CN108847939B - MDI-QKD method based on quantum network - Google Patents
MDI-QKD method based on quantum network Download PDFInfo
- Publication number
- CN108847939B CN108847939B CN201811172809.7A CN201811172809A CN108847939B CN 108847939 B CN108847939 B CN 108847939B CN 201811172809 A CN201811172809 A CN 201811172809A CN 108847939 B CN108847939 B CN 108847939B
- Authority
- CN
- China
- Prior art keywords
- quantum
- alice
- bob
- state
- error rate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims description 34
- 230000006854 communication Effects 0.000 claims abstract description 46
- 238000004891 communication Methods 0.000 claims abstract description 43
- 238000005259 measurement Methods 0.000 claims description 44
- 230000005540 biological transmission Effects 0.000 claims description 28
- 230000003287 optical effect Effects 0.000 claims description 19
- ZPUCINDJVBIVPJ-LJISPDSOSA-N cocaine Chemical compound O([C@H]1C[C@@H]2CC[C@@H](N2C)[C@H]1C(=O)OC)C(=O)C1=CC=CC=C1 ZPUCINDJVBIVPJ-LJISPDSOSA-N 0.000 claims description 15
- 230000010287 polarization Effects 0.000 claims description 15
- 230000008569 process Effects 0.000 claims description 10
- 238000012937 correction Methods 0.000 claims description 6
- 239000002096 quantum dot Substances 0.000 claims description 6
- 238000004364 calculation method Methods 0.000 claims description 4
- 230000003321 amplification Effects 0.000 claims description 3
- 238000003199 nucleic acid amplification method Methods 0.000 claims description 3
- 230000009467 reduction Effects 0.000 claims description 3
- 239000011159 matrix material Substances 0.000 claims description 2
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 claims 1
- 239000002245 particle Substances 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000010363 phase shift Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000005610 quantum mechanics Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/80—Optical aspects relating to the use of optical transmission for specific applications, not provided for in groups H04B10/03 - H04B10/70, e.g. optical power feeding or optical transmission through water
- H04B10/85—Protection from unauthorised access, e.g. eavesdrop protection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/70—Photonic quantum communication
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Optical Communication System (AREA)
- Optical Modulation, Optical Deflection, Nonlinear Optics, Optical Demodulation, Optical Logic Elements (AREA)
Abstract
The invention discloses a quantum network-based MDI-QKD protocol, which applies quantum invisible propagation in a quantum network to the traditional unilateral MDI-QKD protocol, on one hand, the advantages of the original MDI-QKD protocol are kept, namely, the independence of a safety protocol on measuring equipment is ensured, and all attacks at a measurer end in a QKD system are effectively avoided; on the other hand, the quantum invisible state in the quantum network can greatly prolong the safety distance of communication; the invention applies the quantum invisible state in the quantum network to the MDI-QKD protocol, thereby greatly increasing the distance of the MDI-QKD protocol while ensuring the communication security.
Description
Technical Field
The invention belongs to the technical field of quantum communication, and particularly relates to an MDI-QKD protocol based on a quantum network.
Background
Quantum secret communication is based on quantum physics and informatics, the security of the quantum secret communication is ensured by the basic principle of quantum mechanics, and quantum key distribution is the most important content in quantum secret communication and is considered as the encryption mode with the highest security. It enables both parties to generate and share a random, secure key to encrypt and decrypt information. In 1984, Bennett et al proposed the QKD protocol in quantum cryptography, BB84 protocol, for the first time, and then after more than thirty years of development, various new QKD protocols have appeared in succession, such as: cyclic differential phase shift protocols, pulse modulation based QKD protocols, trick mode two-way QKD protocols, and the like. Hoi-KwongLo et al proposed a QKD protocol with higher practicability in 2012, and an MDI-QKD protocol (Measurement-Device-Independent Quantum Key distribution protocol) protocol Independent of Measurement devices. In the MDI-QKD protocol, Alice and Bob are legal communication users and are only responsible for preparing quantum states, then the prepared quantum states are respectively sent to a third party Charlie operating the protocol, the Charlie completes measurement of the two quantum states, measurement results are published to the Alice and the Bob through a public classical channel, the Alice and the Bob perform subsequent processing on data in hands of the Alice and the Bob according to the measurement results of the Charlie end, and finally a security key is obtained. The MDI-QKD protocol is popular with scientific enthusiasts since the first proposal in 2012, and is intensively researched from both theoretical and experimental aspects.
The quantum network is a novel safe communication network, and brings real safety and qualitative leap in the fields of calculation and science to the network by using quantum entanglement and quantum invisible transmission. The quantum invisible state is also called quantum remote transmission, quantum long-distance transmission and the like, and is a brand new communication technology for transmitting unknown quantum states by using quantum entanglement and some classical physical information. If Alice transmits an unknown quantum state to a receiver Bob, firstly Alice and Bob share an entangled quantum channel, namely an EPR entangled particle pair, then Alice decomposes the original unknown quantum state into classical information and quantum information which are respectively transmitted to Bob through the classical channel and the quantum channel, and Bob restores the unknown quantum state according to the acquired information. The classical information is a measurement result obtained by performing Bell state measurement on an unknown quantum state to be transmitted by a sender Alice, and the quantum information is the rest information which is not acquired by the Alice in the measurement and is related to the unknown quantum state.
In the original MDI-QKD protocol, legal communication users Alice and Bob are not equipped with any measuring device and only take charge of the preparation of the quantum state, and the measurement of the quantum state is carried out by an untrusted third party Charlie. The patent with application number 201510008068.9 discloses a two-node measuring device independent quantum key distribution system, wherein two independent lasers and a measuring device Charlie are both placed on the same node, namely both placed at an Alice end or a Bob end, so as to form the two-node bidirectional transmission quantum key distribution system. The special structure removes the attack of an eavesdropper on the measuring equipment in the operation process of the protocol, ensures the safety of communication, however, the safety communication distance of the protocol is not long enough, and further improvement is needed to prolong the safety communication distance.
Disclosure of Invention
The invention aims to provide an MDI-QKD protocol based on a quantum network aiming at the problems in the prior art, and the quantum invisible transmission is applied to the MDI-QKD protocol, so that on one hand, the independence of a safety protocol on measuring equipment is ensured, and all attacks of a measurer end in a QKD system are effectively avoided; on the other hand, the quantum invisible state in the quantum network can greatly prolong the safety distance of communication; therefore, the MDI-QKD protocol based on the quantum network can realize the effect of greatly prolonging the safe transmission distance while ensuring the safety.
In order to achieve the purpose, the invention adopts the technical scheme that:
an MDI-QKD protocol based on a quantum network, comprising the following steps:
s1, the communication user Alice establishes an optimal routing route by the method of quantum routing and the node Alicel in the same quantum network;
s2, communication users Alice and Bob in the same quantum network respectively prepare quantum states, and the communication users Alice transmit the prepared quantum states to a node Alicel in a hidden state transmission mode;
s3, after receiving the quantum state, Alicel sends the two quantum states to third-party quantum measurement equipment Charlie through a quantum channel synchronously with Bob for measurement;
s4, Charlie carries out BELL State Measurement (BSM) on the two received quantum states, and then publishes the measurement result to communication users Alice and Bob through a classical channel; the obtained measurement results are judged by Alice and Bob;
s5, if the measurement result is judged to be wrong, then both Alice and Bob discard the quantum state data sent to Charlie measurement in the communication process; if the measurement result is judged to be correct, then Alice and Bob temporarily reserve the quantum state data, and obtain the screened key data through the base pair operation, and either Alice or Bob performs one-time bit reversal on the own key;
s6, repeating the steps S2 to S5 to obtain a string of natural key bits;
s7, detecting whether the quantum channel has wiretap;
and S8, obtaining the final security key.
Specifically, in step S2, the communication user Alice may lose a certain amount of information during the process of transferring the quantum state, that is, there is a certain fidelity in transferring the quantum state to Alicel by Alice, where the fidelity is expressed as:
wherein x is more than or equal to 0 and less than or equal to 1, and x represents the weight of the W state in the quantum invisible state; when in useThen, the W state can be separated; when in useWhen the two phases are in the same state, the W state can not be separated; when x is 1, the W state is a pure state; n represents the node number of the quantum invisible state; rhoinAnd ρn-1Density algorithms representing input quantum states and output quantum states of the (n-1) th node, respectively; tr denotes the traces of the matrix.
Specifically, in step S4, the method for Alice and Bob to determine the obtained measurement result includes: respectively selecting and disclosing a part of secret keys by Alice and Bob, calculating the error rate of the secret keys by the Alice and the Bob according to the public secret keys, and judging that the measurement result is wrong if the error rate exceeds a threshold value; and if the error rate is lower than the threshold value, judging that the measurement result is correct.
Specifically, in step S5, the method for obtaining the filtered key data through the base operation includes: and firstly disclosing bases used for preparing each quantum state by Alice and Bob, then reserving key data corresponding to the quantum states prepared by using the same base, and discarding the key data corresponding to the quantum states prepared by using different bases, thereby obtaining the screened key data.
Specifically, in step S7, the method for checking whether there is eavesdropping on the quantum channel is as follows: both Alice and Bob publicly show part of the original secret key, and calculate the error rate of the secret key; if the error rate exceeds the threshold, it shows that there is eavesdropping, abandon the protocol process, if the error rate does not exceed the threshold, then keep the original key not disclosed.
Specifically, in step S8, before the final security key is obtained, the remaining key string needs to be subjected to error correction and secret amplification.
Further, the key rate calculation formula of the protocol is as follows:
wherein Q isrectAnd ErectRepresenting the gain and the quantum bit error rate under the rect base; f(Erect) H (x) xlog as a function of error correction rate2(x)-(1-x)log2(1-x) is a Shannon entropy function;represents the error rate of single-photon pulse under the oblique polarization base in MDI-QKD;indicating the error rate of the optical pulses with the intensity of the horizontal and vertical basis uv, u being the intensity of the optical pulses transmitted by Alice and v being the intensity of the optical pulses transmitted by Bob.
Further, the gain and quantum bit error rate of the protocol are expressed as:
wherein,the gain represents the gain of the light pulses with the intensity u and v sent by Alice and Bob under rect;represents the gain at which Alice1 and Bob send optical pulses of intensities u and v on the rect basis;representing the error rate of sending light pulses with the intensity u and v by Alice and Bob under the rect base;representing the error rate of Alice1 and Bob sending light pulses of intensities u and v on the rect basis;representing the error rate of single-photon pulses of an oblique polarization base in a quantum network, wherein the upper right label xx' represents that Alice and Bob use the oblique polarization base simultaneously, and the quantum network comprises an invisible state and MDI-QKD;indicating the error rate of the optical pulse with the intensity uv of the oblique polarization base, and the upper right label xx represents that Alice1 and Bob use the oblique polarization base simultaneously; u is the intensity of the optical pulse transmitted by Alice; v is the intensity of the light pulse sent by Bob; fn represents the fidelity of the quantum states communicated by Alice to Alice 1; under the condition of the same entanglement and key rate, the relative transmission distance of the protocol is gradually reduced along with the increase of the number n of nodes in the invisible transmission state; under the condition that the number n of nodes in the invisible transmission state is the same as the key rate, the relative transmission distance of the protocol is gradually reduced along with the reduction of the entanglement degree of the W state in the invisible transmission state.
Specifically, the quantum network comprises two legal communication users Alice and Bob of a source node of the quantum network and a destination node Alicel of the quantum network.
Compared with the prior art, the invention has the beneficial effects that: the communication protocol of the invention adopts the MDI-QKD protocol, thereby having the advantages of the original MDI-QKD protocol, namely ensuring the independence of the security protocol on the measuring equipment and effectively avoiding all attacks of the measuring device end in the QKD system; the invention applies the quantum invisible state in the quantum network to the MDI-QKD protocol, thereby greatly increasing the distance of the MDI-QKD protocol while ensuring the communication security.
Drawings
FIG. 1 is a flow chart of a quantum network based MDI-QKD protocol of the present invention;
FIG. 2 is a schematic diagram of a communication network of the MDI-QKD protocol based on the quantum network.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it is obvious that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 2, the present embodiment provides an MDI-QKD protocol based on a quantum network, and the protocol of the present embodiment mainly includes four major parts: a legal communication user Alice of a quantum network source node, a destination node Alice1 of a quantum network destination node, a legal communication user Bob and third-party measuring equipment; wherein the source node and the destination node are co-located in the same quantum network. And the source node and the destination node select an optimal communication line in a network routing mode and adopt a quantum invisible transmission mode to carry out quantum state transmission. Because the distance of quantum cryptography communication is limited, the distance between Alice and Bob is far, and quantum cryptography communication cannot be realized. The distance between Alice1 and Bob is short, and quantum cryptography communication independent of the measuring device can be realized. The present embodiment presents how to implement a quantum cryptography communication method between Alice and Bob by means of invisible state techniques.
As shown in fig. 1, the specific flow of the protocol is as follows:
s1, a legal communication user Alice routes an optimal line to an Alice1 node in a quantum network through a quantum intelligent optimization algorithm, n intermediate nodes are arranged between the Alice and the Alice1 node, and quantum states can be transmitted to the Alice1 node between every two nodes in a quantum invisible state transmission mode;
s2, in the process of quantum invisible state transfer, if a legal communication user Alice wants to transfer an unknown quantum state to a node Alice1, firstly, the nodes near Alice and Alice share an entangled quantum channel, namely, an EPR entangled particle pair, then Alice decomposes the original unknown quantum state into classical information and quantum information which are respectively transferred to the intermediate node through the classical channel and the quantum channel, and the node restores the unknown quantum state according to the obtained information;
s3, after obtaining the quantum state transmitted by the Alice terminal, the Alice1 synchronously sends the respective quantum state to a third party Charlie through a quantum channel to carry out Bell state measurement with another legal communication user Bob;
s4, after the measurement is finished, the Charlie publishes the measurement result to Alice and Bob through a public channel, and the Alice and the Bob judge whether the measurement result measured by the Charlie side is a correct result;
s5, if the measurement result is judged to be wrong, then both Alice and Bob discard the quantum state data sent to Charlie measurement in the communication process; if the measurement result is judged to be correct, then Alice and Bob temporarily reserve the quantum state data, and obtain the screened key data through the base pair operation, and either Alice or Bob performs one-time bit reversal on the own key;
s6, repeating steps S2 to S5 until enough original keys are obtained, namely a string of natural key bits is obtained;
s7, detecting whether the quantum channel has wiretap;
and S8, obtaining the final security key.
Specifically, in step S2, the classical information is a measurement result obtained by the sender Alice performing a bayer state measurement on an unknown quantum state to be transmitted, and the quantum information is the rest of information about the unknown quantum state that Alice does not obtain in the measurement. And after repeating the invisible transmission state for n-1 times, transmitting the quantum state prepared by the legal user Alice to the Alicel node.
Further, in step S2, the communication user Alice may lose a certain amount of information in the process of transferring the quantum state, that is, Alice has a certain fidelity in transferring the quantum state to Alicel, where the fidelity is expressed as:
wherein x is more than or equal to 0 and less than or equal to 1, and x represents the weight of the W state in the quantum invisible state; when in useThen, the W state can be separated; when in useWhen the two phases are in the same state, the W state can not be separated; when x is 1, the W state is a pure state; n represents the node number of the quantum invisible state; rhoinAnd ρn-1Density algorithms representing input quantum states and output quantum states of the (n-1) th node, respectively.
Specifically, in step S4, the method for Alice and Bob to determine the obtained measurement result includes: respectively selecting and disclosing a part of secret keys by Alice and Bob, calculating the error rate of the secret keys by the Alice and the Bob according to the public secret keys, and judging that the measurement result is wrong if the error rate exceeds a threshold value; if the error rate is lower than the threshold value, judging that the measurement result is correct; in the case of single photon transport quantum states, the threshold is 11%.
Specifically, in step S5, the method for obtaining the filtered key data through the base operation includes: and firstly disclosing bases used for preparing each quantum state by Alice and Bob, then reserving key data corresponding to the quantum states prepared by using the same base, and discarding the key data corresponding to the quantum states prepared by using different bases, thereby obtaining the screened key data.
Specifically, in step S7, the method for checking whether there is eavesdropping on the quantum channel is as follows: both Alice and Bob publicly show part of the original secret key, and calculate the error rate of the secret key; if the error rate exceeds the threshold, it shows that there is eavesdropping, abandon the protocol process, if the error rate does not exceed the threshold, then keep the original key not disclosed.
Specifically, in step S8, before the final security key is obtained, the remaining key string needs to be subjected to error correction and secret amplification.
Further, the key rate calculation formula of the original MDI-QKD protocol is:
wherein Q isrectAnd ErectRepresenting the gain and the quantum bit error rate under the rect base; andits value, f (E), can be estimated by a method of a decoy staterect) > 1 is the error correction rate function, H (x) ═ xlog2(x)-(1-x)log2(1-x) is a Shannon entropy function;represents the error rate of single-photon pulse under the oblique polarization base in MDI-QKD;indicating the error rate of the optical pulses with the intensity of the horizontal and vertical basis uv, u being the intensity of the optical pulses transmitted by Alice and v being the intensity of the optical pulses transmitted by Bob.
When Alice1 and Bob prepare Weak Correlation Pulses (WCP) with randomized phases and no eavesdropper is present during the communication, the total gain and QBER can be written as follows:
wherein,andindicating the gain in correct and in wrong Bell state measurements, respectively, I0(. is a first-order modified Bessel function, edIs the error rate, pdIs the dark count rate, e0=1/2,ω=μηα+νηb,y=(1-pd)e-ω/4,ηα=ηb=10-αL/10Is the transmission efficiency of the channel.
Further, in combination with the fidelity in the quantum invisible transport process, the gain and quantum bit error rate of the MDI-QKD protocol based on the quantum network can be expressed as:
wherein,the gain represents the gain of the light pulses with the intensity u and v sent by Alice and Bob under rect;represents the gain at which Alice1 and Bob send optical pulses of intensities u and v on the rect basis;representing the error rate of sending light pulses with the intensity u and v by Alice and Bob under the rect base;representing the error rate of Alice1 and Bob sending light pulses of intensities u and v on the rect basis;error rate of single photon pulse representing oblique polarization base in quantum networkThe upper right label xx' represents that Alice and Bob use oblique polarization bases simultaneously, and the quantum network comprises invisible states and MDI-QKD;indicating the error rate of the optical pulse with the intensity uv of the oblique polarization base, and the upper right label xx represents that Alice1 and Bob use the oblique polarization base simultaneously; u is the intensity of the optical pulse transmitted by Alice; v is the intensity of the light pulse sent by Bob; fn represents the fidelity of the quantum states communicated by Alice to Alice 1; it can be seen from the above formula that, for the fidelity Fn in the quantum invisible states, the number n of invisible states and the entanglement affect the performance of the protocol. Under the condition of the same entanglement and key rate, the relative transmission distance of the protocol is gradually reduced along with the increase of the number n of nodes in the invisible transmission state; under the condition that the number n of nodes in the invisible transmission state is the same as the key rate, the relative transmission distance of the protocol is gradually reduced along with the reduction of the entanglement degree of the W state in the invisible transmission state.
After the quantum invisible state in the quantum network is applied to the MDI-QKD protocol, the safe communication distance of legal communication users of the MDI-QKD protocol can be greatly increased under the condition of less sacrifice of the secret key rate.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (8)
1. An MDI-QKD method based on a quantum network is characterized by comprising the following steps:
s1, the communication user Alice establishes an optimal routing route by the method of quantum routing and the node Alicel in the same quantum network;
s2, communication users Alice and Bob in the same quantum network respectively prepare quantum states, and the communication users Alice transmit the prepared quantum states to a node Alicel in a hidden state transmission mode;
s3, after receiving the quantum state, Alicel sends the two quantum states to third-party quantum measurement equipment Charlie through a quantum channel synchronously with Bob for measurement;
s4, Charlie carries out BELL state measurement on the two received quantum states, and then publishes the measurement result to communication users Alice and Bob through a classical channel; the obtained measurement results are judged by Alice and Bob;
s5, if the measurement result is judged to be wrong, then both Alice and Bob discard the quantum state data sent to Charlie measurement in the communication process; if the measurement result is judged to be correct, then Alice and Bob temporarily reserve the quantum state data, and obtain the screened key data through the base pair operation, and either Alice or Bob performs one-time bit reversal on the own key;
s6, repeating the steps S2 to S5 to obtain a string of key bits;
s7, detecting whether the quantum channel has wiretap, if yes, abandoning the protocol process; if there is no eavesdropping, go to step S8;
and S8, obtaining the final security key through error correction and secret amplification.
2. The quantum-network-based MDI-QKD method according to claim 1, wherein in step S2, said communication user Alice loses a certain amount of information in the process of transferring quantum states, that is, there is a certain fidelity in transferring quantum states to Alicel by Alice, said fidelity is expressed as:
wherein x is more than or equal to 0 and less than or equal to 1, and x represents the weight of the W state in the quantum invisible state; when in useThen, the W state can be separated; when in useWhen the temperature of the water is higher than the set temperature,the W state can not be separated; when x is 1, the W state is a pure state; n represents the node number of the quantum invisible state; rhoinAnd ρn-1Density algorithms representing input quantum states and output quantum states of the (n-1) th node, respectively; tr denotes the traces of the matrix.
3. The quantum-network-based MDI-QKD method according to claim 1, wherein in step S4, the method for Alice and Bob to determine the obtained measurement results comprises: respectively selecting and disclosing a part of secret keys by Alice and Bob, calculating the error rate of the secret keys by the Alice and the Bob according to the public secret keys, and judging that the measurement result is wrong if the error rate exceeds a threshold value; and if the error rate is lower than the threshold value, judging that the measurement result is correct.
4. The quantum-network-based MDI-QKD method according to claim 1, wherein in step S5, said method for obtaining the filtered key data by the base-pair operation is: and firstly disclosing bases used for preparing each quantum state by Alice and Bob, then reserving key data corresponding to the quantum states prepared by using the same base, and discarding the key data corresponding to the quantum states prepared by using different bases, thereby obtaining the screened key data.
5. The quantum network-based MDI-QKD method according to claim 1, wherein in step S7, the method for checking whether there is eavesdropping on the quantum channel is: both Alice and Bob publicly show part of the original secret key, and calculate the error rate of the secret key; if the error rate exceeds the threshold, it shows that there is eavesdropping, abandon the protocol process, if the error rate does not exceed the threshold, then keep the original key not disclosed.
6. The quantum-network-based MDI-QKD method according to claim 1, wherein the key rate calculation formula of said protocol is:
wherein Q isrectAnd ErectRepresenting the gain and the quantum bit error rate under the rect base; f(Erect) H (x) xlog as a function of error correction rate2(x)-(1-x)log2(1-x) is a Shannon entropy function;represents the error rate of a single-photon pulse under the oblique polarization base in MDI-QKD;indicating the error rate of the optical pulses with the intensity of the horizontal and vertical basis uv, u being the intensity of the optical pulses transmitted by Alice and v being the intensity of the optical pulses transmitted by Bob.
7. The quantum network-based MDI-QKD method according to claim 1, wherein the gain and quantum bit error rate of said protocol are expressed as:
wherein,represents the sending intensity of Alice and Bob under rect baseThe gain of the optical pulse at u and v;represents the gain at which Alice1 and Bob send optical pulses of intensities u and v on the rect basis;representing the error rate of sending light pulses with the intensity u and v by Alice and Bob under the rect base;representing the error rate of Alice1 and Bob sending light pulses of intensities u and v on the rect basis;representing the error rate of single-photon pulses of an oblique polarization base in a quantum network, wherein the upper right label xx' represents that Alice and Bob use the oblique polarization base simultaneously, and the quantum network comprises an invisible state and MDI-QKD;indicating the error rate of the optical pulse with the intensity uv of the oblique polarization base, and the upper right label xx represents that Alice1 and Bob use the oblique polarization base simultaneously; u is the intensity of the optical pulse transmitted by Alice; v is the intensity of the light pulse sent by Bob; fn represents the fidelity of the quantum states communicated by Alice to Alice 1; under the condition of the same entanglement and key rate, the relative transmission distance of the protocol is gradually reduced along with the increase of the number n of nodes in the invisible transmission state; under the condition that the number n of nodes in the invisible transmission state is the same as the key rate, the relative transmission distance of the protocol is gradually reduced along with the reduction of the entanglement degree of the W state in the invisible transmission state.
8. The quantum network-based MDI-QKD method according to claim 1, wherein the quantum network comprises two legal communication users Alice and Bob of source nodes of the quantum network and one destination node Alicel of the quantum network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811172809.7A CN108847939B (en) | 2018-10-09 | 2018-10-09 | MDI-QKD method based on quantum network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811172809.7A CN108847939B (en) | 2018-10-09 | 2018-10-09 | MDI-QKD method based on quantum network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108847939A CN108847939A (en) | 2018-11-20 |
CN108847939B true CN108847939B (en) | 2020-02-21 |
Family
ID=64188060
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811172809.7A Active CN108847939B (en) | 2018-10-09 | 2018-10-09 | MDI-QKD method based on quantum network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108847939B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11258580B2 (en) | 2019-10-04 | 2022-02-22 | Red Hat, Inc. | Instantaneous key invalidation in response to a detected eavesdropper |
CN110768794A (en) * | 2019-10-30 | 2020-02-07 | 西安邮电大学 | Quantum key distribution method based on label pairing coherent state and quantum storage |
CN110808835B (en) * | 2019-11-19 | 2021-06-29 | 北京邮电大学 | Quantum key distribution network and quantum key distribution method and device |
US11423141B2 (en) | 2020-02-10 | 2022-08-23 | Red Hat, Inc. | Intruder detection using quantum key distribution |
CN111314073B (en) * | 2020-02-24 | 2022-04-22 | 浙江工商大学 | Information leakage resistant quantum conversation method based on single photon with polarization and empty mode freedom degrees |
CN112529199B (en) * | 2020-12-23 | 2021-09-28 | 北京百度网讯科技有限公司 | Entangled quantum state purification method, device, equipment, storage medium and product |
CN113162753A (en) * | 2021-04-29 | 2021-07-23 | 南京大学 | Quantum two-party cryptographic protocol construction method irrelevant to measuring equipment |
CN113963195B (en) * | 2021-09-24 | 2024-07-16 | 电子科技大学长三角研究院(湖州) | Method for identifying key nodes in network |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101394269A (en) * | 2008-08-07 | 2009-03-25 | 清华大学 | Remote communication method directly safely communicating with quantum by using quantum state injection reinforcement |
CN106130723A (en) * | 2016-08-19 | 2016-11-16 | 浙江神州量子网络科技有限公司 | There is the quantum key distribution system of actively monitoring function |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2546514B (en) * | 2016-01-20 | 2020-03-25 | Toshiba Res Europe Limited | Quantum communication system and method |
CN106656344B (en) * | 2017-01-16 | 2023-09-01 | 浙江神州量子网络科技有限公司 | MDI-QKD system and MDI-QKD method |
CN108199768B (en) * | 2017-12-29 | 2023-02-28 | 广东国腾量子科技有限公司 | Measuring equipment irrelevant quantum key distribution system and method based on W state |
-
2018
- 2018-10-09 CN CN201811172809.7A patent/CN108847939B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101394269A (en) * | 2008-08-07 | 2009-03-25 | 清华大学 | Remote communication method directly safely communicating with quantum by using quantum state injection reinforcement |
CN106130723A (en) * | 2016-08-19 | 2016-11-16 | 浙江神州量子网络科技有限公司 | There is the quantum key distribution system of actively monitoring function |
Also Published As
Publication number | Publication date |
---|---|
CN108847939A (en) | 2018-11-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108847939B (en) | MDI-QKD method based on quantum network | |
CA2883444C (en) | System and method for quantum key distribution | |
US8082443B2 (en) | Pedigrees for quantum cryptography | |
JP4398374B2 (en) | Cryptographic communication device | |
US11438149B2 (en) | Quantum key distribution method and system based on tree QKD network | |
US20060059343A1 (en) | Key expansion for qkd | |
CN110493010B (en) | Mail receiving and sending method of mail system based on quantum digital signature | |
WO2021213631A1 (en) | Improved cryptographic method and system | |
Wang et al. | Secure key distribution system based on optical channel physical features | |
CN108683462A (en) | A kind of encryption method and system of free space optical communication data | |
Lo et al. | Quantum cryptography: from theory to practice | |
WO2010011127A2 (en) | Quantum network relay | |
RU2661287C1 (en) | Method of transmission of encryption/decryption key by fiber optic line of unlimited length | |
CN113676319B (en) | Quantum key distribution system and method with trusted measurement base | |
Barnett et al. | Extending the reach of QKD using relays | |
Marchsreiter et al. | A PQC and QKD Hybridization for Quantum-Secure Communications | |
Anghel | Research, development and simulation of quantum cryptographic protocols | |
Wijesekera et al. | Software development for b92 quantum key distribution communication protocol | |
Chun-Yan et al. | Efficient quantum secure communication with a publicly known key | |
Atieh et al. | QKD Over FSO Under Different Weather Conditions Using OptiSystem Software | |
Aldhaheri et al. | A novel secure quantum key distribution algorithm | |
Zhang et al. | Quantum key distribution random access network | |
Charjan et al. | Quantum key distribution using different techniques and algorithms | |
ur Rehman et al. | Quantum key distribution with a control key | |
Zhang | Development and Application of Quantum Communication Technology from Economic Perspective |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |