013-09-04 | 浙江工商大学 | Non-information leakage controlled quantum conversation protocol based on using entanglement exchange measurement correlation and reducing transmission efficiency |
CN103281328A (en) * | 2013-06-03 | 2013-09-04 | 浙江工商大学 | Anti-information-disclosure quantum conversation protocol based on single quantum entanglement measurement correlation |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7920704B2 (en) * | 2004-10-09 | 2011-04-05 | The United States Of America As Represented By The Secretary Of The Army | Systems and methods for obtaining information on a key in BB84 protocol of quantum key distribution |
-
2016
- 2016-04-12 CN CN201610223688.9A patent/CN106027232B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102801521A (en) * | 2012-09-05 | 2012-11-28 | 浙江工商大学 | Quantum steganography protocol based on quantum electrodynamics (QED) |
CN103281176A (en) * | 2013-06-03 | 2013-09-04 | 浙江工商大学 | Non-information leakage controlled quantum conversation protocol based on using entanglement exchange measurement correlation and reducing transmission efficiency |
CN103281328A (en) * | 2013-06-03 | 2013-09-04 | 浙江工商大学 | Anti-information-disclosure quantum conversation protocol based on single quantum entanglement measurement correlation |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113489550A (en) * | 2021-07-02 | 2021-10-08 | 浙江工商大学 | Quantum encryption quantum conversation method based on single photon with polarization and empty mode freedom degrees |
CN113489550B (en) * | 2021-07-02 | 2022-07-01 | 浙江工商大学 | Quantum encryption quantum conversation method based on single photon with polarization and empty mode freedom degrees |
Also Published As
Publication number | Publication date |
---|---|
CN106027232A (en) | 2016-10-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106027232B (en) | A kind of quantum dialogue method based on x state and entanglement transfer | |
Zhang et al. | Quantum secure direct communication based on four-qubit cluster states | |
Chun-Yan et al. | Secure quantum key distribution network with Bell states and local unitary operations | |
Adhikari et al. | Probabilistic secret sharing through noisy quantum channels | |
Zhong-Xiao et al. | Improvement of security of three-party quantum secure direct communication based on GHZ states | |
CN107666356B (en) | Requirement classical communication person based on single photon has half quantum dialogue method of measurement capability | |
Li et al. | Fault tolerant quantum key distribution based on quantum dense coding with collective noise | |
Wang et al. | Efficient quantum dialogue using entangled states and entanglement swapping without information leakage | |
Xie et al. | Semi-quantum secure direct communication scheme based on bell states | |
CN110401494A (en) | The unrelated quantum safety direct communication method of measuring device on high n-dimensional subspace n | |
Fu-Guo et al. | Eavesdropping on theping-pong'quantum communication protocol freely in a noise channel | |
Li et al. | A noise immunity controlled quantum teleportation protocol | |
Huang et al. | Multi-user quantum key distribution with collective eavesdropping detection over collective-noise channels | |
CN106850197B (en) | A kind of symmetrical parallel control two-way quantum secure direct communication method | |
Henao et al. | Practical security analysis of two-way quantum-key-distribution protocols based on nonorthogonal states | |
Wang et al. | Multiparty controlled quantum secure direct communication with phase encryption | |
Gao | Information leakage in quantum dialogue by using the two-qutrit entangled states | |
Heo et al. | A quantum communication protocol transferring unknown photons using path-polarization hybrid entanglement | |
CN106161014B (en) | Quantum privacy comparison method based on cavity QED | |
Xiao-Long et al. | Quantum secure direct communication with Greenberger–Horne–Zeilinger-type state (GHZ state) over noisy channels | |
Aravinda et al. | Orthogonal-state-based cryptography in quantum mechanics and local post-quantum theories | |
Shan et al. | Quantum secret sharing in driven cavity QED | |
Usenko et al. | Continuous-and discrete-variable quantum key distribution with nonclassical light over noisy channels | |
Song et al. | A quantum secure direct communication protocol based on six-qubit cluster state | |
Jian et al. | An improved “Ping-pong” protocol based on four-qubit genuine entangled state |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |