CN109274495A - Two half Quantum Secure Direct Communication schemes based on Bell state - Google Patents
Two half Quantum Secure Direct Communication schemes based on Bell state Download PDFInfo
- Publication number
- CN109274495A CN109274495A CN201811464680.7A CN201811464680A CN109274495A CN 109274495 A CN109274495 A CN 109274495A CN 201811464680 A CN201811464680 A CN 201811464680A CN 109274495 A CN109274495 A CN 109274495A
- Authority
- CN
- China
- Prior art keywords
- quantum
- information
- sender
- sequence
- particle
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/70—Photonic quantum communication
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Optics & Photonics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Optical Communication System (AREA)
Abstract
The invention belongs to network communication technology fields, disclose a kind of two half Quantum Secure Direct Communication schemes based on Bell state, pass through the session of agreement, half quantum secret information recipient only needs the two column sequences sent to quantum information sender, successively with classical measurement base | 0 >, | 1 > } measurement, then the two kinds of situations that may be collapsed by comparing initial Bell state, it can be obtained n secret informations or 2n secret informations.The half Quantum Secure Direct Communication scheme based on Bell state that the invention proposes two can allow half quantum user to participate in communication;On the one hand user cost is reduced, on the one hand due to the simple easy realization of half quantum operation, reduces the realization difficulty of agreement;Two kinds of agreements have all only used Bell state and have done quantum information carrier, and participate in eavesdropping detection without additional trick photon;The complexity for reducing agreement advances the realization of Quantum Secure Direct Communication agreement.
Description
Technical field
The invention belongs to network communication technology field, more particularly to a kind of two half quantum based on Bell state are direct safely
Communication plan.
Background technique
Currently, existing background technique is such that in the industry
Under the background that quantum techniques are gradually improved, China has built up 2,000 kilometers long of Beijing-Shanghai quantum communications main line,
The metropolitan area Fiber quantum communication technology is mature, and quantum communication network enters practical stage from the laboratory research stage.Amount
Sub- cryptography is combined with a cross discipline of quantum physics and classical cryptoraphy, it is to utilize the basic of quantum physics
Characteristic realizes a kind of novel cipher system of password thought.Computation complexity is relied on classical cryptoraphy to realize the peace of communication
Full property is compared, quantum cryptology be based on quantum physics, mainly by quantum-mechanical uncertainty principle and quantum can not gram
Grand theorem guarantees the safety of communication, therefore the hot spot of industry is currently had become to the research of safe quantum communication.
Quantum Secure Direct Communication is an important research direction of quantum information processing, mainly realizes the secret of both sides
The directly exchange or information transmission of information.Depend on shared session key different from traditional quantum communications, quantum safety is directly logical
Letter need to only rely on the assistance for inveigling photon and quantum-mechanical fundamental characteristics i.e. and can guarantee the safety of information exchange.2000
Year, Long Guilu et al. proposes first Quantum Secure Direct Communication scheme --- efficient two step Quantum Secure Direct Communication side
Case.Henceforth, the research in this field all the more tends to be perfect, and has delivered many outstanding papers.
Furthermore found by summary to the prior art, there is currently technical problem underlying have:
The hardware cost of user requires high: the existing secure direct communication scheme based on quantum techniques usually requires user
With full dose subprocessing ability, that is, it is equipped with advanced quantum devices, such as quantum generator, quantum memory, tenth of the twelve Earthly Branches operator.But it passes through
Allusion quotation user or the user for only having part quantum treatment ability can not bear the quantum devices of such valuableness, the to a certain degree upper limit
The use scope of Quantum Secure Direct Communication agreement is made.
The realization difficulty for eavesdropping detection is big: existing Quantum Secure Direct Communication, it will usually use a variety of quantum superposition states
It is detected to assist to complete eavesdropping, if quantum communications carrier is Bell state, insertion X base inveigles photon to assist to detect.It is identical reaching
Under the premise of testing goal, the use of a variety of superposition states, which needs to communicate participant, has the function of the measurement of various amounts subbase.Certain
In degree, the eavesdropping detection difficulty of increased agreement.
The particle service efficiency of agreement is not high: for the transmission for realizing n secret informations, it usually needs preparation 4n even 8n
Primary hides secret information, and needs to prepare the reality of new particle subsidiary communications process again in communication process
It is existing.The two column sequences that eavesdropping detection and secret information use are usually mixed in same string sequence, add somewhat to grain
The usage quantity of son.
Practice difficulty is larger: being used in mixed way, is randomly ordered of a variety of superposition states, quantum state preparation and transmission are all
It is present practice problem to be solved.
Solve the difficulty and meaning of above-mentioned technical problem:
The quantum communications of highly effective and safe are the targets that society is pursued.There are two types of the approach for reducing user's hardware cost: first is that
Reach actual requirement by constantly researching and developing new and effective hardware device, but research and development are at high cost, progress is slower;Second is that passing through modification amount
Sub- communication protocol itself allows the classical user for not having quantum treatment ability or half quantum user to participate in quantum communications, but needs
Agreement itself considers careful detailed.The means of eavesdropping detection are always to utilize quantum physics characteristic compared to for eavesdropping attack
It can be realized the shielding to tradition eavesdropping attack, but as the hardware device of attacker upgrades, we are with greater need for from agreement itself
It sets out, that is, needs succinct protocol procedures, stronger eavesdropping detection method.The even Particle Delivery rate pole of quantum communications
Height, under the same conditions, the efficiency that we still desire to particle become excellent, in order to practical realization.
After solving above-mentioned technical problem, bring meaning are as follows:
The half Quantum Secure Direct Communication scheme based on Bell state that the invention proposes two allows half quantum user to participate in logical
Letter.User cost is not only reduced, and due to the simple easy realization of half quantum operation, also reduces the realization difficulty of agreement.
Summary of the invention
In view of the problems of the existing technology, half Quantum Secure Direct Communication based on Bell state that the present invention provides two
Scheme.
The substantially realization process of two agreements is as follows in the present invention:
By executing protocol procedures, half quantum secret information recipient only needs two column sent to quantum information sender
Sequence, successively with classical measurement base | 0 >, | 1 > } measurement, then two kinds of situations that may be collapsed by comparing initial Bell state, both
It can get n secret informations or 2n secret informations.
And quantum information sender has full dose subprocessing ability and responsibility system for Bell state sequence and carries out Bell
Base measurement;And half quantum secret information recipient can only proceed as follows:
Measure MEASURE operation: using classical measurement base | 0 >, | 1 > } measurement particle, and retain measurement result;
Reflect REFLECT operation: without any processing directly to send back to sender to the particle received.
The particular content of agreement one is as follows:
Step 1: quantum information sender from | φ±>,|ψ±> in randomly select preparation N=4n (1+ δ) a Bell state have
Then each Bell state is split into a particle H sequence and two particle T-sequences by sequence sequence;It is attacked to resist two kinds of Trojan Horses
It hits, before T-sequence reaches half quantum secret information recipient, half quantum secret information recipient must be equipped with a wavelength filter
Wave device and number of photons separator PNS;Quantum information sender will retain H sequence and T-sequence be sent to half quantum secret information
Recipient;
Step 2: half quantum secret information recipient randomly selects the particle in the sequence after receiving T-sequence
MEASURE or REFLECT operation;When selection be MEASURE operation when, half quantum secret information recipient is surveyed using classical
Amount base | 0 >, | 1 > } it measures particle and retains measurement result, finally form MRBSequence;When selection be REFLECT operation when,
The particle is directly reflected to quantum information sender by half quantum secret information recipient, and without any processing;When N value is enough
When big, the population for returning to quantum information sender will tend to 2n;
Step 3: the temporary quantum bit returned of quantum information sender, and believed by classical channel to half quantum secret
It ceases recipient and replys confirmation;Then, half quantum secret information recipient announces the corresponding position for returning to particle in T-sequence;It is right
In each particle, quantum information sender is by the particle of corresponding position does the joint Bell measurement in hand and in H sequence;For example,
When initial Bell state isWhen, if measurement result is not identical as initial Bell state, quantum information hair
Fang Ze is sent to think that the particle returned is tampered;After completing all the joint Bell measurements for returning to particle, sender is calculated
Error rate.When error rate is lower than scheduled threshold value, sender then thinks that there is no listener-ins in quantum channel, and abandons this 2n
Bell state enters the 4th step;Otherwise, sender will be considered in channel that there are listener-in, termination protocols;
Step 4: quantum information sender with classical measurement base | 0 >, | 1 > } measurement hand in be left H sequence, measured
As a result MRA;Then, sender randomly selects n as coded sequence MReWith n detection sequence MRc;Encryption rule is as follows: when
Need to transmit classical bit information be 0 when, sender prepares identical particle again, does not make any changes;When needing to transmit
Classical information be 1 when, sender prepares opposite quantum bit again;Last sender is by new coded sequence MRe' and detection
Sequence MRcReset and generates MRA', its correct sequence is recorded, and sequence is sent to information receiver;
Step 5: half quantum secret information recipient receives MRA' after, it is returned by classical channel vector sub-information sender
Multiple confirmation, and using classical measurement base | 0 >, | 1 > } measure the sequence;It receives half quantum secret information recipient and determines information
Quantum information sender, it will announce MRe' and MRcInitial order and corresponding position initial Bell state.And it carries out as follows
Operation:
(1) eavesdropping detection.The initial Bell that half quantum secret information recipient issues by comparing quantum information sender
The state and MR of statec、MRBMeasurement result, calculate error rate, when initial Bell state is | φ±>(|ψ±>) and measurement result be not
When 00 or 11 (01 or 10), half quantum secret information recipient will be considered in channel that there are listener-ins;When n detection particles of completion
Information comparison, half quantum secret information recipient will obtain error rate values to judge in quantum channel with the presence or absence of eavesdropping
Person;
(2) secret information is obtained.When half quantum secret information recipient thinks that listener-in is not present in channel, again
Compare the initial Bell state and MR of quantum information sender publicatione'、MRBMeasurement result, secret information can be obtained.
The particular content of agreement two is as follows:
Step 1: quantum information sender from | φ±>,|ψ±> in randomly select preparation N=4n (1+ δ) a Bell state have
Then each Bell state is split into a particle H sequence and two particle T-sequences by sequence sequence;It is attacked to resist two kinds of Trojan Horses
It hits, before T-sequence reaches half quantum secret information recipient, half quantum secret information recipient must be equipped with a wavelength filter
Wave device and number of photons separator PNS;Quantum information sender will retain H sequence and T-sequence be sent to half quantum secret information
Recipient;
Step 2: half quantum secret information recipient randomly selects the particle in the sequence after receiving T-sequence
MEASURE or REFLECT operation;When selection be MEASURE operation when, half quantum secret information recipient is surveyed using classical
Amount base | 0 >, | 1 > } it measures particle and retains measurement result, finally form MRBSequence;When selection be REFLECT operation when,
The particle is directly reflected to sender by half quantum secret information recipient, and without any processing;When N value is sufficiently large, return
It will tend to 2n back to the population of quantum information sender;
Step 3: the temporary quantum bit returned of quantum information sender, and believed by classical channel to half quantum secret
It ceases recipient and replys confirmation;Then, half quantum secret information recipient announces the corresponding position for returning to particle in T-sequence;It is right
In each particle, quantum information sender is by the particle of corresponding position does the joint Bell measurement in hand and in H sequence;For example,
When initial Bell state isWhen, if measurement result is not identical as initial Bell state, quantum information hair
Fang Ze is sent to think that the particle returned is tampered;After completing all the joint Bell measurements for returning to particle, sender is calculated
Error rate.When error rate is lower than scheduled threshold value, sender then thinks that there is no listener-ins in quantum channel, and abandons this 2n
Bell state enters the 4th step;Otherwise, sender will be considered in channel that there are listener-in, termination protocols;
Step 4: quantum information sender with classical measurement base | 0 >, | 1 > } the remaining H sequence of measurement, obtain measurement knot
Fruit MRA;Then sender randomly selects n particles as ciphering sequence MReWith n particles as detection sequence MRc;It is measured at 1
The new encryption rule that 2 bit secret informations are encoded on sub- bit is as follows: 1) when secret classical information is 00 or 11, quantum information is sent out
The side of sending will prepare again the particle of same state and without any processing;When secret classical information is 01 or 10, quantum letter
Breath sender will prepare the particle of inverse state again;2) when classical information is 11 or 10, quantum information sender will be with
Machine from | 0 >, | 1 > } choose a trick particle be inserted into behind this particle;After encrypting all secret informations, quantum letter
Breath sender only needs newly-generated MRe', detection sequence MRcHalf quantum information recipient is all issued with trick photon, no
It needs to resequence;
Step 5: half quantum secret information receives after receiving the particle that all quantum information senders send over
Person will promoting menstruation allusion quotation channel vector sub-information sender reply confirmation.Then, quantum information sender, which announces, inveigles inserting for photon
Enter position, MRe' the corresponding initial Bell state of initial order and corresponding position particle state.
(1) eavesdropping detection.Half quantum information recipient is by MRc、MRBMeasurement result and quantum information sender publication
Initial Bell state is compared, and detects channel safety;When initial Bell state is | φ+>(|ψ+>), and measurement result be not 00 or
When 11 (01 or 10), half quantum secret information recipient will be considered in channel that there are listener-ins;When the letter for completing n detection particles
Breath compares, and information receiver will obtain error rate values, to judge that there are listener-ins in quantum channel;When error rate is lower than threshold value
When, information receiver will carry out next step operation, and when being higher than threshold value, information receiver is by termination protocol;
(2) secret information is obtained.Half quantum secret information recipient can by MRe'、MReMeasurement result and initial
Bell state is compared, and obtains secret information.When this particle has the trick photon of insertion, information receiver, which removes, inveigles light
Son simultaneously compares MRe'、MReAfter measurement result, it both can determine whether that the secret information of transmission is 11 or 10 certainly.
Realize that described two half quantum safety based on Bell state are directly logical another object of the present invention is to provide a kind of
The computer program of letter scheme.
Realize that described two half quantum safety based on Bell state are directly logical another object of the present invention is to provide a kind of
The information data processing terminal of letter scheme.
Another object of the present invention is to provide a kind of computer readable storage mediums, including instruction, when it is in computer
When upper operation, so that computer executes two half Quantum Secure Direct Communication schemes based on Bell state.
Realize that described two half quantum safety based on Bell state are directly logical another object of the present invention is to provide a kind of
The network communication platform of letter scheme.
In conclusion advantages of the present invention and good effect are as follows:
The half Quantum Secure Direct Communication scheme based on Bell state that the invention proposes two allows half quantum user to participate in logical
Letter.User cost is not only reduced, and due to the simple easy realization of half quantum operation, also reduces the realization difficulty of agreement.
Two column sequences are generated by splitting Bell state, preferably complete eavesdropping detection and secret information transfer function.
Two kinds of agreements have all only used that Bell state does quantum information carrier and Alice need to only prepare 4n initial Bell states,
And eavesdropping detection is participated in without additional trick photon.It is straight safely to have pushed half quantum for the complexity for reducing agreement in this way
Connect the realization of communication protocol.In secret information transmittance process, information receiver is allowed only to have the function of basic quantum, measured
And reflection, so that it may realize the transmission of eavesdropping detection and secret information.The hardware cost of terminal user is reduced, so that classical use
Family can participate in quantum communications.Meanwhile eavesdropping detection in secure communication process and secret information transmitting be it is distinct,
Only sender and recipients, which determine, is not present listener-in in channel, just formally carry out the transmission of secret information.Different from passing
It unites half quantum or Quantum Secure Direct Communication, the transmitting of secret information only once and is deposited in single-particle, and listener-in is not
The state for knowing the Bell state of initial Bell state and Alice initial preparation, can not obtain any secret information, utilize quantum object
Reason basic principle has resisted eavesdropping attack.
In addition, using identical method for analyzing efficiency and detailed analysis protocol procedures, tabulation than it is right it is previous other
The particle efficiency (table 3) of two kinds of related protocols of author.Comparison result shows that two safety based on Bell state of this patent are logical
Believe that the particle service efficiency of agreement is more preferable, the efficiency (14.3%~15.4%) of second agreement is especially prominent.
Table 3
Agreement | C (position) | qc(position) | D (position) | qt=qc+ d (position) | bt(position) | Percent efficiency (%) |
CDSSQC1 | n | 4n | 17n | 21n | 2n | η=4.35 |
CDSSQC2 | n | 3n | 11n | 14n | 2n | η=6.25 |
SQSDC1 | n | 2n | 11n | 13n | 0 | η=7.69 |
SQSDC2 | 2n | 2n | 11nto12n | 13nto14n | 0 | 14.3≤η≤15.4 |
Detailed description of the invention
Fig. 1 is the two provided in an embodiment of the present invention half Quantum Secure Direct Communication program flow charts based on Bell state.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to embodiments, to the present invention
It is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to
Limit the present invention.
The invention will be further described combined with specific embodiments below.
Fig. 1, the two provided in an embodiment of the present invention half Quantum Secure Direct Communication schemes based on Bell state, comprising:
1, the instance analysis in relation to agreement one:
If the initial Bell state of Alice publication is | φ+>、|φ+>、|ψ+>、|ψ->, MRBAnd MRe' measurement result point
Other position 1100 and 0101, then obtained secret information is 1010 by half quantum secret information recipient Bob.
Process is as follows:
I, the Bell state of preparation is split into H sequence and T particle sequence by Alice, and T particle sequence is sent to Bob.
II, Bob randomly selects MEASURE and REFLCT operation, the MR measured in hand after receivingBInformation is 1100 (corresponding
4 with secret information).
III, Alice send the sequence MR for having secret informatione' Bob is given, it is 0101 that Bob, which obtains result by measurement,.
IV, Alice announces initial Bell state corresponding to this several secret information positions to Bob | φ+>、|φ+>、|ψ+>、|
ψ->。
Bob summarizes that obtain information as follows: Bell state is collapsed situation: 11,11,10,10.MRe' and MRBThe result measured are as follows:
01,11,00,10.It is 1010 that then Bob, which can be obtained secret information,.(table 1)
Table 1
Initial Bell state | MRB | MRe' | Secret information |
|φ±> | 0 | 0 | 0 |
0 | 1 | 1 | |
1 | 1 | 0 | |
1 | 0 | 1 | |
|ψ±> | 0 | 1 | 0 |
0 | 0 | 1 | |
1 | 0 | 0 | |
1 | 1 | 1 |
2, the detailed process of agreement two.
If the Bell state of Alice initial preparation is | φ+>、|φ+>、|ψ+>、|ψ->、|φ+>、|φ+>、|ψ+>、|ψ-> simultaneously
And MReAnd MRe' measurement result be 11000101 and 01 (0) 1 (1) 01 (1) 11 (0) 0.Alice will announce her and be inserted into trick
The place of photon, the 2nd, the 3rd and the 7th.So Bob will obtain secret information position: 0111110110001100.
Process is as follows:
I, the Bell state of preparation is split into H sequence and T particle sequence by Alice, and T particle sequence is sent to Bob.
II, Bob randomly selects MEASURE and REFLCT operation, the MR measured after receivingBInformation is 11000101 (corresponding
8 with secret information).
III, Alice send the sequence MR for having secret informatione' Bob is given, it is 01 (0) 1 (1) 01 that Bob measurement, which obtains result,
(1) 11 (0) 0 (wherein parenthesis part is the trick photon of insertion, but Bob can not be distinguished, herein for analysis thus add).
IV, Alice announces initial Bell state corresponding to this several secret information positions to Bob | φ+>、|φ+>、|ψ+>、|
ψ->、|φ+>、|φ+>、|ψ+>、|ψ->, Bob summarizes that obtain information as follows: Bell state is collapsed situation position are as follows: 11,11,10,10,
00,11,10,01.Than the result measured in opponent: 01,1 (0) 1,1 (1) 0,00,1 (1) 0,11,1 (0) 0,01.So Bob is
Can get secret information is 0111110110001100.
Table 2
Initial Bell state | MRB | MRe' | Secret information |
|φ+> | 1 | 0 | 01 |
|φ+> | 1 | 1(0) | 11 |
|ψ+> | 0 | 1(1) | 11 |
|ψ-> | 0 | 0 | 01 |
|φ+> | 0 | 1(1) | 10 |
|φ+> | 1 | 1 | 00 |
|ψ+> | 0 | 1(0) | 11 |
|ψ-> | 1 | 0 | 00 |
。
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real
It is existing.When using entirely or partly realizing in the form of a computer program product, the computer program product include one or
Multiple computer instructions.When loading on computers or executing the computer program instructions, entirely or partly generate according to
Process described in the embodiment of the present invention or function.The computer can be general purpose computer, special purpose computer, computer network
Network or other programmable devices.The computer instruction may be stored in a computer readable storage medium, or from one
Computer readable storage medium is transmitted to another computer readable storage medium, for example, the computer instruction can be from one
A web-site, computer, server or data center pass through wired (such as coaxial cable, optical fiber, Digital Subscriber Line (DSL)
Or wireless (such as infrared, wireless, microwave etc.) mode is carried out to another web-site, computer, server or data center
Transmission).The computer-readable storage medium can be any usable medium or include one that computer can access
The data storage devices such as a or multiple usable mediums integrated server, data center.The usable medium can be magnetic Jie
Matter, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disk Solid
State Disk (SSD)) etc..
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.
Claims (10)
1. a kind of two half Quantum Secure Direct Communication schemes based on Bell state, which is characterized in that described two to be based on Bell
Half Quantum Secure Direct Communication scheme of state includes:
It executes in protocol procedures, half quantum secret information recipient sends two column sequences to quantum information sender, successively with warp
Allusion quotation measurement base | 0 >, | 1 > } measurement, then the two kinds of situations that may be collapsed by comparing initial Bell state, obtain n secret informations
Or 2n secret informations.
2. the two as described in claim 1 half Quantum Secure Direct Communication schemes based on Bell state, which is characterized in that quantum
Information sender has full dose subprocessing ability and responsibility system for Bell state sequence and carries out the measurement of Bell base;
Half quantum secret information recipient proceeds as follows:
Measure MEASURE operation: using classical measurement base | 0 >, | 1 > } measurement particle, and retain measurement result;
Reflect REFLECT operation: without any processing directly to send back to sender to the particle received.
3. the two as described in claim 1 half Quantum Secure Direct Communication schemes based on Bell state, which is characterized in that two
Agreement one in Quantum Secure Direct Communication agreement based on Bell state includes:
Step 1: quantum information sender from | φ±>,|ψ±> in randomly select preparation the orderly sequence of N=4n (1+ δ) Bell state
Column, then split into a particle H sequence and two particle T-sequences for each Bell state;To resist two kinds of Trojan horse attacks,
Before T-sequence reaches half quantum secret information recipient, half quantum secret information recipient is equipped with a wavelength filter and light
Subnumber separator PNS;Quantum information sender will retain H sequence and T-sequence be sent to half quantum secret information recipient;
Step 2: half quantum secret information recipient randomly selects the particle in the sequence after receiving T-sequence
MEASURE or REFLECT operation;When selection be MEASURE operation when, half quantum secret information recipient is surveyed using classical
Amount base | 0 >, | 1 > } it measures particle and retains measurement result, finally form MRBSequence;When selection be REFLECT operation when,
The particle is directly reflected to quantum information sender by half quantum secret information recipient, and without any processing;When N value is enough
When big, the population for returning to quantum information sender will tend to 2n;
Step 3: the temporary quantum bit returned of quantum information sender, and connect by classical channel to half quantum secret information
Receipts person replys confirmation;Then, half quantum secret information recipient announces the corresponding position for returning to particle in T-sequence;For every
One particle, quantum information sender is by the particle of corresponding position does the joint Bell measurement in hand and in H sequence;For example, originally
Beginning Bell state isWhen, if measurement result is not identical as initial Bell state, quantum information sender
Then think that the particle returned is tampered;After completing all the joint Bell measurements for returning to particle, sender calculates error rate.
When error rate is lower than scheduled threshold value, sender then thinks in quantum channel there is no listener-in, and abandon this 2n Bell into
Enter the 4th step;Otherwise, sender will be considered in channel that there are listener-in, termination protocols;
Step 4: quantum information sender with classical measurement base | 0 >, | 1 > } measurement hand in be left H sequence, obtain measurement result
MRA;Then, sender randomly selects n as coded sequence MReWith n detection sequence MRc;Encryption rule is as follows: working as needs
When the classical bit information of transmission is 0, sender prepares identical particle again, does not make any changes;When the warp that needs transmit
When allusion quotation information is 1, sender prepares opposite quantum bit again;Last sender is by new coded sequence MRe' and detection sequence
MRcReset and generates MRA', its correct sequence is recorded, and sequence is sent to information receiver;
Step 5: half quantum secret information recipient receives MRA' after, it is replied by classical channel vector sub-information sender true
Recognize, and using classical measurement base | 0 >, | 1 > } measure the sequence;Receive the amount that half quantum secret information recipient determines information
Sub-information sender, it will announce MRe' and MRcInitial order and corresponding position initial Bell state.
4. the two as claimed in claim 3 half Quantum Secure Direct Communication schemes based on Bell state, which is characterized in that the 5th
Step is further divided into:
(1) eavesdropping detection: the initial Bell state that half quantum secret information recipient issues by comparing quantum information sender
State and MRc、MRBMeasurement result, calculate error rate, when initial Bell state is | φ±>(|ψ±>) and measurement result be not 00 or
11,01 or 10 when, half quantum secret information recipient will be considered in channel that there are listener-ins;When the letter for completing n detection particles
Breath compares, and half quantum secret information recipient will obtain error rate values to judge in quantum channel with the presence or absence of listener-in;
(2) secret information is obtained.When half quantum secret information recipient thinks to compare again in channel there is no when listener-in
The initial Bell state and MR of quantum information sender publicatione'、MRBMeasurement result, obtain secret information.
5. the two as described in claim 1 half Quantum Secure Direct Communication schemes based on Bell state, which is characterized in that two
Agreement two in Quantum Secure Direct Communication agreement based on Bell state includes:
Step 1: quantum information sender from | φ±>,|ψ±> in randomly select preparation the orderly sequence of N=4n (1+ δ) Bell state
Column, then split into a particle H sequence and two particle T-sequences for each Bell state;To resist two kinds of Trojan horse attacks,
Before T-sequence reaches half quantum secret information recipient, half quantum secret information recipient must be equipped with a wavelength filter
With number of photons separator PNS;Quantum information sender, which will retain H sequence and T-sequence is sent to half quantum secret information, to be received
Person;
Step 2: half quantum secret information recipient randomly selects the particle in the sequence after receiving T-sequence
MEASURE or REFLECT operation;When selection be MEASURE operation when, half quantum secret information recipient is surveyed using classical
Amount base | 0 >, | 1 > } it measures particle and retains measurement result, finally form MRBSequence;When selection be REFLECT operation when,
The particle is directly reflected to sender by half quantum secret information recipient, and without any processing;When N value is sufficiently large, return
It will tend to 2n back to the population of quantum information sender;
Step 3: the temporary quantum bit returned of quantum information sender, and connect by classical channel to half quantum secret information
Receipts person replys confirmation;Then, half quantum secret information recipient announces the corresponding position for returning to particle in T-sequence;For every
One particle, quantum information sender is by the particle of corresponding position does the joint Bell measurement in hand and in H sequence;For example, originally
Beginning Bell state isWhen, if measurement result is not identical as initial Bell state, quantum information sender
Then think that the particle returned is tampered;After completing all the joint Bell measurements for returning to particle, sender calculates error rate.
When error rate is lower than scheduled threshold value, sender then thinks in quantum channel there is no listener-in, and abandon this 2n Bell into
Enter the 4th step;Otherwise, sender will be considered in channel that there are listener-in, termination protocols;
Step 4: quantum information sender with classical measurement base | 0 >, | 1 > } the remaining H sequence of measurement, obtain measurement result MRA;
Then sender randomly selects n particles as ciphering sequence MReWith n particles as detection sequence MRc;In 1 quantum bit
The new encryption rule of 2 bit secret informations of upper coding is as follows:
1) when secret classical information is 00 or 11, quantum information sender is any without doing by the particle for preparing same state again
Processing;When secret classical information is 01 or 10, quantum information sender will prepare the particle of inverse state again;
2) when classical information be 11 or 10 when, quantum information sender will at random from | 0 >, | 1 > } choose a trick particle
It is inserted into behind this particle;After encrypting all secret informations, quantum information sender only needs newly-generated MRe'、
Detection sequence MRcHalf quantum information recipient is all issued with trick photon, does not need to resequence;
Step 5: half quantum secret information recipient will after receiving the particle that all quantum information senders send over
It can promoting menstruation allusion quotation channel vector sub-information sender reply confirmation;Then, quantum information sender announces the insertion position for inveigling photon,
MRe' the corresponding initial Bell state of initial order and corresponding position particle state.
6. the two as claimed in claim 5 half Quantum Secure Direct Communication schemes based on Bell state, which is characterized in that the 5th
Step is further divided into:
(1) eavesdropping detection: half quantum information recipient is by MRc、MRBMeasurement result issued with quantum information sender it is initial
Bell state is compared, and detects channel safety;When initial Bell state is | φ+>(|ψ+>), and measurement result be not 00 or 11,
When 01 or 10, half quantum secret information recipient will be considered in channel that there are listener-ins;When the information ratio for completing n detection particles
Right, information receiver will obtain error rate values, to judge that there are listener-ins in quantum channel;When error rate is lower than threshold value,
Information receiver will carry out next step operation, and when being higher than threshold value, information receiver is by termination protocol;
(2) secret information is obtained.Half quantum secret information recipient can by MRe'、MReMeasurement result and initial Bell state
It is compared, obtains secret information.When this particle has the trick photon of insertion, information receiver, which removes, to be inveigled photon and compares
Compared with MRe' and MReAfter measurement result, it both can determine whether that the secret information of transmission is 11 or 10 certainly.
7. a kind of realize the described two half Quantum Secure Direct Communication schemes based on Bell state of claim 1~6 any one
Computer program.
8. a kind of realize the described two half Quantum Secure Direct Communication schemes based on Bell state of claim 1~6 any one
Information data processing terminal.
9. a kind of computer readable storage medium, including instruction, when run on a computer, so that computer is executed as weighed
Benefit requires two half Quantum Secure Direct Communication schemes based on Bell state described in 1-6 any one.
10. a kind of network communication for realizing the described two half Quantum Secure Direct Communication schemes based on Bell state of claim is flat
Platform.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811464680.7A CN109274495B (en) | 2018-12-03 | 2018-12-03 | Two Bell state-based semi-quantum secure direct communication methods |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811464680.7A CN109274495B (en) | 2018-12-03 | 2018-12-03 | Two Bell state-based semi-quantum secure direct communication methods |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109274495A true CN109274495A (en) | 2019-01-25 |
CN109274495B CN109274495B (en) | 2020-04-28 |
Family
ID=65187283
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811464680.7A Active CN109274495B (en) | 2018-12-03 | 2018-12-03 | Two Bell state-based semi-quantum secure direct communication methods |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109274495B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109995528A (en) * | 2019-04-25 | 2019-07-09 | 成都信息工程大学 | Bidirectional identity authentication and half quantum safety direct communication method for resisting channel noise |
CN110460389A (en) * | 2019-09-02 | 2019-11-15 | 福建师范大学 | A kind of multi-party controlled bidirectional quantum safety direct communication method and system based on cluster state |
CN112332988A (en) * | 2021-01-06 | 2021-02-05 | 成都信息工程大学 | Agile quantum privacy query method based on anti-rotation noise |
CN114448692A (en) * | 2022-01-23 | 2022-05-06 | 青岛理工大学 | Quantum privacy query method based on Bell state identity authentication |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103297226A (en) * | 2013-06-03 | 2013-09-11 | 浙江工商大学 | Controlled bi-directional quantum secure direct communication protocol free of information leakage |
US20130308956A1 (en) * | 2004-08-04 | 2013-11-21 | U.S. Army Research Laboratory ATT: RDRL-LOC-I | Quantum based information transfer system and method |
US20140099104A1 (en) * | 2012-10-04 | 2014-04-10 | Applied Communication Sciences | Method to mitigate propagation loss in waveguide transmission of quantum states |
CN107786280A (en) * | 2017-09-30 | 2018-03-09 | 南京邮电大学 | It is a kind of based on the super tripartite's quantum safety direct communication method for tangling Bel's state |
CN108173654A (en) * | 2018-03-13 | 2018-06-15 | 成都信息工程大学 | A kind of two side's cryptographic key negotiation methods and system based on half quantum techniques |
CN108881215A (en) * | 2018-06-13 | 2018-11-23 | 成都信息工程大学 | The half Quantum Secure Direct Communication agreement based on Bell state |
-
2018
- 2018-12-03 CN CN201811464680.7A patent/CN109274495B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130308956A1 (en) * | 2004-08-04 | 2013-11-21 | U.S. Army Research Laboratory ATT: RDRL-LOC-I | Quantum based information transfer system and method |
US20140099104A1 (en) * | 2012-10-04 | 2014-04-10 | Applied Communication Sciences | Method to mitigate propagation loss in waveguide transmission of quantum states |
CN103297226A (en) * | 2013-06-03 | 2013-09-11 | 浙江工商大学 | Controlled bi-directional quantum secure direct communication protocol free of information leakage |
CN107786280A (en) * | 2017-09-30 | 2018-03-09 | 南京邮电大学 | It is a kind of based on the super tripartite's quantum safety direct communication method for tangling Bel's state |
CN108173654A (en) * | 2018-03-13 | 2018-06-15 | 成都信息工程大学 | A kind of two side's cryptographic key negotiation methods and system based on half quantum techniques |
CN108881215A (en) * | 2018-06-13 | 2018-11-23 | 成都信息工程大学 | The half Quantum Secure Direct Communication agreement based on Bell state |
Non-Patent Citations (2)
Title |
---|
CHEN XIE等: "Semi-quantum Secure Direct Communication Scheme Based on Bell States", 《INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS》 * |
曹正文等: "基于Bell态粒子和单光子混合的量子安全直接通信方案", 《物理学报》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109995528A (en) * | 2019-04-25 | 2019-07-09 | 成都信息工程大学 | Bidirectional identity authentication and half quantum safety direct communication method for resisting channel noise |
CN109995528B (en) * | 2019-04-25 | 2021-02-02 | 成都信息工程大学 | Semi-quantum secure direct communication method and storage medium |
CN110460389A (en) * | 2019-09-02 | 2019-11-15 | 福建师范大学 | A kind of multi-party controlled bidirectional quantum safety direct communication method and system based on cluster state |
CN110460389B (en) * | 2019-09-02 | 2020-10-30 | 福建师范大学 | Cluster state-based multiparty controlled bidirectional quantum secure direct communication method and system |
CN112332988A (en) * | 2021-01-06 | 2021-02-05 | 成都信息工程大学 | Agile quantum privacy query method based on anti-rotation noise |
CN114448692A (en) * | 2022-01-23 | 2022-05-06 | 青岛理工大学 | Quantum privacy query method based on Bell state identity authentication |
Also Published As
Publication number | Publication date |
---|---|
CN109274495B (en) | 2020-04-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109274495A (en) | Two half Quantum Secure Direct Communication schemes based on Bell state | |
CN105553648B (en) | Quantum key distribution, privacy amplification and data transmission method, apparatus and system | |
CN108092771B (en) | Tamper-proof controlled quantum secure direct communication method and system | |
Chong et al. | Improvement on “quantum key agreement protocol with maximally entangled states” | |
CN108809644B (en) | Disorder high-capacity multiparty quantum key negotiation method based on high-energy level bell state | |
CN108881215B (en) | Bell state-based semi-quantum secure direct communication method | |
CN108768641A (en) | A kind of quantum privacy comparative approach and system based on GHZ states | |
CN107493168B (en) | Quanta identity authentication method and its application method during quantum key distribution | |
CN110061787B (en) | Bell state-based semi-quantum secure direct communication method and system | |
CN109714158B (en) | Bell state-based semi-quantum privacy comparison method and system | |
CN109995528B (en) | Semi-quantum secure direct communication method and storage medium | |
Ye et al. | Multi-user quantum private comparison with scattered preparation and one-way convergent transmission of quantum states | |
CN110929294A (en) | One-way transmission quantum database privacy query method | |
CN110071814A (en) | A kind of quantum Proxy Signature method and system based on Bell state entanglement transfer | |
CN108092770A (en) | Quanta identity authentication method, computer, computer program, readable storage medium storing program for executing | |
CN106685659B (en) | Quantum secret sharing method capable of resisting interception of retransmission, man-in-the-middle and entanglement attacks | |
CN110474770A (en) | A kind of multi-party half quantum secret sharing method and system based on single photon | |
CN109257108A (en) | A kind of multiplicate controlling quantum communications protocol implementing method and system | |
CN111865588B (en) | Efficient quantum secret information interchange method, system and storage medium | |
CN110635907B (en) | Controlled quantum conversation method with identity authentication function based on GHZ-like state | |
Tomamichel et al. | One-sided device-independent QKD and position-based cryptography from monogamy games | |
CN108737116B (en) | Voting protocol method based on d-dimensional three-quantum entangled state | |
CN115795518A (en) | Block chain-based federal learning privacy protection method | |
KR20120071883A (en) | Quantum authentication method and apparatus for quantum secret sharing protocol | |
He et al. | Oblivious transfer using quantum entanglement |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |