CN114050868A - Quantum safety direct communication method based on transmitting or non-transmitting method - Google Patents

Quantum safety direct communication method based on transmitting or non-transmitting method Download PDF

Info

Publication number
CN114050868A
CN114050868A CN202111323676.0A CN202111323676A CN114050868A CN 114050868 A CN114050868 A CN 114050868A CN 202111323676 A CN202111323676 A CN 202111323676A CN 114050868 A CN114050868 A CN 114050868A
Authority
CN
China
Prior art keywords
alice
pulse
window
bob
phase
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111323676.0A
Other languages
Chinese (zh)
Other versions
CN114050868B (en
Inventor
王川
刘璐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Normal University
Original Assignee
Beijing Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Normal University filed Critical Beijing Normal University
Priority to CN202111323676.0A priority Critical patent/CN114050868B/en
Publication of CN114050868A publication Critical patent/CN114050868A/en
Application granted granted Critical
Publication of CN114050868B publication Critical patent/CN114050868B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/70Photonic quantum communication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Physics & Mathematics (AREA)
  • Optics & Photonics (AREA)
  • Electromagnetism (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Optical Communication System (AREA)
  • Optical Modulation, Optical Deflection, Nonlinear Optics, Optical Demodulation, Optical Logic Elements (AREA)

Abstract

The invention relates to a quantum secure direct communication method based on a transmitting or non-transmitting method, belonging to the technical field of quantum communication. The method comprises the following steps: the legal users A and B respectively and independently decide whether the current time window is a signal window or a decoy window at random and whether to send a pulse; relaying the received decoy pulse and signal pulse in full transmission, compensating the pulse phase, and publishing the measurement result; a legal user publishes the positions of a signal window and a trap window of the legal user; a legal user calculates the error rate by using x bits and randomly selecting part z bits; a prepares a group of polarized photon sequences and sends the sequences to a relay for measurement, and B infers the coding information of A according to the published measurement result. At this point, the legitimate user completes the secure direct transmission of the secret information. The invention avoids the use of single photon interference technology and the defects brought by the single photon interference technology, improves the code rate, breaks through the limitation of channel loss on the safe communication distance, does not need to prepare entangled photon pairs and Bell state measurement, and has stronger realizability.

Description

Quantum safety direct communication method based on transmitting or non-transmitting method
Technical Field
The invention belongs to the technical field of quantum communication, relates to a method for realizing a quantum secure direct communication protocol capable of breaking through the limitation of channel loss on a code rate, and particularly relates to a quantum secure direct communication method based on a transmitting or non-transmitting method.
Background
Channel loss is a major impediment to practical application of quantum communication technology. Quantum communication protocols that utilize single photon interference techniques can break through this limitation. The single photon interference technology is susceptible to photon phase deviation errors, so that the channel capacity and the transmission distance are limited. By using the 'transmitting or non-transmitting' method, the single photon interference technology can be avoided, and the limitation of channel loss on the code rate can be broken through.
The quantum secure direct communication is a quantum communication method for directly transmitting secret information by constructing a secure quantum channel by using a data block transmission method without encrypting the secret information by using a secret key. Because no keys are used, and quantum data block transmission is used, three potential security holes in the communication architecture can be eliminated: the method comprises the following steps of key leakage in a distribution stage, key loss in storage and conversion of a user site, and ciphertext interception in a transmission process. However, the problems of low channel capacity and short safe transmission distance exist in the current quantum secure direct communication technical scheme.
Disclosure of Invention
The invention aims to overcome the defects of low channel capacity and short safe transmission distance in the conventional quantum safe direct communication scheme, and designs a high-capacity and long-distance quantum safe direct communication scheme realized by a transmitting or non-transmitting method.
In order to achieve the above purpose, the invention provides a quantum secure direct communication method based on a transmitting or non-transmitting method, which is specifically realized by the following steps:
step 1: the three communication parties are Alice, Bob and Charlie, the Alice and the Bob are legal users, and the Charlie is a relay.
Alice and Bob independently and randomly decide whether the current time window is a signal window or a decoy window, respectively.
(1) In case of the decoy windows, Alice (Bob) sends Charlie a coherent state pulse with random phase respectively, and the coherent state intensities selected by Alice and Bob are not necessarily the same in each decoy window.
(2) If it is a signal window, Alice (Bob) decides to send a signal pulse with a probability e and decides not to send a signal pulse with a probability 1-e. The intensity of the signal pulses modulated by Alice and Bob is the same.
(3) In the above process, regardless of the window, the decision to transmit or not transmit, the overall phase of Alice and Bob is disclosed, because Alice and Bob transmit a strong phase reference pulse to Charlie when they transmit coherent state pulses.
(4) Alice (bob) records bit 1(0) if it decides to send a pulse in the current time window, and bit 0(1) if alice (bob) decides not to send.
According to the rules of (1) to (4), Alice and Bob prepare pulses under N time windows and send the pulses to Charlie. N is a positive integer.
Step 2: adjusting the coefficient of a beam splitter of Charlie to ensure that the decoy pulse and the signal pulse are completely transmitted; charlie performs phase compensation on the received pulse according to the phase measurement result of the phase reference pulse, then measures and publishes the measurement result. The measurement results are divided into valid events and invalid events. Wherein the valid event is defined as:
(1) on the premise that Alice and Bob both send signal windows, Charlie discloses that only one detector generates a count.
(2) On the premise that Alice and Bob both send decoy windows and the coherent state intensities are the same, Charlie discloses that only one detector generates a count. In this case, the phase of coherent state is required to be 1- | cos (δ)AB) I ≦ λ |, λ is a constant whose magnitude is used to limit the phase δ of Alice and BobA,δBSo that the two are as close as possible to generate single-photon interference.
And step 3: respectively publishing the positions of a signal window and a decoy window by Alice and Bob, and disclosing the intensity and the random phase of coherent state pulses in the decoy window; the valid event is re-represented as follows:
(1) a time window where both sides are signal windows is defined as a z-window, so that the state under the window is the state under the z-base. The bits recorded under the valid event corresponding to the z-window are denoted as z-bits. The coherent state of phase randomness is a linear superposition of the photon number states. Under the z-window, if Alice and Bob have and only one party decides to send coherent states and the pulse contains only a single photon, such z-window is defined as z1Window, corresponding to z1State is | z1>=|01>Or | z1>=|10>。
(2) Both sides are decoy windows, the coherent state intensity is the same andand the time window in which the random phase satisfies the condition in step 2 is defined as an x window. The corresponding state is called the state under x base and the corresponding bit is called x bit. Sending a dual-mode single photon state by both sides:
Figure BDA0003343407620000021
is defined as x1And (4) a window. Where j is the imaginary unit, δA、γARepresenting the random phase shift and the overall phase, δ, of coherent pulses transmitted by AliceB、γBRepresenting the random phase shift and the overall phase of the coherent state pulse transmitted by Bob, respectively.
And 4, step 4: both Alice and Bob use the x bits and the randomly chosen fraction of the z bits to calculate the error rate. If the error rate is above the threshold, the protocol is terminated. Otherwise, the following steps are continued.
And 5: setting that when the bit recorded in Alice is 1, the horizontally polarized photon | H > represents the coded bit 0, the vertically polarized photon | V > represents the coded bit 1, and when the bit recorded in Alice is 0, | H > represents the coded bit 1, and | V > represents the coded bit 0. And according to the bits recorded in the hand and the information to be coded, Alice prepares a pair of polarized photon sequences and sends the sequences to Charlie for measurement. And Bob can deduce the coded information of Alice according to the published measurement result and the bit information recorded in the hands of Bob. Since the bit information recorded in Alice and Bob's hands is not known, no coded information is revealed even if an eavesdropper steals all polarized photons for measurement.
To this end, Alice and Bob complete the secure direct transmission of secret information.
Compared with the prior art, the method has the advantages and positive effects that:
(1) under the z window, Alice and Bob record corresponding bits according to the selection made by the Alice and the Bob, so that the use of a single-photon interference technology and the defects caused by the single-photon interference technology are avoided, the code rate is improved, and the limitation of channel loss on the safe communication distance can be broken through.
(2) The method of the invention does not need to prepare entangled photon pairs and Bell state measurement, thus having stronger realizability.
Drawings
Fig. 1 is a conceptual diagram of an implementation device of the quantum secure direct communication method based on a transmission or non-transmission method of the invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples.
The invention provides a quantum secure direct communication method based on a sending or not sending method, and an implementation scene is shown in figure 1. The three communication parties are Alice, Bob and Charlie, the Alice and the Bob are legal users, and the Charlie is a relay. Where LS is a laser source. IM is a pulse intensity modulator. PM is a pulse phase modulator. The VOA is a variable optical attenuator. Pol-M is a polar modulator. The RNG is a random number generator. A-S (B-S) is the signal pulse sent by Alice (Bob), A-D (B-D) is the decoy pulse sent by Alice (Bob), and A-R (B-R) is the phase reference pulse sent by Alice (Bob). The OS is an optical switch and the signal pulse and the decoy pulse will be reflected and the phase reference pulse will be transmitted. RP is a device that measures the phase of two phase reference pulses. BS is a beam splitter. V-BS is a variable transmission and reflection beam splitter. The PBS is a polarizing beam splitter. D0~D4Is a photon detector. The steps of the method of the present invention are described below with reference to FIG. 1.
Step 1: and respectively and independently deciding whether the current ith time window is a signal window or a decoy window at random by Alice and Bob.
(1) If the window is a decoy window, according to the number generated by the random number generator, Alice (Bob) modulates the intensity and phase of coherent state pulse generated by the light source to obtain
Figure BDA0003343407620000031
And sending the information to Charlie. The random numbers generated by both parties are not necessarily the same, so the coherent state strengths selected by Alice and Bob are not necessarily the same in each decoy window.
Wherein, mukIndicating the intensity of the decoy pulse, wherein the decoy pulse has a plurality of selectable intensities, and k represents the number of the intensities; deltaAi、δBiRespectively represent Alice andbob's random phase shift of coherent state pulses generated by modulating the light source; gamma rayAi、γBiRepresenting the overall phase possessed by the coherent state pulses generated by Alice and Bob, respectively, by the modulated light source, the upper corner mark j being the imaginary unit.
(2) If it is a signal window, Alice (Bob) decides to send a signal pulse with a probability e and decides not to send with a probability of 1-e. The intensity of the pulse modulated by the two parties is the same, the intensity of the pulse is set as mu', Alice (Bob) modulates the phase of the pulse according to the generated random number to obtain
Figure BDA0003343407620000032
During the transmission of the pulses, the overall phase γ is obtained due to channel noiseAiBi). However, the overall phase γ is determined to be transmitted or not transmitted regardless of the windowAiBi) Are disclosed because Alice and Bob send a strong phase reference pulse when they send coherent pulses. At the optical switch OS, the signal pulse and the decoy pulse are reflected and continue to be transmitted in the channel; while the phase reference pulse is transmitted into the RP measurement phase. The measurement result of the RP is compared with the initial phase of the phase reference light, and the value of the overall phase can be judged.
Alice (Bob) records bit 1(0) if transmission is decided, and bit 0(1) if Alice (Bob) decides not to transmit.
According to this rule, Alice and Bob prepare pulses at N time windows and send them to Charlie. In addition, subscript i will be omitted hereinafter for brevity.
Step 2: the coefficients of V-BS on Charlie are adjusted to make the decoy pulse and the signal pulse transmitted by alice (bob) fully transmissive. Based on the measurement of RP, Charlie performs phase compensation on the received pulses to make them
Figure BDA0003343407620000041
The pulse will then enter the BS for measurement and Charlie publishes the measurement. The measurement results are divided into valid events and invalid events. Wherein the valid eventIs defined as:
(1) on the premise that Alice and Bob both send signal windows, Charlie discloses that only one photon detector generates counts.
(2) On the premise that Alice and Bob both send decoy windows and the coherent state intensities are the same, Charlie discloses that only one detector generates a count. In this case, the phase of coherent state is required to be 1- | cos (δ)AB) I ≦ λ |, λ is a constant whose magnitude is used to limit the phase δ of Alice and BobA,δBSo that the two are as close as possible to generate single-photon interference.
And step 3: both Alice and Bob publish the location of the signal window and the spoof window, respectively. And will trick the coherent pulse intensity, random phase value delta in the windowA,δBAre disclosed together. For simplicity, the valid events are renamed as follows:
(1) a time window where both sides are signal windows is defined as a z-window, so that the state under the window is the state under the z-base. The bits recorded under the valid event corresponding to the z-window are denoted as z-bits. The coherent state of phase randomness is a linear superposition of the photon number states. Under the z-window, if Alice and Bob have and only one party decides to send coherent states and the pulse contains only a single photon, such z-window is defined as z1Window, corresponding to z1State is | z1>=|01>Or | z1>=|10>。
(2) And defining a time window in which both sides are decoy windows, coherent state intensities are the same and random phases meet the conditions in the step 2 as an x window. The corresponding state is called the state under x base and the corresponding bit is called x bit. Sending a dual-mode single photon state by both sides:
Figure BDA0003343407620000042
is defined as x1And (4) a window.
And 4, step 4: both Alice and Bob use the x bits and the randomly chosen fraction of the z bits to calculate the error rate. If the error rate is above the set threshold, the protocol is terminated, otherwise the following steps are continued.
And 5: and adjusting the coefficient of the V-BS to enable the pulse of Alice polarization modulation to be totally reflected. Setting that when the bit recorded in the hand of Alice is 1, the horizontal polarized photon | H > represents the coded bit 0, and the vertical polarized photon | V > represents the coded bit 1; if the bit recorded in Alice is 0, | H > represents the code bit 1, | V > represents the code bit 0. And Alice attenuates the coherent state pulse output by the light source into a weak coherent state pulse by using the VOA. Then, according to the bit recorded in the hand and the information to be coded, Alice performs polarization modulation on the weak coherent state pulse, prepares a pair of polarized photon sequences, and sends the sequences to Charlie for measurement. The horizontally and vertically polarized photons will be transmitted and reflected, respectively, by the PBS, causing different detectors to respond. From the published detector response results, Bob can infer the polarization state of the photons sent by Alice. And then, combining the bit information recorded in the hands of the user, Bob can deduce the coded information of Alice. Since the bit information recorded in Alice and Bob's hands is not known, no coded information is revealed even if an eavesdropper steals all polarized photons for measurement.
To this end, Alice and Bob complete the secure direct transmission of secret information.
In addition to the technical features described in the specification, the technology is known to those skilled in the art. Descriptions of well-known techniques are omitted so as to avoid unnecessary detail and unnecessary limitations of the present invention. The embodiments described in the above embodiments do not represent all embodiments consistent with the present application, and various modifications or variations which may be made by those skilled in the art without inventive efforts based on the technical solution of the present invention are still within the protective scope of the present invention.

Claims (5)

1. A quantum secure direct communication method based on a sending or not sending method is characterized in that three communication parties are Alice, Bob and Charlie, the Alice and the Bob are legal users, and the Charlie is a relay, and the method comprises the following steps:
step 1: respectively and independently randomly determining whether the current time window is a signal window or a decoy window by Alice and Bob;
(1) if the window is deceived, sending a coherent pulse with random phase to Charlie; the intensity of coherent state pulses selected by Alice and Bob is not required to be the same under each decoy window;
(2) if the signal window is the signal window, determining to send the signal pulse according to the probability E, and determining not to send the signal according to the probability 1-E; the intensity of the signal pulses modulated by Alice and Bob is the same;
(3) when Alice and Bob send coherent pulses, sending a phase reference pulse to Charlie;
(4) if the Alice determines to send the pulse in the current time window, recording the pulse as bit 1, and if the Alice determines not to send the pulse, recording the pulse as bit 0; if Bob decides to send in the current time window, it records as bit 0, if decides not to send, it records bit 1;
according to the steps (1) to (4), preparing pulses by Alice and Bob under N time windows, and sending the pulses to Charlie; n is a positive integer;
step 2: adjusting the coefficient of a beam splitter of Charlie to ensure that the decoy pulse and the signal pulse are completely transmitted; according to the phase measurement result of the phase reference pulse, Charlie performs phase compensation on the received pulse, measures the pulse and publishes the measurement result, wherein the measurement result is divided into an effective event and an ineffective event;
wherein the valid event is defined as:
(1) when Alice and Bob send signal windows, Charlie is provided with and only one photon detector for counting;
(2) when Alice and Bob send out decoy windows and the intensities of coherent pulses are the same, Charlie discloses that only one photon detector generates counting; at this time, the random phase of coherent pulses is required to be 1- | cos (delta)AB) Is less than or equal to lambda, and lambda is a set constant and is used for limiting the random phase delta of Alice and BobA,δBThe two are as close as possible, thereby generating single-photon interference;
and step 3: respectively publishing the positions of a signal window and a decoy window by Alice and Bob, and disclosing the intensity and the random phase of coherent state pulses in the decoy window; the valid event is re-represented as follows:
(1) defining a time window in which Alice and Bob are both signal windows as a z window, wherein the state under the z window is a state under a z base, and recording bits under an effective event corresponding to the z window as z bits; under the z window, if Alice and Bob have and only one party decide to send coherent state and the pulse only contains single photon, the z window at this time is defined as z1Window, corresponding to z1State is | z1>=|01>Or | z1>=|10>;
(2) Defining a time window, in which Alice and Bob are decoy windows, coherent state pulse intensities are the same and random phases meet the requirements in the step 2, as an x window, wherein the corresponding state is a state under an x base, and the corresponding bit is marked as an x bit; sending a dual-mode single photon state by both sides:
Figure FDA0003343407610000011
is defined as x1A window; j is the imaginary unit, δA、γARepresenting the random phase shift and the overall phase, δ, of coherent pulses transmitted by AliceB、γBRespectively representing the random phase shift and the overall phase of the coherent state pulse sent by Bob;
and 4, step 4: using x bits and randomly selecting part of z bits by Alice and Bob, calculating an error rate, if the error rate is higher than a set threshold value, terminating the protocol, otherwise, continuing the following steps;
and 5: setting that when the bit recorded in the hand of Alice is 1, a horizontally polarized photon | H > represents a coded bit 0, and a vertically polarized photon | V > represents a coded bit 1, otherwise, if the bit recorded in Alice is 0, | H > represents a coded bit 1, and | V > represents a coded bit 0; according to the bits recorded in the hand and the information to be coded, Alice prepares a pair of polarized photon sequences and sends the polarized photon sequences to Charlie for measurement; adjusting the coefficient of a beam splitter of Charlie to enable Alice polarization modulated pulses to be totally reflected; b, deducing the coded information of Alice according to the published measurement result and the bit information recorded in the hands of the Bob;
to this end, Alice and Bob complete the secure direct transmission of secret information.
2. The method according to claim 1, wherein the step 1 comprises:
(1) if Alice or Bob determines that the current ith time window is a decoy window, sending a coherent state pulse with random phase to Charlie, wherein the coherent state pulse is represented as
Figure FDA0003343407610000021
Or
Figure FDA0003343407610000022
k is a natural number, mukIndicating the strength, delta, of the decoy pulseAi、γAiRespectively representing the random phase shift and the overall phase, delta, of coherent pulses sent by Alice in the ith time windowBi、γBiRespectively representing the random phase shift and the overall phase of coherent state pulses sent by the ith time window Bob;
(2) if Alice or Bob determines that the current ith time window is a signal window, determining to send a signal pulse with a probability E, wherein the signal pulse is represented by
Figure FDA0003343407610000023
Or
Figure FDA0003343407610000024
μ' is the intensity of the signal pulse.
3. The method of claim 1 or 2, wherein in the method, at the optical switch of Charlie, the signal pulse and the decoy pulse are reflected and continue to be transmitted in the channel and enter the beam splitter; at the optical switch of Charlie, the phase reference pulse is transmitted into a device RP that measures the phase; and the RP measures the phase of the phase reference pulse, and compares the measurement result of the RP with the initial phase of the phase reference pulse to acquire the overall phase of the coherent pulse.
4. According to claim 2The method is characterized in that in the step 2, Charlie performs phase compensation on the received pulse according to the measurement result of RP, so that the pulse becomes
Figure FDA0003343407610000025
Or
Figure FDA0003343407610000026
5. The method according to claim 1, wherein in step 5, in the polarized photon sequence sent by Alice, the horizontally polarized photons and the vertically polarized photons are respectively transmitted and reflected by the polarizing beam splitter PBS, so that different photon detectors respond.
CN202111323676.0A 2021-11-08 2021-11-08 Quantum secure direct communication method based on transmitting or non-transmitting method Active CN114050868B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111323676.0A CN114050868B (en) 2021-11-08 2021-11-08 Quantum secure direct communication method based on transmitting or non-transmitting method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111323676.0A CN114050868B (en) 2021-11-08 2021-11-08 Quantum secure direct communication method based on transmitting or non-transmitting method

Publications (2)

Publication Number Publication Date
CN114050868A true CN114050868A (en) 2022-02-15
CN114050868B CN114050868B (en) 2023-01-31

Family

ID=80207935

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111323676.0A Active CN114050868B (en) 2021-11-08 2021-11-08 Quantum secure direct communication method based on transmitting or non-transmitting method

Country Status (1)

Country Link
CN (1) CN114050868B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115276822A (en) * 2022-07-11 2022-11-01 清华大学 Quantum communication method, apparatus, computer device, storage medium and program product

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108199768A (en) * 2017-12-29 2018-06-22 华南师范大学 A kind of unrelated quantum key distribution system of measuring apparatus based on W states and method
CN109039604A (en) * 2018-08-07 2018-12-18 南京邮电大学 A kind of passive type trick state Quantum Digital Signature Research method
CN109586907A (en) * 2018-12-30 2019-04-05 华南师范大学 A kind of coalescing network system and method for quantum communications and the transmission of quantum time-frequency
US20190199523A1 (en) * 2016-05-11 2019-06-27 Institut Mines-Telecom Phase reference sharing schemes for continuous-variable quantum cryptography
CN112448814A (en) * 2020-10-30 2021-03-05 南京南瑞信息通信科技有限公司 Asymmetric double-field quantum key distribution method facing power grid wide area coordination control
CN112929161A (en) * 2021-01-22 2021-06-08 西安电子科技大学 Plug-and-play type reference system-independent double-field quantum key distribution protocol implementation method
CN113225184A (en) * 2021-05-11 2021-08-06 中国人民解放军空军工程大学 Passive decoy state modulation reference system-independent quantum key distribution system and method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190199523A1 (en) * 2016-05-11 2019-06-27 Institut Mines-Telecom Phase reference sharing schemes for continuous-variable quantum cryptography
CN108199768A (en) * 2017-12-29 2018-06-22 华南师范大学 A kind of unrelated quantum key distribution system of measuring apparatus based on W states and method
CN109039604A (en) * 2018-08-07 2018-12-18 南京邮电大学 A kind of passive type trick state Quantum Digital Signature Research method
CN109586907A (en) * 2018-12-30 2019-04-05 华南师范大学 A kind of coalescing network system and method for quantum communications and the transmission of quantum time-frequency
CN112448814A (en) * 2020-10-30 2021-03-05 南京南瑞信息通信科技有限公司 Asymmetric double-field quantum key distribution method facing power grid wide area coordination control
CN112929161A (en) * 2021-01-22 2021-06-08 西安电子科技大学 Plug-and-play type reference system-independent double-field quantum key distribution protocol implementation method
CN113225184A (en) * 2021-05-11 2021-08-06 中国人民解放军空军工程大学 Passive decoy state modulation reference system-independent quantum key distribution system and method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CHUAN WANG ET AL: "Parallel Quantum Computing Teleportation for Spin Qubits in Quantum Dot and Microcavity Coupled System", 《IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS》 *
于浩等: "基于诱骗态的BB84协议量子秘密共享方案", 《量子电子学报》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115276822A (en) * 2022-07-11 2022-11-01 清华大学 Quantum communication method, apparatus, computer device, storage medium and program product
CN115276822B (en) * 2022-07-11 2024-04-19 清华大学 Quantum communication method, apparatus, computer device, storage medium, and program product

Also Published As

Publication number Publication date
CN114050868B (en) 2023-01-31

Similar Documents

Publication Publication Date Title
CN112929161B (en) Plug-and-play type reference system-independent double-field quantum key distribution protocol implementation method
JP6602410B2 (en) Photon communication system
JP3829602B2 (en) Encryption key distribution device
US11050559B2 (en) Quantum communications system using Talbot effect image position and associated methods
CN107113169A (en) Come from the communication with permanent security that short term security encrypts quantum communications
US7333611B1 (en) Ultra-secure, ultra-efficient cryptographic system
JP4555979B2 (en) Quantum key distribution method and communication method
US9160529B2 (en) Secret communication system and method for generating shared secret information
EP1784944B1 (en) Two non-orthogonal states quantum cryptography method and apparatus with intra-and inter-qubit interference for eavesdropper detection
EP1882332B1 (en) Phase locking in a multi-channel quantum communication system
US20070076887A1 (en) Double phase encoding quantum key distribution
CN108650088B (en) Quantum communication device and method comprising at least three parties
WO2018043742A1 (en) Quantum cryptographic key output apparatus, quantum cryptographic key communication system, and quantum cryptographic key output method
CN113438077B (en) Quantum key distribution networking system and quantum key distribution method
US12010225B2 (en) Discrete variable quantum key distribution using conjugate homodyne detection
CN114050868B (en) Quantum secure direct communication method based on transmitting or non-transmitting method
CN114244500B (en) Quantum key negotiation method, quantum key negotiation system, quantum digital signature method and quantum digital signature system
US8472626B2 (en) System and method for the secure transmission of binary code by phase-and intensity-coding
CN113037475A (en) Quantum secret sharing method and system under asymmetric channel
Khalil et al. Security performance of public key distribution in coherent optical communications links
CN108712254B (en) Quantum key distribution system and method
CN115361118A (en) Loss tolerant reference frame and measuring device independent quantum key distribution method
JP4528929B2 (en) Cryptographic transmitter
JP4461224B2 (en) Cryptographic transmitter
JP2005130194A (en) Quantum encryption communication system and sender side transmitter-receiver

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant