CN114401088A - Quantum secret sharing method based on super-entanglement assistance - Google Patents
Quantum secret sharing method based on super-entanglement assistance Download PDFInfo
- Publication number
- CN114401088A CN114401088A CN202210110890.6A CN202210110890A CN114401088A CN 114401088 A CN114401088 A CN 114401088A CN 202210110890 A CN202210110890 A CN 202210110890A CN 114401088 A CN114401088 A CN 114401088A
- Authority
- CN
- China
- Prior art keywords
- user
- photon
- freedom
- ghz
- polarization
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 29
- 238000005259 measurement Methods 0.000 claims abstract description 42
- 230000010287 polarization Effects 0.000 claims abstract description 42
- 238000001514 detection method Methods 0.000 claims abstract description 29
- 238000004458 analytical method Methods 0.000 claims abstract description 10
- 238000012937 correction Methods 0.000 claims abstract description 6
- 230000003321 amplification Effects 0.000 claims abstract description 4
- 238000003199 nucleic acid amplification method Methods 0.000 claims abstract description 4
- 230000005540 biological transmission Effects 0.000 claims description 22
- 230000006854 communication Effects 0.000 claims description 20
- 238000004891 communication Methods 0.000 claims description 19
- 230000004044 response Effects 0.000 claims description 19
- 239000013598 vector Substances 0.000 claims description 12
- 230000014509 gene expression Effects 0.000 claims description 3
- 238000012805 post-processing Methods 0.000 claims description 2
- 238000012216 screening Methods 0.000 claims description 2
- 238000012545 processing Methods 0.000 abstract description 2
- 230000009471 action Effects 0.000 description 5
- 238000004590 computer program Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000005610 quantum mechanics Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000010367 cloning Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000002245 particle Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
- H04L9/0858—Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/70—Photonic quantum communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/80—Optical aspects relating to the use of optical transmission for specific applications, not provided for in groups H04B10/03 - H04B10/70, e.g. optical power feeding or optical transmission through water
- H04B10/85—Protection from unauthorised access, e.g. eavesdrop protection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Optics & Photonics (AREA)
- Optical Communication System (AREA)
- Optical Modulation, Optical Deflection, Nonlinear Optics, Optical Demodulation, Optical Logic Elements (AREA)
Abstract
Description
技术领域technical field
本发明属于量子通信技术领域,具体涉及一种基于超纠缠辅助的量子秘密共享方法。The invention belongs to the technical field of quantum communication, in particular to a quantum secret sharing method based on super-entanglement assistance.
背景技术Background technique
量子通信是利用量子力学的基本原理来进行信息传递的方式。量子通信的安全性基于量子力学基本原理,包括不可克隆定理,纠缠的非定域性等。任何窃听者的窃听行为将对发送的粒子的状态进行破坏,从而被通信方发现。因此,量子通信具有绝对安全性,这是量子通信区别于经典通信的最大优势。Quantum communication is a way of transmitting information using the basic principles of quantum mechanics. The security of quantum communication is based on the fundamental principles of quantum mechanics, including the no-cloning theorem, the nonlocality of entanglement, etc. Any eavesdropper's eavesdropping behavior will destroy the state of the sent particles, which will be discovered by the communicating parties. Therefore, quantum communication has absolute security, which is the biggest advantage of quantum communication different from classical communication.
量子密码学为量子通信的一个重要分支,主要包含量子密钥分发(QKD),量子秘密共享(QSS)等。QKD指利用纠缠信道在两个用户之间分发安全密钥。而QSS指秘密发送者将秘密信息拆分为若干份子密码,借助量子态为载体分发给多个代理成员;只有代理成员共同协作才能恢复秘密。同理,QSS也允许多个代理成员通过协作,共同向接收方传递密钥。同QKD一样,QSS在理论上具有无条件安全性,在国防,金融等方面具有重要的应用价值。原始QSS方案需要在三个通信方之间分发GHZ态,三个通信方随机地选取直角基或对角基对手中的光子进行测量。只有当三方选取的测量基相同时,才可实现密钥的传递,并且传统的GHZ态分析只能区分8个GHZ态中的2个,以上两点导致原始QSS的密钥产生率较低。Quantum cryptography is an important branch of quantum communication, mainly including quantum key distribution (QKD), quantum secret sharing (QSS) and so on. QKD refers to the use of entangled channels to distribute security keys between two users. And QSS means that the secret sender splits the secret information into several parts of the password, and distributes it to multiple proxy members by using the quantum state as the carrier; only the proxy members can cooperate to recover the secret. Similarly, QSS also allows multiple proxy members to jointly deliver keys to the receiver through cooperation. Like QKD, QSS has unconditional security in theory and has important application value in national defense, finance, etc. The original QSS scheme needs to distribute the GHZ state among the three communicating parties, and the three communicating parties randomly choose the right-angle basis or the diagonal basis to measure the photons in their hands. Only when the measurement bases selected by the three parties are the same, the key transfer can be realized, and the traditional GHZ state analysis can only distinguish 2 of the 8 GHZ states. The above two points lead to a low key generation rate of the original QSS.
发明内容SUMMARY OF THE INVENTION
本发明的目的在于克服现有技术中的不足,提供一种基于超纠缠辅助的量子秘密共享方法,通过用户2和用户3通过协作,共同向用户1传递密钥。本方法不需要三个通信方进行对基处理,而且利用线性光学完全可区分八个GHZ态,可以显著提高QSS的安全密钥产生率,且本方法在当前实验条件下完全可以实现。The purpose of the present invention is to overcome the deficiencies in the prior art, and to provide a quantum secret sharing method based on super-entanglement assistance, in which the user 2 and the user 3 cooperate to jointly deliver the key to the user 1. This method does not require three communication parties to perform base-to-base processing, and can fully distinguish eight GHZ states by using linear optics, which can significantly improve the security key generation rate of QSS, and this method can be fully realized under the current experimental conditions.
一种基于超纠缠辅助的量子秘密共享方法,包括如下步骤:A quantum secret sharing method based on superentanglement assistance, comprising the following steps:
步骤1,用户1使用超纠缠源,制备大量相同的用于量子通信的极化P-动量M超纠缠三光子GHZ态;用户1将每个超纠缠光子对拆分为三个光子序列,分别命名为序列1、2、3;同时,用户1随机地选择三光子GHZ态作为安全性检测光子对;Step 1, User 1 uses a superentangled source to prepare a large number of identical polarized P-momentum M superentangled three-photon GHZ states for quantum communication; User 1 splits each superentangled photon pair into three photon sequences, respectively Named as sequence 1, 2, 3; meanwhile, user 1 randomly selects the three-photon GHZ state as the security detection photon pair;
步骤2,用户1将序列2和序列3的光子分别发送给用户2和用户3,用户2和用户3接收到光子后,通过经典通信告知用户1,用户1公布各个安全性检测光子对的位置和并公布在两个自由度的测量基,该测量基随机从直角基和对角基中选择一种;Step 2: User 1 sends the photons of sequence 2 and sequence 3 to user 2 and user 3 respectively. After user 2 and user 3 receive the photons, they notify user 1 through classical communication, and user 1 announces the location of each security detection photon pair. sum and publish a measurement basis in two degrees of freedom, the measurement basis is randomly selected from a right angle basis and a diagonal basis;
步骤3,对于序列2和序列3中的非安全性检测光子,用户2和用户3分别随机使用4种极化自由度上的幺正操作,对其在极化自由度上进行编码操作加载密钥,而在动量自由度上不作任何操作;Step 3: For the non-safety detection photons in sequence 2 and sequence 3, user 2 and user 3 randomly use unitary operations on four polarization degrees of freedom, respectively, and perform encoding operations on the polarization degrees of freedom to load the encryption. key, and do nothing on the momentum degrees of freedom;
步骤4,编码完成后,用户1、用户2和用户3利用动量自由度纠缠作为辅助,对编码三光子对进行极化自由度的完全GHZ态分析;用户2和用户3公布各自的探测器响应情况,用户1结合自己的探测器响应情况知道编码后的GHZ态,从而获得用户2和用户3联合传递的密钥;Step 4: After the encoding is completed, user 1, user 2 and user 3 use the momentum degree of freedom entanglement as an aid to perform a complete GHZ state analysis of the polarization degree of freedom for the encoded three-photon pair; user 2 and user 3 publish their respective detector responses In this case, user 1 knows the encoded GHZ state based on his own detector response, so as to obtain the key jointly transmitted by user 2 and user 3;
步骤5,对于安全性检测光子对,用户1、用户2和用户3根据用户1的公布的测量基,对其在极化和动量两个自由度进行测量并公布测量结果;在任一自由度,若测量基为直角基,三方的测量结果用于估算光子传输过程的比特错误率;若测量基为对角基,三方的测量结果用于估算光子传输过程的相位错误率;两种错误率之和定义为该自由度上的总错误率;若安全性检测光子在任一自由度的总错误率超过设定的阈值,则证明光子传输过程不安全,通信中止,三用户丢弃原始密钥;若两个自由度的总错误率均低于设定的阈值,则证明光子传输过程安全,进行下一步;Step 5, for the security detection photon pair, user 1, user 2 and user 3 measure the two degrees of freedom of polarization and momentum according to the measurement base published by user 1 and publish the measurement results; in any degree of freedom, If the measurement base is a right-angle basis, the measurement results of the three parties are used to estimate the bit error rate of the photon transmission process; if the measurement base is a diagonal base, the three-party measurement results are used to estimate the phase error rate of the photon transmission process; The sum is defined as the total error rate on this degree of freedom; if the total error rate of the security detection photon in any degree of freedom exceeds the set threshold, it proves that the photon transmission process is not secure, the communication is terminated, and the three users discard the original key; if If the total error rate of both degrees of freedom is lower than the set threshold, it proves that the photon transmission process is safe, and proceed to the next step;
步骤6,用户1、用户2和用户3在公开信道进行纠错和私密放大,形成最终的安全密钥。Step 6: User 1, User 2 and User 3 perform error correction and private amplification on the open channel to form a final security key.
进一步地,所述用户1使用超纠缠源制备极化-动量超纠缠GHZ态其中,|ψ1 +>P属于8个极化GHZ态之一,在Z基和X基下8个极化GHZ态的表达式分别为:Further, the user 1 uses a superentanglement source to prepare a polarization-momentum superentangled GHZ state Among them, |ψ 1 + > P belongs to one of the 8 polarized GHZ states, and the expressions of the 8 polarized GHZ states in the Z base and the X base are:
|H>、|V>为Z基的基矢,分别代表光子的水平极化和垂直极化,|±>P为X基的基矢,下标1、2、3分别代表光子所在的序列号;|H>, |V> are the fundamental vectors of the Z base, representing the horizontal polarization and vertical polarization of the photon, respectively, |±> P is the fundamental vector of the X base, The subscripts 1, 2, and 3 represent the serial numbers of the photons, respectively;
|ψ1 +>M属于动量自由度的8个GHZ态,在Z基和X基下8个动量GHZ态的形式为:|ψ 1 + > M belongs to the 8 GHZ states of the momentum degree of freedom, and the 8 momentum GHZ states under the Z basis and the X basis are in the form:
其中,|L>,|R>为Z基的基矢,分别代表动量的左和右,|±>M为对角基的基矢,满足下标1、2、3分别代表光子所在的序列号。Among them, |L>, |R> are the basis vectors of the Z basis, representing the left and right of the momentum, respectively, and |±> M are the basis vectors of the diagonal basis, satisfying The subscripts 1, 2, and 3 represent the serial numbers of the photons, respectively.
进一步地,步骤3中,对于三方共享的非安全性检测超纠缠GHZ光子对,用户2和用户3对光子在动量自由度上不作任何操作,而在极化自由度上进行编码操作,极化自由度上的四种编码操作包括:Further, in step 3, for the non-safety detection superentangled GHZ photon pair shared by three parties, user 2 and user 3 do not perform any operation on the momentum degree of freedom, but perform an encoding operation on the polarization degree of freedom, and the polarization The four encoding operations on degrees of freedom include:
编码完成后,三方用户共享的极化GHZ态演化为|ψi ±>P(i=1,2,3,4)之一;三方用户事先约定|ψ1 +>P、|ψ1 ->P、|ψ2 +>P、|ψ2 ->P、|ψ3 +>P、|ψ3 ->P、|ψ4 +>P、|ψ4 ->P分别代表000、001、010、011、100、101、110、111这8种编码。After the encoding is completed, the polarized GHZ state shared by the three-party users evolves into one of |ψ i ± > P (i=1, 2, 3, 4); the three-party users agree in advance |ψ 1 + > P , |ψ 1 - > P , |ψ 2 + > P , |ψ 2 - > P , |ψ 3 + > P , |ψ 3 - > P , |ψ 4 + > P , |ψ 4 - > P represent 000, 001, and 010, respectively , 011, 100, 101, 110, 111 these 8 codes.
进一步地,步骤4中,用户1、用户2、用户3通过动量纠缠辅助实现极化自由度的完全GHZ态分析,即能完全区分8个极化GHZ态;三个用户处各有4个单光子探测器,分别为用户1:用户2:用户3:每种GHZ态等概率地对应8种不同的探测器响应情况;用户2和用户3公布其位置处的单光子探测器响应情况,用户1结合自己的探测器响应情况推测出编码后的GHZ态由此推测出用户2和用户3联合传递的原始密钥。Further, in step 4, user 1, user 2, and user 3 realize complete GHZ state analysis of polarization degrees of freedom through momentum entanglement assistance, that is, 8 polarization GHZ states can be completely distinguished; each of the three users has 4 single GHZ states. Photon detectors, respectively User 1: User 2: User 3: Each GHZ state corresponds to 8 different detector response situations with equal probability; user 2 and user 3 announce the response situation of single-photon detectors at their positions, and user 1 infers the encoded GHZ state based on his own detector response situation From this, the original key jointly transmitted by user 2 and user 3 is deduced.
进一步地,步骤5中,安全性检测包括:Further, in step 5, the security detection includes:
用户1公布安全性检测光子对的位置和测量基,然后三用户随机地选择Z基或X基对手中的安全性检测光子进行测量并公布测量结果。在极化和动量自由度,若测量基为直角基,三方的测量结果用于估算光子传输过程的比特错误率QPb(QMb),QPb(QMb)等于三方的测量结果不全相同的概率;若测量基为对角基,三方的测量结果用于估算光子传输过程的相位错误率QPp(QMp),QPp(QMp)等于三方的测量结果有偶数个|+>P(M)的概率;两种错误率之和定义为该自由度上的总错误率QPt=QPb+QPp(QMt=QMb+QMp);若QPt或QMt高于设定的阈值,则说明光子传输过程不安全,则丢弃产生的原始密钥,重新检查信道;当两个自由度的总错误率QPt和QMt均低于设定的阈值时,说明通信安全。User 1 publishes the position and measurement base of the safety detection photon pair, and then three users randomly select Z base or X base to measure the safety detection photon in the pair and publish the measurement result. In the polarization and momentum degrees of freedom, if the measurement base is a right-angle basis, the three-way measurement results are used to estimate the bit error rate Q Pb (Q Mb ) of the photon transmission process, and Q Pb (Q Mb ) is equal to the three-way measurement results are not all the same Probability; if the measurement basis is a diagonal basis, the three-way measurement results are used to estimate the phase error rate Q Pp (Q Mp ) of the photon transmission process, and Q Pp (Q Mp ) is equal to the three-way measurement results. There are an even number of |+> P( The probability of M) ; the sum of the two error rates is defined as the total error rate on this degree of freedom Q Pt = Q Pb + Q Pp (Q Mt = Q Mb + Q Mp ); if Q Pt or Q Mt is higher than the set If the threshold value is , it means that the photon transmission process is not secure, then discard the original key generated and check the channel again; when the total error rates Q Pt and Q Mt of the two degrees of freedom are both lower than the set threshold, it means that the communication is secure.
进一步地,本方法中,超纠缠光子的初始量子态以及编码后用户2和用户3的探测器响应情况是公开信息,用户1的探测器响应情况不公开,用户2和用户3完成编码后三方共享的极化GHZ态只有用户1知道。Further, in this method, the initial quantum state of the superentangled photons and the detector responses of user 2 and user 3 after encoding are public information, the detector response of user 1 is not public, and the three parties after user 2 and user 3 complete the encoding. The shared polarized GHZ state is known only to user 1.
进一步地,本方法的安全密钥产生率Rsec表述为:Further, the security key generation rate R sec of this method is expressed as:
Rsec=Rsift[1-(1+f)H(Qt)]R sec =R sift [1-(1+f)H(Q t )]
其中,Qt代表密钥的总错误率,Rsift代表筛选密钥产生率,f为后处理的纠错效率,取f=1.16,H(x)为二进制香农熵:Among them, Q t represents the total error rate of the key, R sift represents the screening key generation rate, f is the error correction efficiency of post-processing, take f=1.16, and H(x) is the binary Shannon entropy:
H(x)=-x log2(x)-(1-x)log2(1-x).H(x)=-x log 2 (x)-(1-x)log 2 (1-x).
密钥的总错误率为Qt=(1-QPt)(1-QMt)。The total error rate of the key is Q t =(1-Q Pt )(1-Q Mt ).
与现有技术相比,本发明达到的有益效果包括:Compared with the prior art, the beneficial effects achieved by the present invention include:
(1)本方法预先制备用于量子通信的GHZ态超纠缠光子对,用户1将每个GHZ态光子对中的两个光子分别发送给用户2和用户3。分发光子结束后,采取了安全性检测,使得窃听者无法截获光子而不被发现,从而理论上能消除密钥泄露,保证了密钥传输过程的安全性。(1) This method pre-prepares GHZ state superentangled photon pairs for quantum communication, and user 1 sends two photons in each GHZ state photon pair to user 2 and user 3, respectively. After the photons are distributed, security detection is adopted, so that the eavesdropper cannot intercept the photons without being discovered, thus theoretically eliminating key leakage and ensuring the security of the key transmission process.
(2)本方法使用极化-动量超纠缠GHZ态以及利用动量纠缠辅助实现完全的极化GHZ态分析,使得三方用户不需要进行对基操作即可产生密钥。由于该极化GHZ态分析方案能完全区分8个极化GHZ态,理论上每一对超纠缠GHZ态能传递3比特的密钥,可明显提高QSS的密钥传输效率。(2) This method uses the polarization-momentum super-entangled GHZ state and uses the momentum entanglement to assist to realize the complete analysis of the polarization GHZ state, so that the three-party user can generate the key without performing the base operation. Since the polarization GHZ state analysis scheme can completely distinguish 8 polarization GHZ states, in theory, each pair of superentangled GHZ states can transmit a 3-bit key, which can significantly improve the key transmission efficiency of QSS.
(3)本方法使用的所有设备基于线性光学,在现有实验条件下可以实现,提高了方案的实用性。(3) All equipment used in this method is based on linear optics, which can be realized under the existing experimental conditions, which improves the practicability of the scheme.
附图说明Description of drawings
图1是本发明实施例中的一种基于超纠缠辅助的量子秘密共享方法的流程图。FIG. 1 is a flowchart of a method for quantum secret sharing based on superentanglement assistance in an embodiment of the present invention.
图2是本发明实施例中的一种基于超纠缠辅助的量子秘密共享方法的超纠缠GHZ态分析图,其中PBS代表极化分束器,能完全透射H极化的光子,完全反射V极化的光子。HWP代表半波片,能实现 代表12个单光子探测器。2 is an analysis diagram of a superentangled GHZ state based on a quantum secret sharing method assisted by superentanglement in an embodiment of the present invention, wherein PBS represents a polarized beam splitter, which can completely transmit H-polarized photons and completely reflect V-polarized photons. transformed photons. HWP stands for half-wave plate and can achieve Represents 12 single-photon detectors.
图3是本发明实施例中的一种基于超纠缠辅助的量子秘密共享方法的原理框图;Encode代表用户2和用户3的编码器,可对光子在极化自由度上进行四种编码操作。3 is a schematic block diagram of a quantum secret sharing method based on super-entanglement assistance in an embodiment of the present invention; Encode represents the encoders of user 2 and user 3, and can perform four encoding operations on photons in terms of polarization degrees of freedom.
图4是本发明实施例中的一种基于超纠缠辅助的量子秘密共享方法的探测器响应情况与极化GHZ态的对应情况图。FIG. 4 is a graph showing the correspondence between the detector response and the polarized GHZ state of a superentanglement-assisted quantum secret sharing method according to an embodiment of the present invention.
具体实施方式Detailed ways
下面结合说明书附图对本发明的技术方案做进一步的详细说明。The technical solutions of the present invention will be further described in detail below with reference to the accompanying drawings.
如图1所示,本发明实施例提供了一种基于超纠缠辅助的量子秘密共享方法,包括:As shown in FIG. 1, an embodiment of the present invention provides a quantum secret sharing method based on superentanglement assistance, including:
步骤1:用户1使用超纠缠源,制备大量相同的用于量子通信的极化(P)-动量(M)超纠缠三光子GHZ态。用户1将每个超纠缠光子对拆分为三个光子序列,分别命名为序列1,2,3。超纠缠三光子GHZ态形式为其中,|ψ1 +>P属于8个极化GHZ态之一,在Z基和X基下,8个极化GHZ态的表达式分别为:Step 1: User 1 uses a superentangled source to prepare a large number of identical polarization (P)-momentum (M) superentangled three-photon GHZ states for quantum communication. User 1 splits each superentangled photon pair into three photon sequences, named sequences 1, 2, and 3, respectively. The superentangled three-photon GHZ state has the form Among them, |ψ 1 + > P belongs to one of the eight polarized GHZ states, and under the Z base and the X base, the expressions of the eight polarized GHZ states are:
|H>、|V>为Z基的基矢,分别代表光子的水平极化和垂直极化,|±>P为X基的基矢,下标1,2,3分别代表光子所在的序列号。|H>, |V> are the fundamental vectors of the Z base, representing the horizontal polarization and vertical polarization of the photon, respectively, |±> P is the fundamental vector of the X base, The subscripts 1, 2, and 3 represent the serial numbers of the photons, respectively.
同理,|ψ1 +>M属于动量自由度的8个GHZ态,在Z基和X基下,8个动量GHZ态的形式为:Similarly, |ψ 1 + > M belongs to the 8 GHZ states of the momentum degree of freedom. Under the Z basis and the X basis, the 8 momentum GHZ states are in the form of:
其中,|L>、|R>为Z基的基矢,分别代表动量的左和右,|±>M为对角基的基矢,满足下标1,2,3分别代表光子所在的序列号。Among them, |L>, |R> are the basis vectors of the Z basis, representing the left and right of the momentum, respectively, and |±> M are the basis vectors of the diagonal basis, satisfying The subscripts 1, 2, and 3 represent the serial numbers of the photons, respectively.
同时,用户1随机地选择足够多的三光子GHZ态作为安全性检测光子对。用户1将序列2和序列3的光子分别发送给用户2和用户3,用户2和用户3接收到光子后,告知用户1,用户1公布安全性检测光子对的位置和两个自由度的测量基(随机地从直角基和对角基中选择)。At the same time, user 1 randomly selects enough three-photon GHZ states as pairs of safe detection photons. User 1 sends the photons of sequence 2 and sequence 3 to user 2 and user 3 respectively. After user 2 and user 3 receive the photons, they inform user 1, and user 1 announces the position of the safety detection photon pair and the measurement of the two degrees of freedom base (randomly chosen from right-angled and diagonal bases).
对于三方共享的非安全性检测超纠缠GHZ光子对,用户2和用户3对光子在动量自由度上不作任何操作,而在极化自由度上进行编码。极化自由度上的四种编码操作包括:For the non-safety detection of superentangled GHZ photon pairs shared by three parties, user 2 and user 3 do nothing in the momentum degree of freedom, but encode in the polarization degree of freedom. The four encoding operations on the polarization degrees of freedom include:
以上操作可使得极化自由度上的GHZ态|ψ1 +>P演化为上述8种极化GHZ态。例如,若用户2的操作为用户3的操作为极化自由度上的GHZ态将演化为三个用户约定好|ψ1 +>P,|ψ1 ->P,|ψ2 +>P,|ψ2 ->P,|ψ3 +>P,|ψ3 ->P,|ψ4 +>P,|ψ4 ->P分别代表000,001,010,011,100,101,110,111这8种编码(原始密钥)。The above operations can make the GHZ state |ψ 1 + > P in the polarization degree of freedom evolve into the above-mentioned eight polarization GHZ states. For example, if user 2's action is User 3's action is The GHZ state in the polarization degrees of freedom will evolve into The three users agree on |ψ 1 + > P , |ψ 1 - > P , |ψ 2 + > P , |ψ 2 - > P , |ψ 3 + > P , |ψ 3 - > P , |ψ 4 + > P , |ψ 4 - > P represent 8 codes (original keys) of 000, 001, 010, 011, 100, 101, 110, and 111, respectively.
编码完成后,用户1,用户2,用户3利用动量纠缠辅助实现极化自由度的完全GHZ态分析,即能完全区分8个极化GHZ态。三个用户处各有4个单光子探测器,分别为用户1:用户2:用户3:每种极化GHZ态等概率地对应8种不同的探测器响应情况,具体的8种极化GHZ态对应的探测器响应情况如图4所示。After the coding is completed, user 1, user 2, and user 3 use momentum entanglement to assist in realizing the complete GHZ state analysis of the polarization degree of freedom, that is, the eight polarization GHZ states can be completely distinguished. There are 4 single-photon detectors at each of the three users, user 1: User 2: User 3: Each polarization GHZ state corresponds to eight different detector response situations with equal probability, and the specific detector response situations corresponding to the eight polarization GHZ states are shown in Fig. 4 .
测量完成后,用户2和用户3公布其位置处的单光子探测器响应情况,用户1根据三方的探测器响应情况推测出编码后的超纠缠GHZ态由此得到用户2和用户3联合传递的密钥。例如,若用户2的操作为用户3的操作为如编码后的极化GHZ态为|ψ4 ->P,用户1可得到用户2和用户3联合传递的密钥为111,若用户2的操作为用户3的操作为如编码后的极化GHZ态为 用户1可得到用户2和用户3联合传递的密钥为011。After the measurement is completed, user 2 and user 3 announce the response of the single-photon detector at their location, and user 1 infers the encoded super-entangled GHZ state according to the three-party detector response. Thus, the key jointly transmitted by user 2 and user 3 is obtained. For example, if user 2's action is User 3's action is If the encoded polarized GHZ state is |ψ 4 - > P , user 1 can obtain the key jointly transmitted by user 2 and user 3 as 111. If user 2 operates as User 3's action is For example, the encoded polarized GHZ state is User 1 can obtain the key jointly transmitted by User 2 and User 3 as 011.
为保证密钥传输过程的安全性,三用户需要进行安全性检测。对于安全性检测光子对,用户1、用户2和用户3根据公布的测量基,对其在极化和动量两个自由度进行测量,并公布测量结果。在任一自由度,若选择直角基,三方的测量结果可用于估算光子传输过程的比特错误率;若选择对角基,三方的测量结果可用于估算光子传输过程的相位错误率。两种错误率之和定义为该自由度上的总错误率。若安全性检测光子在任一自由度的总错误率超过设定的阈值,则证明光子传输过程不安全,通信中止,三用户丢弃原始密钥;若两个自由度的总错误率均低于设定的阈值,则证明光子传输过程安全,三用户保留原始密钥。To ensure the security of the key transmission process, the three users need to perform security detection. For the safety detection photon pair, user 1, user 2 and user 3 measure the two degrees of freedom of polarization and momentum according to the published measurement base, and publish the measurement results. In any degree of freedom, if the right-angle basis is selected, the three-party measurement results can be used to estimate the bit error rate of the photon transmission process; if the diagonal basis is selected, the three-party measurement results can be used to estimate the phase error rate of the photon transmission process. The sum of the two error rates is defined as the total error rate on that degree of freedom. If the total error rate of the security detection photon in any degree of freedom exceeds the set threshold, it proves that the photon transmission process is not secure, the communication is terminated, and the three users discard the original key; if the total error rate of the two degrees of freedom is lower than the set threshold If the threshold is set, it proves that the photon transmission process is safe, and the three users keep the original key.
最后,用户1、用户2和用户3在公开信道进行纠错和私密放大,形成最终的安全密钥。Finally, user 1, user 2 and user 3 perform error correction and private amplification on the open channel to form the final security key.
需要说明的是,窃听者在通信过程中无法获取信息。在用户1把光子发送给用户2和用户3的传输过程中,此时未进行编码操作,所以传递的光子中不包含密钥信息,即窃听者无法获取任何信息。编码后,只有用户2和用户3公布测量结果,用户1不公布测量结果,由此窃听者就得不到编码后的GHZ态信息,这样能保证整个方案是安全的。It should be noted that the eavesdropper cannot obtain information during the communication process. In the transmission process of user 1 sending photons to user 2 and user 3, no encoding operation is performed at this time, so the transmitted photons do not contain key information, that is, eavesdroppers cannot obtain any information. After coding, only user 2 and user 3 publish the measurement results, and user 1 does not publish the measurement results, so the eavesdropper cannot obtain the coded GHZ state information, which can ensure the security of the whole scheme.
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。As will be appreciated by those skilled in the art, the embodiments of the present application may be provided as a method, a system, or a computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
以上所述仅为本发明的较佳实施方式,本发明的保护范围并不以上述实施方式为限,但凡本领域普通技术人员根据本发明所揭示内容所作的等效修饰或变化,皆应纳入权利要求书中记载的保护范围内。The above descriptions are only the preferred embodiments of the present invention, and the protection scope of the present invention is not limited to the above-mentioned embodiments, but any equivalent modifications or changes made by those of ordinary skill in the art based on the contents disclosed in the present invention should be included in the within the scope of protection described in the claims.
Claims (7)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210110890.6A CN114401088B (en) | 2022-01-29 | 2022-01-29 | Quantum secret sharing method based on superentanglement assistance |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210110890.6A CN114401088B (en) | 2022-01-29 | 2022-01-29 | Quantum secret sharing method based on superentanglement assistance |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114401088A true CN114401088A (en) | 2022-04-26 |
CN114401088B CN114401088B (en) | 2023-09-15 |
Family
ID=81232109
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210110890.6A Active CN114401088B (en) | 2022-01-29 | 2022-01-29 | Quantum secret sharing method based on superentanglement assistance |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114401088B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118101196A (en) * | 2024-04-09 | 2024-05-28 | 南京邮电大学 | A quantum encryption device that can be configured with multiple functions |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20120071883A (en) * | 2010-12-23 | 2012-07-03 | 한국전자통신연구원 | Quantum authentication method and apparatus for quantum secret sharing protocol |
CN107786280A (en) * | 2017-09-30 | 2018-03-09 | 南京邮电大学 | It is a kind of based on the super tripartite's quantum safety direct communication method for tangling Bel's state |
CN111245608A (en) * | 2020-01-16 | 2020-06-05 | 南京邮电大学 | Device-independent quantum key distribution method based on single photon with three degrees of freedom |
CN112272085A (en) * | 2020-10-14 | 2021-01-26 | 南京邮电大学 | Measuring equipment irrelevant quantum key distribution method based on time slice assisted Bell state measurement |
-
2022
- 2022-01-29 CN CN202210110890.6A patent/CN114401088B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20120071883A (en) * | 2010-12-23 | 2012-07-03 | 한국전자통신연구원 | Quantum authentication method and apparatus for quantum secret sharing protocol |
CN107786280A (en) * | 2017-09-30 | 2018-03-09 | 南京邮电大学 | It is a kind of based on the super tripartite's quantum safety direct communication method for tangling Bel's state |
CN111245608A (en) * | 2020-01-16 | 2020-06-05 | 南京邮电大学 | Device-independent quantum key distribution method based on single photon with three degrees of freedom |
CN112272085A (en) * | 2020-10-14 | 2021-01-26 | 南京邮电大学 | Measuring equipment irrelevant quantum key distribution method based on time slice assisted Bell state measurement |
Non-Patent Citations (2)
Title |
---|
GANG YANG, ET AL.: "Liniear-optical heralded amplification protocol for two-photon spatial-mode-polarization hyperentangled state", QUANTUM INFORMATION PROCESSING * |
权东晓;赵楠;裴昌幸;朱畅华;刘丹;: "一种新的基于纠缠交换的量子秘密共享协议", 光电子.激光, no. 01 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118101196A (en) * | 2024-04-09 | 2024-05-28 | 南京邮电大学 | A quantum encryption device that can be configured with multiple functions |
Also Published As
Publication number | Publication date |
---|---|
CN114401088B (en) | 2023-09-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wu et al. | High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states | |
Xia et al. | Controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding | |
Ye | Fault tolerant channel-encrypting quantum dialogue against collective noise | |
Kogias et al. | Unconditional security of entanglement-based continuous-variable quantum secret sharing | |
Deng et al. | Circular quantum secret sharing | |
Lin et al. | Quantum private comparison protocol with d-dimensional Bell states | |
CN108599942B (en) | Measurement-retransmission half-quantum privacy comparison method without entanglement | |
Zhou et al. | Quantum deterministic key distribution protocols based on teleportation and entanglement swapping | |
Yan et al. | Semi-quantum key agreement and private comparison protocols using Bell states | |
Feng-Li et al. | Quantum secret sharing protocol between multiparty and multiparty with single photons and unitary transformations | |
CN108449176A (en) | Single photon-based annular semi-quantum secret sharing method requiring classical communicator to have measurement capability | |
Wang et al. | Three-party quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom | |
Yang et al. | Threshold proxy quantum signature scheme with threshold shared verification | |
CN114268432A (en) | Device-independent quantum-secure direct communication method based on single-photon source | |
Wang et al. | Semiquantum secure direct communication with authentication based on single-photons | |
Yan et al. | Mutual semi-quantum key agreement protocol using Bell states | |
Yang et al. | Threshold quantum secret sharing between multi-party and multi-party | |
Yang et al. | Threshold quantum secure direct communication without entanglement | |
Lai et al. | Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes | |
CN114401088B (en) | Quantum secret sharing method based on superentanglement assistance | |
Zhan et al. | Quantum secure direct communication by entangled qutrits and entanglement swapping | |
Zhang et al. | Controlled quantum secure direct communication by using four particle cluster states | |
CN108847927B (en) | A single-photon-based annular semi-quantum secret sharing method that does not require classical communicators to have measurement capabilities | |
Li et al. | Quantum key agreement via non-maximally entangled cluster states | |
CN110932848A (en) | Multi-party quantum key agreement method based on non-maximally entangled Bell states with known parameters |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |