CN106027232B - A kind of quantum dialogue method based on x state and entanglement transfer - Google Patents

A kind of quantum dialogue method based on x state and entanglement transfer Download PDF

Info

Publication number
CN106027232B
CN106027232B CN201610223688.9A CN201610223688A CN106027232B CN 106027232 B CN106027232 B CN 106027232B CN 201610223688 A CN201610223688 A CN 201610223688A CN 106027232 B CN106027232 B CN 106027232B
Authority
CN
China
Prior art keywords
particle
sender
recipient
quantum
state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610223688.9A
Other languages
Chinese (zh)
Other versions
CN106027232A (en
Inventor
姜敏
方盛晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou University
Original Assignee
Suzhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou University filed Critical Suzhou University
Priority to CN201610223688.9A priority Critical patent/CN106027232B/en
Publication of CN106027232A publication Critical patent/CN106027232A/en
Application granted granted Critical
Publication of CN106027232B publication Critical patent/CN106027232B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks

Abstract

The present invention relates to a kind of quantum dialogue method based on x state and entanglement transfer, communicating pair uses x state to carry out two-way communication as quantum channel, guarantee that the safety of particle is sent using eavesdropping detection, so that remote legitimate correspondence both sides being capable of secure exchange their mutual secret informations.Compared with existing agreement, quantum dialogue method of the invention has following three essential characteristic, pertains only to the Bell base measurement of dibit particle during actualizing first, will not relate to the combined measurement of more bit particles being physically difficult to realize;Next pertains only to dibit control non-sum single-bit H door operation, these operations can be realized in an ion trap;Finally this quantum resource of X state can be recycled in the agreement, improves resource utilization.

Description

A kind of quantum dialogue method based on x state and entanglement transfer
Technical field
The present invention relates to field of quantum security communication more particularly to a kind of quantum dialogue sides based on x state and entanglement transfer Method.
Background technique
In recent years, Quantum Secure Direct Communication (quantum secure direct communication, write a Chinese character in simplified form QSDC) [1-5] is suggested and attracts wide attention.It allow sender with determine and safe mode directly transmit classified information (and It is not random key) give recipient.Meanwhile a well-designed QSDC agreement also can theoretically reach unconditional security Property.What initial QSDC agreement was completed is all one-way communication, so that two users cannot exchange secret information simultaneously.2004 Zhang [6-8] etc. and Nguyen proposes that quantum dialogue is this concept of BQSDC to overcome the problems, such as this, secret in this agreement Close message can be along positive and negative both direction simultaneous transmission.Then, numerous studies personnel conduct in-depth research this, such as Man [9-10] etc. proposes the quantum session protocol based on GHZ state and entanglement transfer, and 2009, Shan [11] etc. was proposed One quantum session protocol based on two Bell state entanglement transfers in chamber QED.2010, Shi etc. [12] utilized a list A photon and an auxiliary single photon propose one without quantum session protocol;Gao [13] etc. proposes two and is based on Two Bell state entanglement transfers without quantum session protocol.
The preparation of multiparticle Entangled State is always the emphasis of quantum theory research, implements the department of physics of multiparticle Entangled State preparation System mainly has chamber QED system, ion trap systems, and chamber assists photon scattering system, nonlinear crystal SPDC system.1997, Haroche group is experimentally successfully prepared for EPR state [14] using atom and the interaction of chamber resonance.Nineteen ninety-five Cirac Ion trap scheme [15] are proposed with Zoller.Retzker etc. is realized in ion trap systems using identical laser coupled intensity Polyion internal electron state tangles [16].X state tangles one of resource as important in quantum communications, has and GHZ state With W state it is entirely different tangle property and good stability;Wang Xinwen etc. proposes a simple scheme, in ion trap systems In be prepared for real four quantum bits Entangled State | x00>3214[17]。
In general, the rotation process of single quantum bit is easy to accomplish, thus the physics for studying quantum calculation is real Existing problem is actually just attributed to the operation that the controlled logic gate between two quantum bits how is realized in a physical system Problem.The initial ion trap scheme of Quantum logic gates is to propose [18] by Cirac.Recently, Childs and Chuang [20] are pointed out, Several ion external movement Fock states is occupied with higher, can realize ion trap in the case where being not required to ion auxiliary energy level and participating in The basic logic unit of quantum calculation.Monroe [19] etc. experimentally realizes the internal and external degree of freedom of the single cooling ion of imprison Between the controlled NOT logic door operation of quantum.
In view of the above shortcomings, the designer, is actively subject to research and innovation, a kind of use X state as amount to found The two-way quantum secure direct communication agreement of child resource makes it with more the utility value in industry.
Summary of the invention
In order to solve the above technical problems, being talked with the object of the present invention is to provide a kind of based on the quantum of x state and entanglement transfer Method uses X state as the two-way quantum secure direct communication agreement of quantum resource.
Quantum dialogue method based on x state and entanglement transfer of the invention, comprising steps of
Step 1: preparing quantum state
Sender prepares N number of four photon to (A1k, A2k, B1k, B2k) (k=1,2,3 ... ... N), by this N number of four photon pair Every a pair of all compositions X state in sequence:
All particles are divided into two orderly particle sequence S by senderA, SB:
SA={ A11,A12,.....A1n,A21,A22,......,A2n}
SB={ B11,B12,......B1n,B21,B22,.....B2n};
Step 2: eavesdropping detection is distributed with particle
Sender oneself retains sequence SA, eavesdropping proceeds as follows in order to prevent:
(1) sender is in sequence SBPosition that is middle that enough trick particles are added, and telling recipient to inveigle particle, It is middle inveigle particle be four kinds of random quantum states (| 0 >, | 1 >, |+>, | ->),
(2) recipient receiving end be randomly chosen Z base (| 0 >, | 1 >) or X base (|+>, | ->) measurement,
(3) recipient by common common signal channel accuse it is that sender measures every time as a result,
(4) whether sender is more than preset threshold value by the calculating bit error rate, judges current communication with the presence or absence of surreptitiously It listens, if the bit error rate is more than threshold value, then it represents that there are listener-ins to open again then sender and recipients abandon specifically communicating Begin;
Step 3: modulation quantum channel
Recipient is to B1kAnd B2kCarry out CZ operation (wherein B1kTo control particle, B2kFor intended particle), it can be obtained
Step 4: coding and decryption
Sender and recipient are respectively to particle A after Rejection of samples particle1k, B2kApply tenth of the twelve Earthly Branches operation Ui(i=1,2,3,4) Encode dibit secret information, correspondingly A1k, B2kIt is changed into U respectivelyiA1k,UiB2k;Then sender uses respectively with recipient Bell base measures A1kA2k,B1kB2k, and measurement result is published to other side by classical channel;From the announcement of recipient, sender According to oneself to A1kThe tenth of the twelve Earthly Branches operation and to A1kA2kBell base measurement result read recipient dibit secret information;It is another Aspect, from the announcement result of sender, recipient is according to oneself to B2kThe tenth of the twelve Earthly Branches operation and it is right
B1kB2kBell base measurement result, read the dibit secret information of sender;
Step 5: the recycling of particle
After sending a message, sender and recipient are to particle A1k, B2kTenth of the twelve Earthly Branches operation U can be appliedi, later from described Step 2 restarts to execute.
Further, CZ operation can be replaced with H with control not operation in the step 3, recipient is right first B2kSingle-bit H door operation is carried out, then to B1kAnd B2kCarry out CNOT operation (wherein B1kTo control particle, B2kFor intended particle), Finally, again to B2kCarry out single-bit H door operation.
According to the above aspect of the present invention, the present invention uses two-way quantum secure direct communication agreement of the X state as quantum resource, the association View guarantees that the secret of information sends using eavesdropping detection, and enabling remote legitimate correspondence both sides secure exchange, they are mutual Secret information;Quantum dialogue method of the invention has following three essential characteristic, pertains only to during actualizing first The Bell base of dibit particle measures, and will not relate to the combined measurement of more bit particles being physically difficult to realize;Its deuterzooid Invention agreement pertains only to dibit control non-sum single-bit H door operation, both quantum logic operations are all physically realizable; Finally this quantum resource of X state can be recycled in the agreement, improves resource utilization.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And can be implemented in accordance with the contents of the specification, the following is a detailed description of the preferred embodiments of the present invention and the accompanying drawings.
Detailed description of the invention
Fig. 1 is two-way quantum session structure schematic diagram of the invention;
Fig. 2 is two-way quantum conversation process figure of the invention;
Fig. 3 is the transformational relation table of any two Bell state;
Fig. 4 is measurement result.
Symbol and tenth of the twelve Earthly Branches operating instruction are as follows in figure:
X state: | x >=| 0000 >+| 0011 >+| 1100 >-| 1111 >
H:
CN:
Four kinds of tenth of the twelve Earthly Branches operation: I=| 0><0 |+| 1><1 |, σz=| 0><0 |+| 1><1 |, σx=| 0><1 |+| 1><0 |, i σy=| 0><1|-|1><0|
Four kinds of tenth of the twelve Earthly Branches operate corresponding coding: U0=I, U1z、U2=i σy、U3x
Specific embodiment
With reference to the accompanying drawings and examples, specific embodiments of the present invention will be described in further detail.Implement below Example is not intended to limit the scope of the invention for illustrating the present invention.
As depicted in figs. 1 and 2, the quantum dialogue method of the invention based on x state and entanglement transfer includes the following steps:
S1) prepared by quantum state: Alice (sender) prepares N number of four photon to (A1k, A2k, B1k B2k) (k=1,2, 3 ... ... N), this N number of four photon is to four photon of each of sequence to all composition X states:
All particles are divided into two orderly particle sequence S by AliceA, SB
SA={ A11,A12…A1n,A21,A22…A2n}
SB={ B11,B12…B1n,B21,B22…B2n}。
S2) eavesdropping detection is distributed with particle
Alice oneself retains sequence SA, eavesdropping needs to proceed as follows in order to prevent:
(1) Alice is in sequence SBThe middle position that enough trick particles are added and Bob (recipient) is told to inveigle particle Set, wherein inveigle particle be four kinds of random quantum states (| 0 >, | 1 >, |+>, | ->)), such SBBecome SB' send Bob to, be Prevent Eve from eavesdropping, Alice wouldn't disclose the state for sending particle.
(2) Bob receiving end be randomly chosen Z base (| 0 >, | 1 >) or X base (|+>, | ->) measurement, according to uncertainty principle He can only once use a kind of tool.
(3) Bob tells the Alice result of his each measurement by common common signal channel.
(4) ideally, the measurement result of Bob and Alice, which are used to prepare, inveigles the base of particle to be consistent, Alice Whether can be more than preset threshold value by calculating the bit error rate, judge current communication with the presence or absence of eavesdropping, if the bit error rate More than threshold value, then it represents that there are listener-ins to restart then Alice and Bob just abandon specifically communicating.
Eavesdropping testing principle depends on that whether there is or not the accuracy of Bob measurement result when eavesdropping is different.Eavesdropping is examined below Principle is surveyed to be further described:
(1) accuracy without eavesdropping Bob measurement result
Alice by inveigle particle be sent to Bob, to single particle Bob use at random Z base (| 0 >, | 1 >) or X base (|+>, | ->) measurement, therefore be 1/2 without accuracy of choosing when eavesdropping to measurement base.For example, trick particle is | 0 > when Bob selects Z base X A possibility that base is all 1/2, and wherein Z base is correctly to measure base, therefore the accuracy of Bob measurement single particle is 1/2.
(2) accuracy of Bob measurement result when having eavesdropping
When Eve is eavesdropped, since Eve does not know which kind of form particle is in, what Eve can be random uses Z base or X Base measurement, therefore Eve choosing is 1/2 to the probability of measurement base, can be damaged to particle when Eve selects wrong measurement base, at this time Bob Accuracy to single particle measurement is 1/4, opposite to have dropped 1/4 without Bob measurement single particle accuracy when eavesdropping.
S3) Channel Modulation
The sequence S after Rejection of samples particleB' become S againB.Have for dibit CZ operationCause The control Z operation of this dibit may be implemented such as down conversion:
|00>12- > | 00 >12, | 01 >12- > | 01 >12, | 10 >12- > | 10 >12, | 11 >12- >-| 11 >12
Then Bob passes through B1kTo B2kIt is available to carry out CZ operation
Due toTherefore operating us for CZ can also be non-using single-bit H and dibit control Operation replaces.
Wherein,Therefore dibit CNOT operation is just like down conversion: | 00 >-> | 00 >, | 01 >-> | 01 >, | 10 >-> | 11 >, | 11 >-> | 10 >
To H, have therefore
Bob is first to B2kIt is available to carry out single-bit H door operation
Then, Bob is to B1kAnd B2kCarry out CNOT operation (wherein B1kTo control particle, B2kFor intended particle)
Finally, Bob is again to B2kCarry out single-bit H door operation
Ion trap scheme can be taken for single-bit H door operation and dibit CNOT operation.
S4 it) encodes
The sequence S after Rejection of samples particleB' become S againB, subsequent Alice, Bob are respectively to particle A1k, B2kApply tenth of the twelve Earthly Branches operation Ui(i=1,2,3,4) encodes their dibit secret information, correspondingly A1k, B2kIt is changed into U respectivelyiA1k,UiB2k
1 pair of coding is described further with reference to the accompanying drawing.
Bell state is two particle maximal entangled state, can be indicated with following formula:
Definition
U0=I, U1z、U2=i σy、U3x
Wherein I=| 0><0 |+| 1><1 |, σz=| 0><0 |+| 1><1 |,
σx=| 0><1 |+| 1><0 |, i σy=| 0><1 |-| 1><0 | it is four single-particle tenth of the twelve Earthly Branches operations.By Uk(k=0,1,2, 3) after being applied to first and second particle, a Bell state translates into another Bell state.Transforming relationship such as Fig. 3 institute Show.Enable each UkCorresponding dibit information, i.e. U0=00, U1=01, U2=10 and U3=11.
Alice, Bob are respectively to A1, B2Carry out four kinds of positive operation I, σx、σz、iσyThis makes it possible to obtain A1A2B1B216 Kind combination, further Alice, Bob are respectively to the A of each combination1A2, B1B2Carry out the measurement of Bell base,Such as when Alice is to A1Carry out σxOperation, Bob is to B2Carry out σzOperation obtains
Remaining 15 kinds possible combination calculating process are similar.Table is made in all measurement results, (wherein U as shown in Figure 40= I、U1z、U2=i σy、U3x)。
Observation table can be seen that each row and column share 16 expression formulas, and this 16 expression formulas are different, This illustrates A after entanglement transfer1A2、B1B2Each result combine really unique corresponding A1B1、A2B2An initial pool.
S5) measurement and decoding
Alice, Bob use Bell base to measure A respectively1A2With B1B2, and their measurement result is passed through into classical channel and is announced To other side;From the announcement of Bob, Alice is according to oneself to A1The tenth of the twelve Earthly Branches operation and he to A1A2Bell base measurement result read Bob Dibit secret information;On the other hand, from the announcement of Alice, Bob is according to oneself to B2The tenth of the twelve Earthly Branches operation and he to B1B2's Bell base measurement result, Bob can also read the dibit secret information of Alice.
S6) the recycling of particle
It, can be respectively to particle A after Alice, Bob send a message1, B2Apply tenth of the twelve Earthly Branches operation, later again from step S2 Start to execute.
Embodiment:
Now withFor dialog procedure is explained further.Assume after Bob completes Channel Modulation The dibit information of Alice is the dibit information 01 of 10, Bob.Alice, Bob are respectively to Ak1、Bk2Bell base is carried out to measure It arrives:
If the measurement result of Alic and Bob is respectivelyThen Alice is according to oneself to Ak1's Operation is i σy(it is encoded to U2), the secret information that Bob can be uniquely determined from Fig. 4 is U1(01).Similarly, Bob is according to certainly Oneself is to Bk2Operation be σz, the operation that Alice can be uniquely determined from Fig. 4 is i σy, Bob obtains the secret letter of Alice accordingly Breath is U2(10)。
The above is only a preferred embodiment of the present invention, it is not intended to restrict the invention, it is noted that for this skill For the those of ordinary skill in art field, without departing from the technical principles of the invention, can also make it is several improvement and Modification, these improvements and modifications also should be regarded as protection scope of the present invention.

Claims (2)

1. a kind of quantum dialogue method based on x state and entanglement transfer, it is characterised in that comprising steps of
Step 1: preparing quantum state
Sender prepares N number of four photon to A1k, A2k, B1k, B2k, k=1,2,3 ... ... N, by this N number of four photon in sequence Every a pair of all compositions X state:
All particles are divided into two orderly particle sequence S by senderA, SB:
SA={ A11,A12,.....A1n,A21,A22,......,A2n}
SB={ B11,B12,......B1n,B21,B22,.....B2n};
Step 2: eavesdropping detection is distributed with particle
Sender oneself retains sequence SA, eavesdropping proceeds as follows in order to prevent:
(1) sender is in sequence SBPosition that is middle that enough trick particles are added, and telling recipient to inveigle particle, wherein luring Deceiving particle is four kinds of random quantum states | 0 >, | 1 >, |+>, | ->,
(2) recipient is randomly chosen Z base in receiving end | 0 >, | 1 > or X base |+>, | -> measurement,
(3) recipient by common common signal channel accuse it is that sender measures every time as a result,
(4) whether sender is more than preset threshold value by calculating the bit error rate, judges current communicate with the presence or absence of eavesdropping, such as The fruit bit error rate is more than threshold value, then it represents that there are listener-ins to restart then sender and recipients abandon specifically communicating;
Step 3: modulation quantum channel
Recipient is to B1kAnd B2kCarry out CZ operation, wherein B1kTo control particle, B2kFor intended particle, can be obtained
Step 4: coding and decryption
Sender and recipient are respectively to particle A after Rejection of samples particle1k, B2kApply tenth of the twelve Earthly Branches operation Ui, wherein i=0,1,2,3 Encode dibit secret information, correspondingly A1k, B2kIt is changed into U respectivelyiA1k,UiB2k;Then sender uses respectively with recipient Bell base measures A1kA2k,B1kB2k, and measurement result is published to other side by classical channel;From the announcement of recipient, sender According to oneself to A1kThe tenth of the twelve Earthly Branches operation and to A1kA2kBell base measurement result read recipient dibit secret information;It is another Aspect, from the announcement result of sender, recipient is according to oneself to B2kThe tenth of the twelve Earthly Branches operation and to B1kB2kBell base measure knot Fruit reads the dibit secret information of sender;
Step 5: the recycling of particle
After sending a message, sender and recipient are to particle A1k, B2kTenth of the twelve Earthly Branches operation U can be appliedi, later from the step Two restart to execute.
2. the quantum dialogue method according to claim 1 based on x state and entanglement transfer, it is characterised in that: the step CZ operation can be replaced with H with control not operation in three, recipient is first to B2kSingle-bit H door operation is carried out, then right B1kAnd B2kCarry out CNOT operation, wherein B1kTo control particle, B2kFor intended particle, finally, again to B2kCarry out single-bit H Door operation.
CN201610223688.9A 2016-04-12 2016-04-12 A kind of quantum dialogue method based on x state and entanglement transfer Active CN106027232B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610223688.9A CN106027232B (en) 2016-04-12 2016-04-12 A kind of quantum dialogue method based on x state and entanglement transfer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610223688.9A CN106027232B (en) 2016-04-12 2016-04-12 A kind of quantum dialogue method based on x state and entanglement transfer

Publications (2)

Publication Number Publication Date
CN106027232A CN106027232A (en) 2016-10-12
CN106027232B true CN106027232B (en) 2019-01-01

Family

ID=57081092

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610223688.9A Active CN106027232B (en) 2016-04-12 2016-04-12 A kind of quantum dialogue method based on x state and entanglement transfer

Country Status (1)

Country Link
CN (1) CN106027232B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113489550A (en) * 2021-07-02 2021-10-08 浙江工商大学 Quantum encryption quantum conversation method based on single photon with polarization and empty mode freedom degrees

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108650089A (en) * 2018-07-17 2018-10-12 江苏亨通问天量子信息研究院有限公司 The safe direct information communication means of quantum based on three degree of freedom and system
CN109525327B (en) * 2018-12-11 2021-07-06 国网江苏省电力有限公司南京供电分公司 Free space quantum secure direct communication method with preset threshold selected in real time
CN109768802B (en) * 2019-01-15 2021-05-18 西安电子科技大学 Method for realizing fault-tolerant logic H gate based on RMQC code
CN110505060B (en) * 2019-09-02 2021-07-02 苏州大学 Non-maximum entangled two-level bell state quantum conversation method
CN113193921B (en) * 2021-04-29 2023-01-17 苏州大学 Quantum dialogue method based on multiple channel combination
CN116435001B (en) * 2023-06-13 2023-11-10 华翊博奥(北京)量子科技有限公司 Chip ion trap

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102801521A (en) * 2012-09-05 2012-11-28 浙江工商大学 Quantum steganography protocol based on quantum electrodynamics (QED)
CN103281176A (en) * 2013-06-03 2013-09-04 浙江工商大学 Non-information leakage controlled quantum conversation protocol based on using entanglement exchange measurement correlation and reducing transmission efficiency
CN103281328A (en) * 2013-06-03 2013-09-04 浙江工商大学 Anti-information-disclosure quantum conversation protocol based on single quantum entanglement measurement correlation

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7920704B2 (en) * 2004-10-09 2011-04-05 The United States Of America As Represented By The Secretary Of The Army Systems and methods for obtaining information on a key in BB84 protocol of quantum key distribution

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102801521A (en) * 2012-09-05 2012-11-28 浙江工商大学 Quantum steganography protocol based on quantum electrodynamics (QED)
CN103281176A (en) * 2013-06-03 2013-09-04 浙江工商大学 Non-information leakage controlled quantum conversation protocol based on using entanglement exchange measurement correlation and reducing transmission efficiency
CN103281328A (en) * 2013-06-03 2013-09-04 浙江工商大学 Anti-information-disclosure quantum conversation protocol based on single quantum entanglement measurement correlation

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113489550A (en) * 2021-07-02 2021-10-08 浙江工商大学 Quantum encryption quantum conversation method based on single photon with polarization and empty mode freedom degrees
CN113489550B (en) * 2021-07-02 2022-07-01 浙江工商大学 Quantum encryption quantum conversation method based on single photon with polarization and empty mode freedom degrees

Also Published As

Publication number Publication date
CN106027232A (en) 2016-10-12

Similar Documents

Publication Publication Date Title
CN106027232B (en) A kind of quantum dialogue method based on x state and entanglement transfer
Zhang et al. Quantum secure direct communication based on four-qubit cluster states
Chun-Yan et al. Secure quantum key distribution network with Bell states and local unitary operations
Adhikari et al. Probabilistic secret sharing through noisy quantum channels
Zhong-Xiao et al. Improvement of security of three-party quantum secure direct communication based on GHZ states
CN107666356B (en) Requirement classical communication person based on single photon has half quantum dialogue method of measurement capability
Li et al. Fault tolerant quantum key distribution based on quantum dense coding with collective noise
Wang et al. Efficient quantum dialogue using entangled states and entanglement swapping without information leakage
Xie et al. Semi-quantum secure direct communication scheme based on bell states
CN110401494A (en) The unrelated quantum safety direct communication method of measuring device on high n-dimensional subspace n
Fu-Guo et al. Eavesdropping on theping-pong'quantum communication protocol freely in a noise channel
Li et al. A noise immunity controlled quantum teleportation protocol
Huang et al. Multi-user quantum key distribution with collective eavesdropping detection over collective-noise channels
CN106850197B (en) A kind of symmetrical parallel control two-way quantum secure direct communication method
Henao et al. Practical security analysis of two-way quantum-key-distribution protocols based on nonorthogonal states
Wang et al. Multiparty controlled quantum secure direct communication with phase encryption
Gao Information leakage in quantum dialogue by using the two-qutrit entangled states
Heo et al. A quantum communication protocol transferring unknown photons using path-polarization hybrid entanglement
CN106161014B (en) Quantum privacy comparison method based on cavity QED
Xiao-Long et al. Quantum secure direct communication with Greenberger–Horne–Zeilinger-type state (GHZ state) over noisy channels
Aravinda et al. Orthogonal-state-based cryptography in quantum mechanics and local post-quantum theories
Shan et al. Quantum secret sharing in driven cavity QED
Usenko et al. Continuous-and discrete-variable quantum key distribution with nonclassical light over noisy channels
Song et al. A quantum secure direct communication protocol based on six-qubit cluster state
Jian et al. An improved “Ping-pong” protocol based on four-qubit genuine entangled state

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant