CN107222307A - A kind of controlled quantum safety direct communication method based on four Particle Cluster states - Google Patents
A kind of controlled quantum safety direct communication method based on four Particle Cluster states Download PDFInfo
- Publication number
- CN107222307A CN107222307A CN201710419159.0A CN201710419159A CN107222307A CN 107222307 A CN107222307 A CN 107222307A CN 201710419159 A CN201710419159 A CN 201710419159A CN 107222307 A CN107222307 A CN 107222307A
- Authority
- CN
- China
- Prior art keywords
- sequence
- sender
- recipient
- particle
- msub
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/70—Photonic quantum communication
Abstract
The invention discloses a kind of controlled quantum safety direct communication method based on four Particle Cluster states, Alice and Bob are respectively information sender legal during quantum communications and recipient, and Charlie is believable scheme controlling party;Channel safety measures base Determination using radom insertion single photon, and communication is started after detection safety;Alice will be prepared after four particle Cluster States are pairwise grouping, and will be sent information and be carried out with pseudo-random sequence after xor operation by unitary transformation coding on two particles that Alice is retained.Alice is to itself retaining particle to being measured by Bell bases and metrical information being sent into Bob, and Bob recovers original series after matching measurement information by the Charlie initial states sent.Four particles Cluster State used in the present invention have it is relatively good tangle, connective and anti-destructive, the permission that recipient Bob in method only obtains controlling party Charlie could recover raw information, information can effectively be prevented in the attack of transmitting procedure, and implementation process is simple.
Description
Technical field
The invention belongs to safe quantum communication technical field, and in particular to a kind of controlled quantum based on cluster state is direct safely
(CQSDC) method of communication.
Background technology
Quantum communications carry out information transfer and processing using principle of quantum mechanics, have the advantages that high safety, high power capacity.Amount
Sub- secure direct communication directly transmits secret information in quantum channel, is a kind of new-type quantum communications pattern, in recent years
Rapid development is arrived.
Document 1 " Li Songsong, Nie Yiyou, Hong Zhihui, Yi Xiaojie, Huang Yibin,
Controlled Teleportation Using Four-Particle Cluster State[J].Communication
Theory Phys,2008,50(9):633-636. " proposes a kind of based on the controllable information transmission scheme of four Particle Cluster states.At this
In scheme, by single-photon state or tangle the quantum informations of double quantum states respectively and be transferred to and connect from sender by four Particle Cluster states
Debit.The program retains a quantum bit in cluster state in particle distribution phase, controlling party.Before qubit, need
Safety detection is carried out to the quantum channel of controlling party and recipient simultaneously, so that detection-phase becomes complicated.
" Shima Hassanpour, Monireh Houshmand, the Efficient controlled quantum of document 2
secure direct communication based on GHZ-like states,Quantum
InformationProcessing,2015,14(2):739. " propose a kind of controlled quantum of the tripartite based on three ions
Secure direct communication scheme.In the program, the GHZ states used are once measure, and Entanglement is just destroyed.This scheme is in particle point
Hair stage, sender sends a particle in three ions to recipient and controlling party, and single-particle is transmitted in the channel
Attack easily is tangled by listener-in, so as to carry out information stealth.
The content of the invention
For above-mentioned problems of the prior art, it is an object of the present invention to provide a kind of be based on four Particle Cluster states
Controlled quantum safety direct communication method, with higher communication efficiency.
In order to realize above-mentioned task, the present invention uses following technical scheme:
Based on the controlled quantum safety direct communication method of four Particle Cluster states, comprise the following steps:
Step one, sender designs mutually isostructural sequence generator, the described sequence production of controlling party setting with recipient
The initial state of raw device;Described initial state is sent to sender by controlling party, and sender produces pseudo-random sequence according to initial state
And prepare four Particle Cluster states;
Step 2, the four Particle Cluster states that sender prepares step one are divided to for two groups of S according to every 2bit1And S2, a particle
1bit information is carried, sender retains two particles therein, two other particle is sent into recipient;
Step 3, sender is in sequence S2Middle radom insertion single photon will insert the sequence after single photon as detection particle
Row are used as detection sequence S2', and the positional information of detection particle is recorded, reservation prepares measurement basic sequence used in single photon,
The sequence S of single photon will be inserted2' recipient is sent to by quantum channel;Recipient is received after sequence, and sender again will inspection
The positional information of detection particle is sent to recipient by classical channel in sequencing row, and recipient is according to described positional information pair
The single photon of correspondence position is measured, and then will measure the measurement base information used returns to sender by classical channel,
The measurement basic sequence that the measurement basic sequence and sender that sender sends recipient retain is compared, if error rate
More than the secure threshold of setting, then channel is dangerous, terminates and this time communicates;Otherwise channel safety, performs step 4;
Step 4, if channel safety, raw information M sequence is grouped by sender, and by the sequence and step after packet
Pseudo-random sequence described in rapid one carries out the sequence after xor operation as transmission sequence S;The different unitary transformation combination of selection
Two particles retained it, which carry out local area unitary transformation, will send sequence S codings on quantum state;
Quantized system after coding is carried out Bell base measurements, hold to itself two of recipient by step 5, sender
Particle constitutes system and carries out Bell base measurements, and records measurement result;
Its measurement result is sent to recipient by step 6, sender as classical information by classical channel;
Step 7, the measurement result that recipient sends with reference to the measurement result of itself and sender judges that sender chooses
Which kind of unitary operations, so as to recover transmission sequence;
The initial state of sequence generator is sent to recipient by step 8, controlling party, and recipient utilizes described initial state
Produce and carry out XOR decryption oprerations with sender's identical pseudo-random sequence, recover raw information.
Further, in described step one, sequence generator is designed as 10 grades, and initial value is 1023.
Further, in described step one, four particle Cluster States prepared by the Alice are expressed as:
Wherein, four particles of cluster state use a respectively1、a2、a3And a4To represent, | ψ>4Represent four particles tangles ket.
Further, in described step three, recipient corresponding single photon position is randomly selected Z bases | 0>,|1>}
With X bases |+>,|->Measure, wherein Z bases and X bases meets computing:
Further, in described step four, local area unitary operations are embodied as:
I=| 0><0|+|1><1 |, X=| 0><1|+|1><0|
Wherein unitary transformation I represents that bit is constant, and X represents bit reversal.
Further, in described step five, when the measurement of Bell bases is carried out to the quantized system after coding, Bell basis representations
For:
The present invention has following technical characterstic:
After 1. Cluster State used in the present invention has to wherein any one particle is operated, residual particles remain to protect
The characteristics of holding Entangled State.
It is and usual 2. the generation of pseudo-random sequence of the present invention is realized using the nonlinear organization of linear shift register
Linear structure compare, produced sequence period length, random performance are good, sequence is irreversible, and possess relatively low intercepting and capturing frequency,
Improve the security of scheme.
3. recipient will recover raw information and need to obtain the measurement result of sender and oneself measurement knot in the present invention
Fruit recovers raw information jointly, with higher security.
4. the present invention is required to by credible controlling party Charlie's when prepared by pseudo-random sequence, recipient Bob is decoded
Allow, further improve the security of scheme.
Brief description of the drawings
Fig. 1 is the flow chart of the inventive method;
Embodiment
The conventional quantum state of communication included Bell state, GHZ states and W states in the past, and this programme uses four Particle Cluster states.Due to cluster
State, which has, preferably continues Entanglement so that itself relational structure is stable, even if measured, Entanglement is also not easy to be destroyed,
It is not easy to be disturbed by decoherence, so measured with basic vector to any two particle of Cluster State, then remaining two particle
A Bell state is projected to, continues holding and tangles state.Therefore in such encipherment scheme Alice not by tangling friendship
Change, but the classical Bit String after measurement by local unitary operations and is sent to legitimate receiver by quantum state, and receive
The permission that person only obtains controlling party Charlie could recover raw information, further improve the security of communication process.
It is assumed that Alice and Bob are respectively legal sender and recipient during quantum communications, Charlie is credible
Scheme controlling party, be responsible to define the initial value of sequence generator.Alice and Bob both sides are produced using the sequence of same structure
Raw device is produced in identical pseudo-random sequence, practical application in the case of identical original state, can by setting initial value,
Use the preparation of the nonlinear organization circuit realiration pseudo-random sequence of linear shift register.Specific design rule is:Construction one
Individual n grades sequencer, the series for first having to determine shift register is n.For example, by construct highest frequency n=
10 primitive polynomial f (x)=c10x10+c9x9+c8x8+c7x7+c6x6+c5x5+c4x4+c3x3+c2x2+c1x1, then pseudorandom is produced
The cycle of sequence is p=210- 1=1023.According to the coefficient c of each single item in primitive polynomialiTo determine the defeated of shift register
Go out whether level needs introducing adder to feed back to prime.XOR step by step is carried out by the result to multiple random sequence generators defeated
Go out, just form the output result of the random sequence generator of nonlinear organization.The present invention program is specifically described as follows:
Step one, the preparatory stage
The nonlinear combined sequences hair of sender Alice and recipient's Bob design structure identical linear shift registers
Raw device, the initial state of the described sequence generator of controlling party Charlie settings;Described initial state is sent to transmission by controlling party
Side, sender produces the pseudo-random sequence of 1023 according to initial state and prepares four Particle Cluster states, is expressed as:
Wherein, four particles of cluster state use a respectively1、a2、a3And a4To represent, wherein | ψ >4Represent the Entangled State of four particles
Arrow.
Step 2, pretreatment stage
Four Particle Cluster state sequences prepared by step one are divided into two groups, respectively S by sender1(a1,a3) and S2(a2,a4);
Sender retains two particle sequences therein, and two other particle sequence is sent into recipient.That is Alice itself retains grain
Subsequence S1(a1,a3), while preparing particle S2(a2,a4) it is sent to Bob.
Step 3, Channel Detection stage
Sender is in sequence S2Middle radom insertion single photon regard the sequence for inserting single photon as inspection as detection particle
Sequencing row S2', and the positional information of detection particle is recorded, reservation prepares measurement basic sequence used in single photon, will detect sequence
Arrange S2' recipient is sent to by quantum channel;
Recipient is received entirely the sequence S with detection particle2' after, sender is again by the position of described detection particle
Confidence breath is sent to recipient, the positional information pair for the detection particle that recipient sends according to described sender by classical channel
The single photon of relevant position randomly selects measurement base and measured, and then will measure the measurement basic sequence used by classical channel
(giving tacit consent to it in design to be perfectly safe) returns to sender, and the measurement basic sequence and sender that sender sends recipient retain
Measurement basic sequence be compared, if error rate is more than the secure threshold of setting, channel is dangerous, there is eavesdropping
Person, terminates and this time communicates;Otherwise channel safety, performs step 4.
Specifically, in the present embodiment, recipient the single photon of relevant position is randomly selected Z bases | 0 >, | 1>And X bases
{|+>,|->Measure, wherein Z bases and X bases meets computing:
Step 4, coding stage
If channel safety, the original information sequence M that sender will send is grouped according to every 1023, and will packet
Sequence afterwards is carried out after xor operation as transmission sequence S with described pseudo-random sequence;The different unitary transformation combination of selection
The S retained it1(a1,a3) local area unitary transformation is carried out, sequence S codings will be sent on quantum state, that is, be exactly by classics
Information is carried on quantum state;In the present embodiment, local unitary operations are embodied as:
I=| 0><0|+|1><1 |, X=| 0><1|+|1><0|
Wherein unitary transformation I represents that bit is constant, and X represents bit reversal.Unitary transformation correspondence particle a1a3Unitary transformation
It is with classical information sequence corresponding relation: Its
In,Represent to calculate the direct product that ket is carried out, the multiplication relationship between ket can be represented.
Step 5, measuring phases
Sender is by the quantized system after coding (two or more particles that tangle just constitute a quantized system)
Carry out Bell base measurements, two particle a that recipient holds to itself2,a4Composition system carries out Bell base measurements, and records survey
Measure result;
Specifically, when carrying out the measurement of Bell bases to the quantized system after coding, Bell base tables are shown as:
Bell bases can be decomposed into hereinWithFour kinds of kets, that is, the measurement of Bell bases
May be any one in four kinds of kets afterwards.
Its measurement result is sent to recipient by step 6, sender as classical information by classical channel;
Step 7, recipient Bob combines the measurement result that the measurement result of itself Bell base detection and sender send, root
Judge which kind of unitary operations sender have chosen according to corresponding relation, so as to recover transmission sequence S.Specific corresponding relation such as table 1.
Measurement result in the agreement of table 1
For example, when Alice measurement result is 00, Bob measurement results are 00, then unitary transformation II is used, recovered hair
Send sequence 00;Bob measurement results are 11, then have used unitary transformation XX, recover to send sequence 01;Bob measurement results are 01, then
Unitary transformation XI has been used, has recovered to send sequence 10;Bob measurement results are 10, then have used unitary transformation IX, recover to send sequence
Row 11.
Step 8, post-processing stages
Recipient will finally recover raw information M, it is necessary to by controlling party Charlie allow obtain sequence generator
Initial state.The initial state of sequence generator is sent to recipient by controlling party, recipient using described initial state produce with
The identical random sequence that sender produces in step one, and the 1023 transmission sequence S and pseudorandom that previous step is recovered
Sequence carries out XOR decryption oprerations, recovers raw information M.
In order to verify effectiveness of the invention, specifically the security and efficiency to the present invention are analyzed.In security
In detection, four kinds of attacks are broadly divided into:Denial of Service attack, measurement multi-sending attack, intercepting and capturing multi-sending attack, controlling party attack.Effect
Rate analysis process is mainly the calculating of communications efficiency and quantum bit utilization rate.
The following is the safety analysis to the present invention:
Denial of Service attack:When steal information is not the quantum state of malicious sabotage transmission to listener-in Eve, due to quantum
Immeasurability characteristic, Eve inherently causes certain interference in this process, and this allows for legitimate correspondence both sides it finds that stealing
The presence of hearer.
Measure multi-sending attack:Eve randomly selects measurement base and some particles for issuing Bob is measured.First, Eve is surveyed
Two particles not carried simply in the cluster state of any information of amount, even if so Eve selects right measurement base, can not obtain
Any information.Measurement Bell state particle, which is laid equal stress on, detects that particle error rate is 1/4 caused by hair.So, the quantum state correspondence of every
The probability made a mistake is 1/4.Eve step-by-steps measurement be just bound to produce mistake, and Bob in detection-phase below it finds that
Eve presence.
Intercept and capture multi-sending attack:Eve capture portion particles, then oneself will shift to an earlier date ready quantum state and issue Bob.Because
The Bell state of Bell bases measurement has four kinds of possibility, and Alice one kind therein corresponding with Bob, the Bell state particle that Eve is intercepted and captured is laid equal stress on
Detection particle error rate is 1/4 caused by hair.So, the corresponding probability made a mistake of quantum state of every is 1/4.Eve step-by-steps
Measurement be just bound to produce mistake, and Bob in detection-phase below it finds that Eve presence.Equally, multi-sending attack is intercepted and captured
Bob detection-phases after can be found.
Controlling party is attacked:In communication process, if listener-in Eve is attacked controlling party Charlie, it can only steal
Take the initial state of random sequence generator.In eavesdropping, Eve is not aware that the structure of random sequence generator, so can not recover
Random sequence, even if having recovered random sequence, due to the safety of quantum channel, can not also recover original information sequence.
The following is the efficiency analysis to the present invention:
The quantum communications efficiency of transmission of this programme:Because 1qubit correspondences carry 1bit in coding
Information, so quantum bit utilization rate:
The effect of the present invention:So that the CQSDC schemes based on four Particle Cluster states are retransmitted in face of measurement multi-sending attack, intercepting and capturing
The eavesdropping of attack, Denial of Service attack and controlling party attack to Eve, which can be realized, to be effectively antagonized.In addition, present invention introduces
Believable controlling party Charlie, the security of improvement communication process that can be bigger.Raw information is encrypted operation, i.e.,
Eve has been intercepted partial photonic, and carried out under identical measurement base correct measurement, but be due to that he can not obtain XOR sequence
Row, are still not able to recover raw information.Raw information can't be carried by carrying out coding to sequence using unitary transformation, can more be prevented
Locking system is in the attack of transmitting procedure, and implementation process is simple.
Claims (6)
1. a kind of controlled quantum safety direct communication method based on four Particle Cluster states, it is characterised in that comprise the following steps:
Step one, sender designs mutually isostructural sequence generator, the described sequence generator of controlling party setting with recipient
Initial state;Described initial state is sent to sender by controlling party, and sender produces pseudo-random sequence according to initial state and made
Standby four Particle Cluster states;
Four Particle Cluster states prepared by step one are divided into two groups of S by step 2, sender1And S2, sender's reservation two grains therein
Son, recipient is sent to by two other particle;
Step 3, sender is in sequence S2Middle radom insertion single photon as detection particle, will insert single photon after sequence as
Detection sequence S2', and the positional information of detection particle is recorded, reservation prepares measurement basic sequence used in single photon, by S2' logical
Cross quantum channel and be sent to recipient;
Recipient is received after sequence, and sender will detect that the positional information of particle is sent to by classical channel again in detection sequence
Recipient, recipient measures according to described positional information to the single photon of correspondence position, then will measure the survey used
Amount sequence returns to sender by classical channel, the survey that the measurement basic sequence and sender that sender sends recipient retain
Amount basic sequence is compared, if error rate is more than the secure threshold of setting, channel is dangerous, terminates and this time communicates;
Otherwise channel safety, performs step 4;
Step 4, if channel safety, raw information M sequence is grouped by sender, and by the sequence after packet and step one
Described pseudo-random sequence carries out the sequence after xor operation as transmission sequence S;The different unitary transformation of selection is combined to it
Two particles retained carry out local area unitary transformation, will send sequence S codings on quantum state;
Quantized system after coding is carried out Bell base measurements, two particles that recipient holds to itself by step 5, sender
Composition system carries out Bell base measurements, and records measurement result;
Its measurement result is sent to recipient by step 6, sender as classical information by classical channel;
Step 7, the measurement result that recipient sends with reference to the measurement result of itself and sender, judges which sender have chosen
Unitary operations are planted, so as to recover transmission sequence;
The initial state of sequence generator is sent to recipient by step 8, controlling party, and recipient is produced using described initial state
XOR decryption oprerations are carried out with sender's identical pseudo-random sequence, raw information is recovered.
2. a kind of controlled quantum safety direct communication method based on four Particle Cluster states as claimed in claim 1, its feature exists
In in described step one, sequence generator is designed as 10 grades, and initial value is 1023.
3. a kind of controlled quantum safety direct communication method based on four Particle Cluster states as claimed in claim 1, its feature exists
In in the step one, four particle Cluster States prepared by the Alice are expressed as:
<mrow>
<mo>|</mo>
<mi>&psi;</mi>
<msub>
<mo>></mo>
<mn>4</mn>
</msub>
<mo>=</mo>
<mfrac>
<mn>1</mn>
<mn>2</mn>
</mfrac>
<msub>
<mrow>
<mo>(</mo>
<mo>|</mo>
<mn>0000</mn>
<mo>></mo>
<mo>+</mo>
<mo>|</mo>
<mn>1001</mn>
<mo>></mo>
<mo>+</mo>
<mo>|</mo>
<mn>0110</mn>
<mo>></mo>
<mo>-</mo>
<mo>|</mo>
<mn>1111</mn>
<mo>></mo>
<mo>)</mo>
</mrow>
<mrow>
<msub>
<mi>a</mi>
<mn>1</mn>
</msub>
<msub>
<mi>a</mi>
<mn>2</mn>
</msub>
<msub>
<mi>a</mi>
<mn>3</mn>
</msub>
<msub>
<mi>a</mi>
<mn>4</mn>
</msub>
</mrow>
</msub>
</mrow>
Wherein, four particles of cluster state use a respectively1、a2、a3And a4To represent, | ψ>4Represent four particles tangles ket.
4. a kind of controlled quantum safety direct communication method based on four Particle Cluster states as claimed in claim 1, its feature exists
In, in described step three, recipient corresponding single photon position is randomly selected Z bases | 0>,|1>And X bases |+>,|->}
Measure, wherein Z bases and X bases meets computing:
<mrow>
<mo>|</mo>
<mo>+</mo>
<mo>></mo>
<mo>=</mo>
<mfrac>
<mn>1</mn>
<msqrt>
<mn>2</mn>
</msqrt>
</mfrac>
<mrow>
<mo>(</mo>
<mo>|</mo>
<mn>1</mn>
<mo>></mo>
<mo>+</mo>
<mo>|</mo>
<mn>0</mn>
<mo>></mo>
<mo>)</mo>
</mrow>
<mo>,</mo>
<mo>|</mo>
<mo>-</mo>
<mo>></mo>
<mo>=</mo>
<mfrac>
<mn>1</mn>
<msqrt>
<mn>2</mn>
</msqrt>
</mfrac>
<mrow>
<mo>(</mo>
<mo>|</mo>
<mn>1</mn>
<mo>></mo>
<mo>-</mo>
<mo>|</mo>
<mn>0</mn>
<mo>></mo>
<mo>)</mo>
</mrow>
</mrow>
5. a kind of controlled quantum safety direct communication method based on four Particle Cluster states as claimed in claim 1, its feature exists
In in described step four, local area unitary operations are embodied as:
I=| 0><0|+|1><1 |, X=| 0><1|+|1><0|
Wherein unitary transformation I represents that bit is constant, and X represents bit reversal.
6. a kind of controlled quantum safety direct communication method based on four Particle Cluster states as claimed in claim 1, its feature exists
In in described step five, when the measurement of Bell bases is carried out to the quantized system after coding, Bell base tables are shown as:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710419159.0A CN107222307B (en) | 2017-06-06 | 2017-06-06 | Controlled quantum secure direct communication method based on four-particle cluster state |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710419159.0A CN107222307B (en) | 2017-06-06 | 2017-06-06 | Controlled quantum secure direct communication method based on four-particle cluster state |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107222307A true CN107222307A (en) | 2017-09-29 |
CN107222307B CN107222307B (en) | 2020-01-10 |
Family
ID=59947559
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710419159.0A Active CN107222307B (en) | 2017-06-06 | 2017-06-06 | Controlled quantum secure direct communication method based on four-particle cluster state |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107222307B (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108540281A (en) * | 2018-04-28 | 2018-09-14 | 清华大学 | A kind of Quantum Secure Direct Communication system that measuring apparatus is unrelated |
CN108632034A (en) * | 2018-07-11 | 2018-10-09 | 西北大学 | A kind of controlled quantum safety direct communication method based on five particles |
CN108768645A (en) * | 2018-07-31 | 2018-11-06 | 西北大学 | A kind of asymmetric quantum dialogue method of fault tolerant based on decoherence free subspace |
CN109286446A (en) * | 2018-09-25 | 2019-01-29 | 苏州大学张家港工业技术研究院 | The method of joint six bit Cluster States of long-range preparation based on GHZ state |
CN109525327A (en) * | 2018-12-11 | 2019-03-26 | 国网江苏省电力有限公司南京供电分公司 | A kind of free space quantum safety direct communication method of preset threshold real-time selection |
CN110401494A (en) * | 2019-08-30 | 2019-11-01 | 北京邮电大学 | The unrelated quantum safety direct communication method of measuring device on high n-dimensional subspace n |
CN110460389A (en) * | 2019-09-02 | 2019-11-15 | 福建师范大学 | A kind of multi-party controlled bidirectional quantum safety direct communication method and system based on cluster state |
CN110635907A (en) * | 2019-11-07 | 2019-12-31 | 广东水利电力职业技术学院(广东省水利电力技工学校) | Controlled quantum conversation method with identity authentication function based on GHZ-like state |
CN110752926A (en) * | 2019-10-30 | 2020-02-04 | 国网甘肃省电力公司信息通信公司 | Multi-party layered quantum key sharing method |
CN110880956A (en) * | 2019-11-20 | 2020-03-13 | 山西大学 | Quantum physical layer secret communication system and safety analysis method thereof |
CN111049593A (en) * | 2020-01-17 | 2020-04-21 | 南京理工大学 | Method, system and computer equipment for determining multi-party quantum communication irrelevant to measuring equipment |
CN114598396A (en) * | 2022-05-09 | 2022-06-07 | 四川师范大学 | High-dimensional asymmetric bidirectional controlled quantum invisible state transfer method |
WO2022237196A1 (en) * | 2021-05-08 | 2022-11-17 | 苏州大学 | Cluster-state-based terminal-selectable method and system for remotely preparing two-bit state |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103248628A (en) * | 2013-05-15 | 2013-08-14 | 北京邮电大学 | Quantum safety communication eavesdropping detection method based on four-particle W state |
EP2693685A1 (en) * | 2012-07-30 | 2014-02-05 | Universiteit Twente | Quantum secure device, system and method for verifying challenge-response pairs using a physically unclonable function (PUF) |
CN103888476A (en) * | 2014-04-14 | 2014-06-25 | 西北大学 | Quantum secure direct communication protocol based on three-particle GHZ entangled state |
CN105245331A (en) * | 2015-10-21 | 2016-01-13 | 西安邮电大学 | Four-particle GHZ state-based two-party quantum key agreement protocol |
-
2017
- 2017-06-06 CN CN201710419159.0A patent/CN107222307B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2693685A1 (en) * | 2012-07-30 | 2014-02-05 | Universiteit Twente | Quantum secure device, system and method for verifying challenge-response pairs using a physically unclonable function (PUF) |
CN103248628A (en) * | 2013-05-15 | 2013-08-14 | 北京邮电大学 | Quantum safety communication eavesdropping detection method based on four-particle W state |
CN103888476A (en) * | 2014-04-14 | 2014-06-25 | 西北大学 | Quantum secure direct communication protocol based on three-particle GHZ entangled state |
CN105245331A (en) * | 2015-10-21 | 2016-01-13 | 西安邮电大学 | Four-particle GHZ state-based two-party quantum key agreement protocol |
Non-Patent Citations (2)
Title |
---|
曹正文 等: ""一种星型网络中的双向量子安全直接通信方案"", 《西北大学学报(自然科学版)》 * |
曹正文 等: ""基于一类W态密集编码的量子安全直接通信方案"", 《光电子.激光》 * |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108540281A (en) * | 2018-04-28 | 2018-09-14 | 清华大学 | A kind of Quantum Secure Direct Communication system that measuring apparatus is unrelated |
CN108540281B (en) * | 2018-04-28 | 2020-06-09 | 清华大学 | Quantum security direct communication system irrelevant to measuring equipment |
CN108632034B (en) * | 2018-07-11 | 2020-05-12 | 西北大学 | Controlled quantum secure direct communication method based on five particles |
CN108632034A (en) * | 2018-07-11 | 2018-10-09 | 西北大学 | A kind of controlled quantum safety direct communication method based on five particles |
CN108768645A (en) * | 2018-07-31 | 2018-11-06 | 西北大学 | A kind of asymmetric quantum dialogue method of fault tolerant based on decoherence free subspace |
CN109286446A (en) * | 2018-09-25 | 2019-01-29 | 苏州大学张家港工业技术研究院 | The method of joint six bit Cluster States of long-range preparation based on GHZ state |
CN109286446B (en) * | 2018-09-25 | 2019-12-20 | 苏州大学 | Method for jointly and remotely preparing six-bit cluster state based on GHZ state |
CN109525327A (en) * | 2018-12-11 | 2019-03-26 | 国网江苏省电力有限公司南京供电分公司 | A kind of free space quantum safety direct communication method of preset threshold real-time selection |
CN109525327B (en) * | 2018-12-11 | 2021-07-06 | 国网江苏省电力有限公司南京供电分公司 | Free space quantum secure direct communication method with preset threshold selected in real time |
CN110401494A (en) * | 2019-08-30 | 2019-11-01 | 北京邮电大学 | The unrelated quantum safety direct communication method of measuring device on high n-dimensional subspace n |
CN110460389B (en) * | 2019-09-02 | 2020-10-30 | 福建师范大学 | Cluster state-based multiparty controlled bidirectional quantum secure direct communication method and system |
CN110460389A (en) * | 2019-09-02 | 2019-11-15 | 福建师范大学 | A kind of multi-party controlled bidirectional quantum safety direct communication method and system based on cluster state |
CN110752926A (en) * | 2019-10-30 | 2020-02-04 | 国网甘肃省电力公司信息通信公司 | Multi-party layered quantum key sharing method |
CN110635907A (en) * | 2019-11-07 | 2019-12-31 | 广东水利电力职业技术学院(广东省水利电力技工学校) | Controlled quantum conversation method with identity authentication function based on GHZ-like state |
CN110880956A (en) * | 2019-11-20 | 2020-03-13 | 山西大学 | Quantum physical layer secret communication system and safety analysis method thereof |
CN110880956B (en) * | 2019-11-20 | 2022-11-11 | 山西大学 | Quantum physical layer secret communication system |
CN111049593A (en) * | 2020-01-17 | 2020-04-21 | 南京理工大学 | Method, system and computer equipment for determining multi-party quantum communication irrelevant to measuring equipment |
CN111049593B (en) * | 2020-01-17 | 2022-10-14 | 南京理工大学 | Method, system and computer equipment for determining multi-party quantum communication irrelevant to measuring equipment |
WO2022237196A1 (en) * | 2021-05-08 | 2022-11-17 | 苏州大学 | Cluster-state-based terminal-selectable method and system for remotely preparing two-bit state |
CN114598396A (en) * | 2022-05-09 | 2022-06-07 | 四川师范大学 | High-dimensional asymmetric bidirectional controlled quantum invisible state transfer method |
Also Published As
Publication number | Publication date |
---|---|
CN107222307B (en) | 2020-01-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107222307A (en) | A kind of controlled quantum safety direct communication method based on four Particle Cluster states | |
CN105553648B (en) | Quantum key distribution, privacy amplification and data transmission method, apparatus and system | |
Xia et al. | Quantum dialogue by using the GHZ state | |
CN104104500B (en) | A kind of method and apparatus of quantum secure transmission | |
Shi et al. | Quantum secure direct communication by using three-dimensional hyperentanglement | |
CN108809644B (en) | Disorder high-capacity multiparty quantum key negotiation method based on high-energy level bell state | |
CN107493168B (en) | Quanta identity authentication method and its application method during quantum key distribution | |
CN110929294B (en) | One-way transmission quantum database privacy query method | |
Lü et al. | A new spatiotemporally chaotic cryptosystem and its security and performance analyses | |
Naif et al. | Secure IOT system based on chaos-modified lightweight AES | |
CN107359985A (en) | A kind of controlled quantum safety direct communication method based on huffman compression coding | |
CN108847939A (en) | A kind of MDI-QKD agreement based on quantum network | |
Naseri | An efficient protocol for quantum secure dialogue with authentication by using single photons | |
Chang et al. | Robust EPR-pairs-based quantum secure communication with authentication resisting collective noise | |
Chen et al. | A novel digital color image encryption algorithm based on a new 4-D hyper-chaotic system and an improved S-box | |
Atikah et al. | AES-RC4 Encryption Technique to Improve File Security | |
Sodhi et al. | An efficient hash algorithm to preserve data integrity | |
Hwang et al. | Robust stream‐cipher mode of authenticated encryption for secure communication in wireless sensor network | |
Li et al. | Deterministic quantum secure direct communication protocol based on hyper-entangled state | |
Chang et al. | Quantum broadcast communication and authentication protocol with a quantum one-time pad | |
CN116132036A (en) | Deterministic safety semi-quantum communication method based on quantum data compression | |
Yin et al. | Efficient quantum dialogue without information leakage | |
CN112332988B (en) | Agile quantum privacy query method based on anti-rotation noise | |
Gan | Quantum key distribution scheme with high efficiency | |
Wang et al. | Authenticated quantum dialogue without information leakage |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |