CN109274495A - Two half Quantum Secure Direct Communication schemes based on Bell state - Google Patents

Two half Quantum Secure Direct Communication schemes based on Bell state Download PDF

Info

Publication number
CN109274495A
CN109274495A CN201811464680.7A CN201811464680A CN109274495A CN 109274495 A CN109274495 A CN 109274495A CN 201811464680 A CN201811464680 A CN 201811464680A CN 109274495 A CN109274495 A CN 109274495A
Authority
CN
China
Prior art keywords
quantum
information
sender
sequence
particle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811464680.7A
Other languages
Chinese (zh)
Other versions
CN109274495B (en
Inventor
闫丽丽
孙裕华
张仕斌
昌燕
盛志伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu University of Information Technology
Original Assignee
Chengdu University of Information Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu University of Information Technology filed Critical Chengdu University of Information Technology
Priority to CN201811464680.7A priority Critical patent/CN109274495B/en
Publication of CN109274495A publication Critical patent/CN109274495A/en
Application granted granted Critical
Publication of CN109274495B publication Critical patent/CN109274495B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/70Photonic quantum communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Optics & Photonics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Optical Communication System (AREA)

Abstract

The invention belongs to network communication technology fields, disclose a kind of two half Quantum Secure Direct Communication schemes based on Bell state, pass through the session of agreement, half quantum secret information recipient only needs the two column sequences sent to quantum information sender, successively with classical measurement base | 0 >, | 1 > } measurement, then the two kinds of situations that may be collapsed by comparing initial Bell state, it can be obtained n secret informations or 2n secret informations.The half Quantum Secure Direct Communication scheme based on Bell state that the invention proposes two can allow half quantum user to participate in communication;On the one hand user cost is reduced, on the one hand due to the simple easy realization of half quantum operation, reduces the realization difficulty of agreement;Two kinds of agreements have all only used Bell state and have done quantum information carrier, and participate in eavesdropping detection without additional trick photon;The complexity for reducing agreement advances the realization of Quantum Secure Direct Communication agreement.

Description

Two half Quantum Secure Direct Communication schemes based on Bell state
Technical field
The invention belongs to network communication technology field, more particularly to a kind of two half quantum based on Bell state are direct safely Communication plan.
Background technique
Currently, existing background technique is such that in the industry
Under the background that quantum techniques are gradually improved, China has built up 2,000 kilometers long of Beijing-Shanghai quantum communications main line, The metropolitan area Fiber quantum communication technology is mature, and quantum communication network enters practical stage from the laboratory research stage.Amount Sub- cryptography is combined with a cross discipline of quantum physics and classical cryptoraphy, it is to utilize the basic of quantum physics Characteristic realizes a kind of novel cipher system of password thought.Computation complexity is relied on classical cryptoraphy to realize the peace of communication Full property is compared, quantum cryptology be based on quantum physics, mainly by quantum-mechanical uncertainty principle and quantum can not gram Grand theorem guarantees the safety of communication, therefore the hot spot of industry is currently had become to the research of safe quantum communication.
Quantum Secure Direct Communication is an important research direction of quantum information processing, mainly realizes the secret of both sides The directly exchange or information transmission of information.Depend on shared session key different from traditional quantum communications, quantum safety is directly logical Letter need to only rely on the assistance for inveigling photon and quantum-mechanical fundamental characteristics i.e. and can guarantee the safety of information exchange.2000 Year, Long Guilu et al. proposes first Quantum Secure Direct Communication scheme --- efficient two step Quantum Secure Direct Communication side Case.Henceforth, the research in this field all the more tends to be perfect, and has delivered many outstanding papers.
Furthermore found by summary to the prior art, there is currently technical problem underlying have:
The hardware cost of user requires high: the existing secure direct communication scheme based on quantum techniques usually requires user With full dose subprocessing ability, that is, it is equipped with advanced quantum devices, such as quantum generator, quantum memory, tenth of the twelve Earthly Branches operator.But it passes through Allusion quotation user or the user for only having part quantum treatment ability can not bear the quantum devices of such valuableness, the to a certain degree upper limit The use scope of Quantum Secure Direct Communication agreement is made.
The realization difficulty for eavesdropping detection is big: existing Quantum Secure Direct Communication, it will usually use a variety of quantum superposition states It is detected to assist to complete eavesdropping, if quantum communications carrier is Bell state, insertion X base inveigles photon to assist to detect.It is identical reaching Under the premise of testing goal, the use of a variety of superposition states, which needs to communicate participant, has the function of the measurement of various amounts subbase.Certain In degree, the eavesdropping detection difficulty of increased agreement.
The particle service efficiency of agreement is not high: for the transmission for realizing n secret informations, it usually needs preparation 4n even 8n Primary hides secret information, and needs to prepare the reality of new particle subsidiary communications process again in communication process It is existing.The two column sequences that eavesdropping detection and secret information use are usually mixed in same string sequence, add somewhat to grain The usage quantity of son.
Practice difficulty is larger: being used in mixed way, is randomly ordered of a variety of superposition states, quantum state preparation and transmission are all It is present practice problem to be solved.
Solve the difficulty and meaning of above-mentioned technical problem:
The quantum communications of highly effective and safe are the targets that society is pursued.There are two types of the approach for reducing user's hardware cost: first is that Reach actual requirement by constantly researching and developing new and effective hardware device, but research and development are at high cost, progress is slower;Second is that passing through modification amount Sub- communication protocol itself allows the classical user for not having quantum treatment ability or half quantum user to participate in quantum communications, but needs Agreement itself considers careful detailed.The means of eavesdropping detection are always to utilize quantum physics characteristic compared to for eavesdropping attack It can be realized the shielding to tradition eavesdropping attack, but as the hardware device of attacker upgrades, we are with greater need for from agreement itself It sets out, that is, needs succinct protocol procedures, stronger eavesdropping detection method.The even Particle Delivery rate pole of quantum communications Height, under the same conditions, the efficiency that we still desire to particle become excellent, in order to practical realization.
After solving above-mentioned technical problem, bring meaning are as follows:
The half Quantum Secure Direct Communication scheme based on Bell state that the invention proposes two allows half quantum user to participate in logical Letter.User cost is not only reduced, and due to the simple easy realization of half quantum operation, also reduces the realization difficulty of agreement.
Summary of the invention
In view of the problems of the existing technology, half Quantum Secure Direct Communication based on Bell state that the present invention provides two Scheme.
The substantially realization process of two agreements is as follows in the present invention:
By executing protocol procedures, half quantum secret information recipient only needs two column sent to quantum information sender Sequence, successively with classical measurement base | 0 >, | 1 > } measurement, then two kinds of situations that may be collapsed by comparing initial Bell state, both It can get n secret informations or 2n secret informations.
And quantum information sender has full dose subprocessing ability and responsibility system for Bell state sequence and carries out Bell Base measurement;And half quantum secret information recipient can only proceed as follows:
Measure MEASURE operation: using classical measurement base | 0 >, | 1 > } measurement particle, and retain measurement result;
Reflect REFLECT operation: without any processing directly to send back to sender to the particle received.
The particular content of agreement one is as follows:
Step 1: quantum information sender from | φ±>,|ψ±> in randomly select preparation N=4n (1+ δ) a Bell state have Then each Bell state is split into a particle H sequence and two particle T-sequences by sequence sequence;It is attacked to resist two kinds of Trojan Horses It hits, before T-sequence reaches half quantum secret information recipient, half quantum secret information recipient must be equipped with a wavelength filter Wave device and number of photons separator PNS;Quantum information sender will retain H sequence and T-sequence be sent to half quantum secret information Recipient;
Step 2: half quantum secret information recipient randomly selects the particle in the sequence after receiving T-sequence MEASURE or REFLECT operation;When selection be MEASURE operation when, half quantum secret information recipient is surveyed using classical Amount base | 0 >, | 1 > } it measures particle and retains measurement result, finally form MRBSequence;When selection be REFLECT operation when, The particle is directly reflected to quantum information sender by half quantum secret information recipient, and without any processing;When N value is enough When big, the population for returning to quantum information sender will tend to 2n;
Step 3: the temporary quantum bit returned of quantum information sender, and believed by classical channel to half quantum secret It ceases recipient and replys confirmation;Then, half quantum secret information recipient announces the corresponding position for returning to particle in T-sequence;It is right In each particle, quantum information sender is by the particle of corresponding position does the joint Bell measurement in hand and in H sequence;For example, When initial Bell state isWhen, if measurement result is not identical as initial Bell state, quantum information hair Fang Ze is sent to think that the particle returned is tampered;After completing all the joint Bell measurements for returning to particle, sender is calculated Error rate.When error rate is lower than scheduled threshold value, sender then thinks that there is no listener-ins in quantum channel, and abandons this 2n Bell state enters the 4th step;Otherwise, sender will be considered in channel that there are listener-in, termination protocols;
Step 4: quantum information sender with classical measurement base | 0 >, | 1 > } measurement hand in be left H sequence, measured As a result MRA;Then, sender randomly selects n as coded sequence MReWith n detection sequence MRc;Encryption rule is as follows: when Need to transmit classical bit information be 0 when, sender prepares identical particle again, does not make any changes;When needing to transmit Classical information be 1 when, sender prepares opposite quantum bit again;Last sender is by new coded sequence MRe' and detection Sequence MRcReset and generates MRA', its correct sequence is recorded, and sequence is sent to information receiver;
Step 5: half quantum secret information recipient receives MRA' after, it is returned by classical channel vector sub-information sender Multiple confirmation, and using classical measurement base | 0 >, | 1 > } measure the sequence;It receives half quantum secret information recipient and determines information Quantum information sender, it will announce MRe' and MRcInitial order and corresponding position initial Bell state.And it carries out as follows Operation:
(1) eavesdropping detection.The initial Bell that half quantum secret information recipient issues by comparing quantum information sender The state and MR of statec、MRBMeasurement result, calculate error rate, when initial Bell state is | φ±>(|ψ±>) and measurement result be not When 00 or 11 (01 or 10), half quantum secret information recipient will be considered in channel that there are listener-ins;When n detection particles of completion Information comparison, half quantum secret information recipient will obtain error rate values to judge in quantum channel with the presence or absence of eavesdropping Person;
(2) secret information is obtained.When half quantum secret information recipient thinks that listener-in is not present in channel, again Compare the initial Bell state and MR of quantum information sender publicatione'、MRBMeasurement result, secret information can be obtained.
The particular content of agreement two is as follows:
Step 1: quantum information sender from | φ±>,|ψ±> in randomly select preparation N=4n (1+ δ) a Bell state have Then each Bell state is split into a particle H sequence and two particle T-sequences by sequence sequence;It is attacked to resist two kinds of Trojan Horses It hits, before T-sequence reaches half quantum secret information recipient, half quantum secret information recipient must be equipped with a wavelength filter Wave device and number of photons separator PNS;Quantum information sender will retain H sequence and T-sequence be sent to half quantum secret information Recipient;
Step 2: half quantum secret information recipient randomly selects the particle in the sequence after receiving T-sequence MEASURE or REFLECT operation;When selection be MEASURE operation when, half quantum secret information recipient is surveyed using classical Amount base | 0 >, | 1 > } it measures particle and retains measurement result, finally form MRBSequence;When selection be REFLECT operation when, The particle is directly reflected to sender by half quantum secret information recipient, and without any processing;When N value is sufficiently large, return It will tend to 2n back to the population of quantum information sender;
Step 3: the temporary quantum bit returned of quantum information sender, and believed by classical channel to half quantum secret It ceases recipient and replys confirmation;Then, half quantum secret information recipient announces the corresponding position for returning to particle in T-sequence;It is right In each particle, quantum information sender is by the particle of corresponding position does the joint Bell measurement in hand and in H sequence;For example, When initial Bell state isWhen, if measurement result is not identical as initial Bell state, quantum information hair Fang Ze is sent to think that the particle returned is tampered;After completing all the joint Bell measurements for returning to particle, sender is calculated Error rate.When error rate is lower than scheduled threshold value, sender then thinks that there is no listener-ins in quantum channel, and abandons this 2n Bell state enters the 4th step;Otherwise, sender will be considered in channel that there are listener-in, termination protocols;
Step 4: quantum information sender with classical measurement base | 0 >, | 1 > } the remaining H sequence of measurement, obtain measurement knot Fruit MRA;Then sender randomly selects n particles as ciphering sequence MReWith n particles as detection sequence MRc;It is measured at 1 The new encryption rule that 2 bit secret informations are encoded on sub- bit is as follows: 1) when secret classical information is 00 or 11, quantum information is sent out The side of sending will prepare again the particle of same state and without any processing;When secret classical information is 01 or 10, quantum letter Breath sender will prepare the particle of inverse state again;2) when classical information is 11 or 10, quantum information sender will be with Machine from | 0 >, | 1 > } choose a trick particle be inserted into behind this particle;After encrypting all secret informations, quantum letter Breath sender only needs newly-generated MRe', detection sequence MRcHalf quantum information recipient is all issued with trick photon, no It needs to resequence;
Step 5: half quantum secret information receives after receiving the particle that all quantum information senders send over Person will promoting menstruation allusion quotation channel vector sub-information sender reply confirmation.Then, quantum information sender, which announces, inveigles inserting for photon Enter position, MRe' the corresponding initial Bell state of initial order and corresponding position particle state.
(1) eavesdropping detection.Half quantum information recipient is by MRc、MRBMeasurement result and quantum information sender publication Initial Bell state is compared, and detects channel safety;When initial Bell state is | φ+>(|ψ+>), and measurement result be not 00 or When 11 (01 or 10), half quantum secret information recipient will be considered in channel that there are listener-ins;When the letter for completing n detection particles Breath compares, and information receiver will obtain error rate values, to judge that there are listener-ins in quantum channel;When error rate is lower than threshold value When, information receiver will carry out next step operation, and when being higher than threshold value, information receiver is by termination protocol;
(2) secret information is obtained.Half quantum secret information recipient can by MRe'、MReMeasurement result and initial Bell state is compared, and obtains secret information.When this particle has the trick photon of insertion, information receiver, which removes, inveigles light Son simultaneously compares MRe'、MReAfter measurement result, it both can determine whether that the secret information of transmission is 11 or 10 certainly.
Realize that described two half quantum safety based on Bell state are directly logical another object of the present invention is to provide a kind of The computer program of letter scheme.
Realize that described two half quantum safety based on Bell state are directly logical another object of the present invention is to provide a kind of The information data processing terminal of letter scheme.
Another object of the present invention is to provide a kind of computer readable storage mediums, including instruction, when it is in computer When upper operation, so that computer executes two half Quantum Secure Direct Communication schemes based on Bell state.
Realize that described two half quantum safety based on Bell state are directly logical another object of the present invention is to provide a kind of The network communication platform of letter scheme.
In conclusion advantages of the present invention and good effect are as follows:
The half Quantum Secure Direct Communication scheme based on Bell state that the invention proposes two allows half quantum user to participate in logical Letter.User cost is not only reduced, and due to the simple easy realization of half quantum operation, also reduces the realization difficulty of agreement. Two column sequences are generated by splitting Bell state, preferably complete eavesdropping detection and secret information transfer function.
Two kinds of agreements have all only used that Bell state does quantum information carrier and Alice need to only prepare 4n initial Bell states, And eavesdropping detection is participated in without additional trick photon.It is straight safely to have pushed half quantum for the complexity for reducing agreement in this way Connect the realization of communication protocol.In secret information transmittance process, information receiver is allowed only to have the function of basic quantum, measured And reflection, so that it may realize the transmission of eavesdropping detection and secret information.The hardware cost of terminal user is reduced, so that classical use Family can participate in quantum communications.Meanwhile eavesdropping detection in secure communication process and secret information transmitting be it is distinct, Only sender and recipients, which determine, is not present listener-in in channel, just formally carry out the transmission of secret information.Different from passing It unites half quantum or Quantum Secure Direct Communication, the transmitting of secret information only once and is deposited in single-particle, and listener-in is not The state for knowing the Bell state of initial Bell state and Alice initial preparation, can not obtain any secret information, utilize quantum object Reason basic principle has resisted eavesdropping attack.
In addition, using identical method for analyzing efficiency and detailed analysis protocol procedures, tabulation than it is right it is previous other The particle efficiency (table 3) of two kinds of related protocols of author.Comparison result shows that two safety based on Bell state of this patent are logical Believe that the particle service efficiency of agreement is more preferable, the efficiency (14.3%~15.4%) of second agreement is especially prominent.
Table 3
Agreement C (position) qc(position) D (position) qt=qc+ d (position) bt(position) Percent efficiency (%)
CDSSQC1 n 4n 17n 21n 2n η=4.35
CDSSQC2 n 3n 11n 14n 2n η=6.25
SQSDC1 n 2n 11n 13n 0 η=7.69
SQSDC2 2n 2n 11nto12n 13nto14n 0 14.3≤η≤15.4
Detailed description of the invention
Fig. 1 is the two provided in an embodiment of the present invention half Quantum Secure Direct Communication program flow charts based on Bell state.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to embodiments, to the present invention It is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to Limit the present invention.
The invention will be further described combined with specific embodiments below.
Fig. 1, the two provided in an embodiment of the present invention half Quantum Secure Direct Communication schemes based on Bell state, comprising:
1, the instance analysis in relation to agreement one:
If the initial Bell state of Alice publication is | φ+>、|φ+>、|ψ+>、|ψ->, MRBAnd MRe' measurement result point Other position 1100 and 0101, then obtained secret information is 1010 by half quantum secret information recipient Bob.
Process is as follows:
I, the Bell state of preparation is split into H sequence and T particle sequence by Alice, and T particle sequence is sent to Bob.
II, Bob randomly selects MEASURE and REFLCT operation, the MR measured in hand after receivingBInformation is 1100 (corresponding 4 with secret information).
III, Alice send the sequence MR for having secret informatione' Bob is given, it is 0101 that Bob, which obtains result by measurement,.
IV, Alice announces initial Bell state corresponding to this several secret information positions to Bob | φ+>、|φ+>、|ψ+>、| ψ->。
Bob summarizes that obtain information as follows: Bell state is collapsed situation: 11,11,10,10.MRe' and MRBThe result measured are as follows: 01,11,00,10.It is 1010 that then Bob, which can be obtained secret information,.(table 1)
Table 1
Initial Bell state MRB MRe' Secret information
±> 0 0 0
0 1 1
1 1 0
1 0 1
±> 0 1 0
0 0 1
1 0 0
1 1 1
2, the detailed process of agreement two.
If the Bell state of Alice initial preparation is | φ+>、|φ+>、|ψ+>、|ψ->、|φ+>、|φ+>、|ψ+>、|ψ-> simultaneously And MReAnd MRe' measurement result be 11000101 and 01 (0) 1 (1) 01 (1) 11 (0) 0.Alice will announce her and be inserted into trick The place of photon, the 2nd, the 3rd and the 7th.So Bob will obtain secret information position: 0111110110001100.
Process is as follows:
I, the Bell state of preparation is split into H sequence and T particle sequence by Alice, and T particle sequence is sent to Bob.
II, Bob randomly selects MEASURE and REFLCT operation, the MR measured after receivingBInformation is 11000101 (corresponding 8 with secret information).
III, Alice send the sequence MR for having secret informatione' Bob is given, it is 01 (0) 1 (1) 01 that Bob measurement, which obtains result, (1) 11 (0) 0 (wherein parenthesis part is the trick photon of insertion, but Bob can not be distinguished, herein for analysis thus add).
IV, Alice announces initial Bell state corresponding to this several secret information positions to Bob | φ+>、|φ+>、|ψ+>、| ψ->、|φ+>、|φ+>、|ψ+>、|ψ->, Bob summarizes that obtain information as follows: Bell state is collapsed situation position are as follows: 11,11,10,10, 00,11,10,01.Than the result measured in opponent: 01,1 (0) 1,1 (1) 0,00,1 (1) 0,11,1 (0) 0,01.So Bob is Can get secret information is 0111110110001100.
Table 2
Initial Bell state MRB MRe' Secret information
+> 1 0 01
+> 1 1(0) 11
+> 0 1(1) 11
-> 0 0 01
+> 0 1(1) 10
+> 1 1 00
+> 0 1(0) 11
-> 1 0 00
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real It is existing.When using entirely or partly realizing in the form of a computer program product, the computer program product include one or Multiple computer instructions.When loading on computers or executing the computer program instructions, entirely or partly generate according to Process described in the embodiment of the present invention or function.The computer can be general purpose computer, special purpose computer, computer network Network or other programmable devices.The computer instruction may be stored in a computer readable storage medium, or from one Computer readable storage medium is transmitted to another computer readable storage medium, for example, the computer instruction can be from one A web-site, computer, server or data center pass through wired (such as coaxial cable, optical fiber, Digital Subscriber Line (DSL) Or wireless (such as infrared, wireless, microwave etc.) mode is carried out to another web-site, computer, server or data center Transmission).The computer-readable storage medium can be any usable medium or include one that computer can access The data storage devices such as a or multiple usable mediums integrated server, data center.The usable medium can be magnetic Jie Matter, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disk Solid State Disk (SSD)) etc..
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.

Claims (10)

1. a kind of two half Quantum Secure Direct Communication schemes based on Bell state, which is characterized in that described two to be based on Bell Half Quantum Secure Direct Communication scheme of state includes:
It executes in protocol procedures, half quantum secret information recipient sends two column sequences to quantum information sender, successively with warp Allusion quotation measurement base | 0 >, | 1 > } measurement, then the two kinds of situations that may be collapsed by comparing initial Bell state, obtain n secret informations Or 2n secret informations.
2. the two as described in claim 1 half Quantum Secure Direct Communication schemes based on Bell state, which is characterized in that quantum Information sender has full dose subprocessing ability and responsibility system for Bell state sequence and carries out the measurement of Bell base;
Half quantum secret information recipient proceeds as follows:
Measure MEASURE operation: using classical measurement base | 0 >, | 1 > } measurement particle, and retain measurement result;
Reflect REFLECT operation: without any processing directly to send back to sender to the particle received.
3. the two as described in claim 1 half Quantum Secure Direct Communication schemes based on Bell state, which is characterized in that two Agreement one in Quantum Secure Direct Communication agreement based on Bell state includes:
Step 1: quantum information sender from | φ±>,|ψ±> in randomly select preparation the orderly sequence of N=4n (1+ δ) Bell state Column, then split into a particle H sequence and two particle T-sequences for each Bell state;To resist two kinds of Trojan horse attacks, Before T-sequence reaches half quantum secret information recipient, half quantum secret information recipient is equipped with a wavelength filter and light Subnumber separator PNS;Quantum information sender will retain H sequence and T-sequence be sent to half quantum secret information recipient;
Step 2: half quantum secret information recipient randomly selects the particle in the sequence after receiving T-sequence MEASURE or REFLECT operation;When selection be MEASURE operation when, half quantum secret information recipient is surveyed using classical Amount base | 0 >, | 1 > } it measures particle and retains measurement result, finally form MRBSequence;When selection be REFLECT operation when, The particle is directly reflected to quantum information sender by half quantum secret information recipient, and without any processing;When N value is enough When big, the population for returning to quantum information sender will tend to 2n;
Step 3: the temporary quantum bit returned of quantum information sender, and connect by classical channel to half quantum secret information Receipts person replys confirmation;Then, half quantum secret information recipient announces the corresponding position for returning to particle in T-sequence;For every One particle, quantum information sender is by the particle of corresponding position does the joint Bell measurement in hand and in H sequence;For example, originally Beginning Bell state isWhen, if measurement result is not identical as initial Bell state, quantum information sender Then think that the particle returned is tampered;After completing all the joint Bell measurements for returning to particle, sender calculates error rate. When error rate is lower than scheduled threshold value, sender then thinks in quantum channel there is no listener-in, and abandon this 2n Bell into Enter the 4th step;Otherwise, sender will be considered in channel that there are listener-in, termination protocols;
Step 4: quantum information sender with classical measurement base | 0 >, | 1 > } measurement hand in be left H sequence, obtain measurement result MRA;Then, sender randomly selects n as coded sequence MReWith n detection sequence MRc;Encryption rule is as follows: working as needs When the classical bit information of transmission is 0, sender prepares identical particle again, does not make any changes;When the warp that needs transmit When allusion quotation information is 1, sender prepares opposite quantum bit again;Last sender is by new coded sequence MRe' and detection sequence MRcReset and generates MRA', its correct sequence is recorded, and sequence is sent to information receiver;
Step 5: half quantum secret information recipient receives MRA' after, it is replied by classical channel vector sub-information sender true Recognize, and using classical measurement base | 0 >, | 1 > } measure the sequence;Receive the amount that half quantum secret information recipient determines information Sub-information sender, it will announce MRe' and MRcInitial order and corresponding position initial Bell state.
4. the two as claimed in claim 3 half Quantum Secure Direct Communication schemes based on Bell state, which is characterized in that the 5th Step is further divided into:
(1) eavesdropping detection: the initial Bell state that half quantum secret information recipient issues by comparing quantum information sender State and MRc、MRBMeasurement result, calculate error rate, when initial Bell state is | φ±>(|ψ±>) and measurement result be not 00 or 11,01 or 10 when, half quantum secret information recipient will be considered in channel that there are listener-ins;When the letter for completing n detection particles Breath compares, and half quantum secret information recipient will obtain error rate values to judge in quantum channel with the presence or absence of listener-in;
(2) secret information is obtained.When half quantum secret information recipient thinks to compare again in channel there is no when listener-in The initial Bell state and MR of quantum information sender publicatione'、MRBMeasurement result, obtain secret information.
5. the two as described in claim 1 half Quantum Secure Direct Communication schemes based on Bell state, which is characterized in that two Agreement two in Quantum Secure Direct Communication agreement based on Bell state includes:
Step 1: quantum information sender from | φ±>,|ψ±> in randomly select preparation the orderly sequence of N=4n (1+ δ) Bell state Column, then split into a particle H sequence and two particle T-sequences for each Bell state;To resist two kinds of Trojan horse attacks, Before T-sequence reaches half quantum secret information recipient, half quantum secret information recipient must be equipped with a wavelength filter With number of photons separator PNS;Quantum information sender, which will retain H sequence and T-sequence is sent to half quantum secret information, to be received Person;
Step 2: half quantum secret information recipient randomly selects the particle in the sequence after receiving T-sequence MEASURE or REFLECT operation;When selection be MEASURE operation when, half quantum secret information recipient is surveyed using classical Amount base | 0 >, | 1 > } it measures particle and retains measurement result, finally form MRBSequence;When selection be REFLECT operation when, The particle is directly reflected to sender by half quantum secret information recipient, and without any processing;When N value is sufficiently large, return It will tend to 2n back to the population of quantum information sender;
Step 3: the temporary quantum bit returned of quantum information sender, and connect by classical channel to half quantum secret information Receipts person replys confirmation;Then, half quantum secret information recipient announces the corresponding position for returning to particle in T-sequence;For every One particle, quantum information sender is by the particle of corresponding position does the joint Bell measurement in hand and in H sequence;For example, originally Beginning Bell state isWhen, if measurement result is not identical as initial Bell state, quantum information sender Then think that the particle returned is tampered;After completing all the joint Bell measurements for returning to particle, sender calculates error rate. When error rate is lower than scheduled threshold value, sender then thinks in quantum channel there is no listener-in, and abandon this 2n Bell into Enter the 4th step;Otherwise, sender will be considered in channel that there are listener-in, termination protocols;
Step 4: quantum information sender with classical measurement base | 0 >, | 1 > } the remaining H sequence of measurement, obtain measurement result MRA; Then sender randomly selects n particles as ciphering sequence MReWith n particles as detection sequence MRc;In 1 quantum bit The new encryption rule of 2 bit secret informations of upper coding is as follows:
1) when secret classical information is 00 or 11, quantum information sender is any without doing by the particle for preparing same state again Processing;When secret classical information is 01 or 10, quantum information sender will prepare the particle of inverse state again;
2) when classical information be 11 or 10 when, quantum information sender will at random from | 0 >, | 1 > } choose a trick particle It is inserted into behind this particle;After encrypting all secret informations, quantum information sender only needs newly-generated MRe'、 Detection sequence MRcHalf quantum information recipient is all issued with trick photon, does not need to resequence;
Step 5: half quantum secret information recipient will after receiving the particle that all quantum information senders send over It can promoting menstruation allusion quotation channel vector sub-information sender reply confirmation;Then, quantum information sender announces the insertion position for inveigling photon, MRe' the corresponding initial Bell state of initial order and corresponding position particle state.
6. the two as claimed in claim 5 half Quantum Secure Direct Communication schemes based on Bell state, which is characterized in that the 5th Step is further divided into:
(1) eavesdropping detection: half quantum information recipient is by MRc、MRBMeasurement result issued with quantum information sender it is initial Bell state is compared, and detects channel safety;When initial Bell state is | φ+>(|ψ+>), and measurement result be not 00 or 11, When 01 or 10, half quantum secret information recipient will be considered in channel that there are listener-ins;When the information ratio for completing n detection particles Right, information receiver will obtain error rate values, to judge that there are listener-ins in quantum channel;When error rate is lower than threshold value, Information receiver will carry out next step operation, and when being higher than threshold value, information receiver is by termination protocol;
(2) secret information is obtained.Half quantum secret information recipient can by MRe'、MReMeasurement result and initial Bell state It is compared, obtains secret information.When this particle has the trick photon of insertion, information receiver, which removes, to be inveigled photon and compares Compared with MRe' and MReAfter measurement result, it both can determine whether that the secret information of transmission is 11 or 10 certainly.
7. a kind of realize the described two half Quantum Secure Direct Communication schemes based on Bell state of claim 1~6 any one Computer program.
8. a kind of realize the described two half Quantum Secure Direct Communication schemes based on Bell state of claim 1~6 any one Information data processing terminal.
9. a kind of computer readable storage medium, including instruction, when run on a computer, so that computer is executed as weighed Benefit requires two half Quantum Secure Direct Communication schemes based on Bell state described in 1-6 any one.
10. a kind of network communication for realizing the described two half Quantum Secure Direct Communication schemes based on Bell state of claim is flat Platform.
CN201811464680.7A 2018-12-03 2018-12-03 Two Bell state-based semi-quantum secure direct communication methods Active CN109274495B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811464680.7A CN109274495B (en) 2018-12-03 2018-12-03 Two Bell state-based semi-quantum secure direct communication methods

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811464680.7A CN109274495B (en) 2018-12-03 2018-12-03 Two Bell state-based semi-quantum secure direct communication methods

Publications (2)

Publication Number Publication Date
CN109274495A true CN109274495A (en) 2019-01-25
CN109274495B CN109274495B (en) 2020-04-28

Family

ID=65187283

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811464680.7A Active CN109274495B (en) 2018-12-03 2018-12-03 Two Bell state-based semi-quantum secure direct communication methods

Country Status (1)

Country Link
CN (1) CN109274495B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109995528A (en) * 2019-04-25 2019-07-09 成都信息工程大学 Bidirectional identity authentication and half quantum safety direct communication method for resisting channel noise
CN110460389A (en) * 2019-09-02 2019-11-15 福建师范大学 A kind of multi-party controlled bidirectional quantum safety direct communication method and system based on cluster state
CN112332988A (en) * 2021-01-06 2021-02-05 成都信息工程大学 Agile quantum privacy query method based on anti-rotation noise
CN114448692A (en) * 2022-01-23 2022-05-06 青岛理工大学 Quantum privacy query method based on Bell state identity authentication

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297226A (en) * 2013-06-03 2013-09-11 浙江工商大学 Controlled bi-directional quantum secure direct communication protocol free of information leakage
US20130308956A1 (en) * 2004-08-04 2013-11-21 U.S. Army Research Laboratory ATT: RDRL-LOC-I Quantum based information transfer system and method
US20140099104A1 (en) * 2012-10-04 2014-04-10 Applied Communication Sciences Method to mitigate propagation loss in waveguide transmission of quantum states
CN107786280A (en) * 2017-09-30 2018-03-09 南京邮电大学 It is a kind of based on the super tripartite's quantum safety direct communication method for tangling Bel's state
CN108173654A (en) * 2018-03-13 2018-06-15 成都信息工程大学 A kind of two side's cryptographic key negotiation methods and system based on half quantum techniques
CN108881215A (en) * 2018-06-13 2018-11-23 成都信息工程大学 The half Quantum Secure Direct Communication agreement based on Bell state

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130308956A1 (en) * 2004-08-04 2013-11-21 U.S. Army Research Laboratory ATT: RDRL-LOC-I Quantum based information transfer system and method
US20140099104A1 (en) * 2012-10-04 2014-04-10 Applied Communication Sciences Method to mitigate propagation loss in waveguide transmission of quantum states
CN103297226A (en) * 2013-06-03 2013-09-11 浙江工商大学 Controlled bi-directional quantum secure direct communication protocol free of information leakage
CN107786280A (en) * 2017-09-30 2018-03-09 南京邮电大学 It is a kind of based on the super tripartite's quantum safety direct communication method for tangling Bel's state
CN108173654A (en) * 2018-03-13 2018-06-15 成都信息工程大学 A kind of two side's cryptographic key negotiation methods and system based on half quantum techniques
CN108881215A (en) * 2018-06-13 2018-11-23 成都信息工程大学 The half Quantum Secure Direct Communication agreement based on Bell state

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CHEN XIE等: "Semi-quantum Secure Direct Communication Scheme Based on Bell States", 《INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS》 *
曹正文等: "基于Bell态粒子和单光子混合的量子安全直接通信方案", 《物理学报》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109995528A (en) * 2019-04-25 2019-07-09 成都信息工程大学 Bidirectional identity authentication and half quantum safety direct communication method for resisting channel noise
CN109995528B (en) * 2019-04-25 2021-02-02 成都信息工程大学 Semi-quantum secure direct communication method and storage medium
CN110460389A (en) * 2019-09-02 2019-11-15 福建师范大学 A kind of multi-party controlled bidirectional quantum safety direct communication method and system based on cluster state
CN110460389B (en) * 2019-09-02 2020-10-30 福建师范大学 Cluster state-based multiparty controlled bidirectional quantum secure direct communication method and system
CN112332988A (en) * 2021-01-06 2021-02-05 成都信息工程大学 Agile quantum privacy query method based on anti-rotation noise
CN114448692A (en) * 2022-01-23 2022-05-06 青岛理工大学 Quantum privacy query method based on Bell state identity authentication

Also Published As

Publication number Publication date
CN109274495B (en) 2020-04-28

Similar Documents

Publication Publication Date Title
CN109274495A (en) Two half Quantum Secure Direct Communication schemes based on Bell state
CN105553648B (en) Quantum key distribution, privacy amplification and data transmission method, apparatus and system
CN108092771B (en) Tamper-proof controlled quantum secure direct communication method and system
Chong et al. Improvement on “quantum key agreement protocol with maximally entangled states”
CN108809644B (en) Disorder high-capacity multiparty quantum key negotiation method based on high-energy level bell state
CN108881215B (en) Bell state-based semi-quantum secure direct communication method
CN108768641A (en) A kind of quantum privacy comparative approach and system based on GHZ states
CN107493168B (en) Quanta identity authentication method and its application method during quantum key distribution
CN110061787B (en) Bell state-based semi-quantum secure direct communication method and system
CN109714158B (en) Bell state-based semi-quantum privacy comparison method and system
CN109995528B (en) Semi-quantum secure direct communication method and storage medium
Ye et al. Multi-user quantum private comparison with scattered preparation and one-way convergent transmission of quantum states
CN110929294A (en) One-way transmission quantum database privacy query method
CN110071814A (en) A kind of quantum Proxy Signature method and system based on Bell state entanglement transfer
CN108092770A (en) Quanta identity authentication method, computer, computer program, readable storage medium storing program for executing
CN106685659B (en) Quantum secret sharing method capable of resisting interception of retransmission, man-in-the-middle and entanglement attacks
CN110474770A (en) A kind of multi-party half quantum secret sharing method and system based on single photon
CN109257108A (en) A kind of multiplicate controlling quantum communications protocol implementing method and system
CN111865588B (en) Efficient quantum secret information interchange method, system and storage medium
CN110635907B (en) Controlled quantum conversation method with identity authentication function based on GHZ-like state
Tomamichel et al. One-sided device-independent QKD and position-based cryptography from monogamy games
CN108737116B (en) Voting protocol method based on d-dimensional three-quantum entangled state
CN115795518A (en) Block chain-based federal learning privacy protection method
KR20120071883A (en) Quantum authentication method and apparatus for quantum secret sharing protocol
He et al. Oblivious transfer using quantum entanglement

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant