CN117394990A - Quantum key distribution method, quantum key distribution device, electronic equipment and storage medium - Google Patents

Quantum key distribution method, quantum key distribution device, electronic equipment and storage medium Download PDF

Info

Publication number
CN117394990A
CN117394990A CN202210791282.6A CN202210791282A CN117394990A CN 117394990 A CN117394990 A CN 117394990A CN 202210791282 A CN202210791282 A CN 202210791282A CN 117394990 A CN117394990 A CN 117394990A
Authority
CN
China
Prior art keywords
quantum state
quantum
sequence
key
bit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210791282.6A
Other languages
Chinese (zh)
Inventor
王聪丽
王锦华
薛伟佳
王靖然
姜钰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202210791282.6A priority Critical patent/CN117394990A/en
Priority to PCT/CN2022/141145 priority patent/WO2024007547A1/en
Publication of CN117394990A publication Critical patent/CN117394990A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/70Photonic quantum communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Electromagnetism (AREA)
  • Computer Security & Cryptography (AREA)
  • Optics & Photonics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Optical Communication System (AREA)

Abstract

The embodiment of the application discloses a quantum key distribution method, a quantum key distribution device, electronic equipment and a storage medium, wherein the quantum key distribution method comprises the following steps: the transmitting device encodes each first bit in the first random bit sequence by using a corresponding target basic vector to obtain a first quantum state sequence, wherein the first quantum state sequence comprises a plurality of first quantum states, and transmits the first quantum state sequence to the receiving device; the receiving device performs unitary transformation on each first quantum state based on the original key sequence to obtain a second quantum state sequence, wherein the second quantum state sequence comprises a plurality of second quantum states, each first quantum state is identical with a basic vector of a corresponding second quantum state, and the second quantum state sequence is sent to the sending device; the transmitting device decodes the corresponding second quantum state in the second quantum state sequence by utilizing the target basis vector corresponding to each first quantum state, matches the third quantum state sequence obtained by decoding with the first quantum state sequence, and constructs a secret key based on the bit sequence obtained by matching. The embodiment of the application can improve the code rate of key distribution.

Description

Quantum key distribution method, quantum key distribution device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of quantum key distribution technologies, and in particular, to a quantum key distribution method, a device, an electronic apparatus, and a storage medium.
Background
Quantum communication is an emerging interdisciplinary discipline created by the combination of quantum mechanics and information science, which exploits the fundamental properties of quantum physics to achieve unconditional security of communication. Among them, quantum key distribution (Quantum Key Distribution, QKD) is a technical direction leading to practical use and industrialization in the field of quantum communication, and is expected to bring a secret communication scheme capable of realizing long-term security guarantee for the field of information security. Unlike existing cryptographic techniques, QKD uses quantum states to encode information, whose security is based on quantum physics principles rather than mathematical computational complexity requirements and assumptions, with reliable security even under the mature conditions of quantum computing technology. The QKD can realize that both communication parties generate the same secret key, the key generation rate, namely the bit rate, is an important index for measuring the system performance, and more data can be encrypted by the high bit rate, so that a more complex encryption system is formed. The current key distribution system distributes keys with a lower code rate.
Disclosure of Invention
In order to solve the technical problems, embodiments of the present application provide a quantum key distribution method, a device, an electronic device, and a storage medium, which can improve the bitrate of key distribution.
Other features and advantages of the present application will be apparent from the following detailed description, or may be learned in part by the practice of the application.
According to an aspect of an embodiment of the present application, there is provided a quantum key distribution method including: the transmitting device encodes each first bit in the first random bit sequence by using a corresponding target basic vector to obtain a first quantum state sequence, wherein the first quantum state sequence comprises a plurality of first quantum states, and transmits the first quantum state sequence to the receiving device; the receiving device performs unitary transformation on each first quantum state based on the original key sequence to obtain a second quantum state sequence, wherein the second quantum state sequence comprises a plurality of second quantum states, each first quantum state is identical with a basic vector of a corresponding second quantum state, and the second quantum state sequence is sent to the sending device; the transmitting device decodes the corresponding second quantum state in the second quantum state sequence by utilizing the target basis vector corresponding to each first quantum state, matches the third quantum state sequence obtained by decoding with the first quantum state sequence, and constructs a secret key based on the bit sequence obtained by matching.
In one exemplary embodiment, each first quantum state is the same or orthogonal to the polarization direction of the corresponding second quantum state.
In one exemplary embodiment, unitary transforming each first quantum state based on the original key sequence comprises: determining a quantum gate for a corresponding first quantum state based on classical bits included in the original key sequence; and carrying out quantum computation on each first quantum state based on the determined quantum gate to obtain a second quantum state sequence.
In one exemplary embodiment, quantum computing each first quantum state based on the determined quantum gate, resulting in a second sequence of quantum states includes: and multiplying the corresponding first quantum state by each quantum gate to obtain a second quantum state sequence.
In one exemplary embodiment, determining a quantum gate for a corresponding first quantum state based on classical bits included in an original key sequence includes: if classical bits included in the original key sequence are 0, quantum gates determined for the corresponding first quantum states are unit gates; if the classical bit included in the original key sequence is 1, the quantum gate determined for the corresponding first quantum state is
In an exemplary embodiment, matching the decoded third sequence of quantum states with the first sequence of quantum states comprises: if the polarization directions of the third quantum state in the third quantum state sequence and the corresponding first quantum state in the first quantum state sequence are the same, the corresponding bit data is determined to be 0, and if the polarization directions of the third quantum state in the third quantum state sequence and the corresponding first quantum state in the first quantum state sequence are orthogonal, the corresponding bit data is determined to be 1.
In one exemplary embodiment, constructing the key based on the matched bit sequence includes: and carrying out error correction and privacy enhancement processing on the bit sequence in sequence to obtain a secret key.
According to an aspect of an embodiment of the present application, there is provided a quantum key distribution apparatus including: the encoding module is used for controlling the transmitting device to encode each first bit in the first random bit sequence by utilizing a corresponding target basic vector to obtain a first quantum state sequence, wherein the first quantum state sequence comprises a plurality of first quantum states, and the first quantum state sequence is transmitted to the receiving device; the transformation module is used for controlling the receiving device to perform unitary transformation on each first quantum state based on the original key sequence to obtain a second quantum state sequence, wherein the second quantum state sequence comprises a plurality of second quantum states, each first quantum state is identical with a basic vector of a corresponding second quantum state, and the second quantum state sequence is sent to the sending device; the matching module is used for controlling the sending device to decode the corresponding second quantum state in the second quantum state sequence by utilizing the target basis vector corresponding to each first quantum state, matching the third quantum state sequence obtained by decoding with the first quantum state sequence, and constructing a bit data sequence of the key according to the matching result.
According to an aspect of the embodiments of the present application, there is provided an electronic device including a processor and a memory, the memory having stored thereon computer readable instructions which, when executed by the processor, implement a quantum key distribution method as above.
According to an aspect of embodiments of the present application, there is provided a computer-readable storage medium having stored thereon computer-readable instructions which, when executed by a processor of a computer, cause the computer to perform a quantum key distribution method as previously provided.
According to an aspect of embodiments of the present application, there is provided a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device performs the quantum key distribution method provided in the above-described various alternative embodiments.
In the technical scheme provided by the embodiment of the application, the receiving device does not need to select a measurement basis vector to measure an unknown first quantum state sequence, but performs unitary transformation on each first quantum state based on an original key sequence to obtain a second quantum state sequence, and because each first quantum state is identical to the basis vector of a corresponding second quantum state, when the target basis vector corresponding to each first quantum state is utilized to decode the corresponding second quantum state in the second quantum state sequence, the sending device can completely and correctly decode all the second quantum states, and use all third quantum states obtained by decoding to construct a key, so that the condition that the information of an inconsistent part of the basis vector needs to be discarded in the conventional quantum key distribution scheme, which results in lower code rate of a QKD system, and improves the code rate of quantum key distribution.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application. It is apparent that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art. In the drawings:
FIG. 1 is a block diagram of an implementation environment of a prior art quantum key distribution method shown in an exemplary embodiment of the present application;
FIG. 2 is a block diagram of an implementation environment of a quantum key distribution method as shown in an exemplary embodiment of the present application;
FIG. 3 is a flow chart of a quantum key distribution method as illustrated in an exemplary embodiment of the present application;
FIG. 4 is a schematic diagram of quantum states encoded with four basis vectors in BB84 for bit data in an exemplary embodiment of the present application;
FIG. 5 is a flowchart of an exemplary embodiment of step S102 in the embodiment of FIG. 3;
FIG. 6 is a flow diagram illustrating a quantum key distribution method according to an exemplary embodiment;
FIG. 7 is a block diagram of a quantum key distribution system shown in an exemplary embodiment of the present application;
fig. 8 shows a schematic diagram of a computer system suitable for use in implementing the electronic device of the embodiments of the present application.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present application as detailed in the accompanying claims.
The block diagrams depicted in the figures are merely functional entities and do not necessarily correspond to physically separate entities. That is, the functional entities may be implemented in software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The flow diagrams depicted in the figures are exemplary only, and do not necessarily include all of the elements and operations/steps, nor must they be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the order of actual execution may be changed according to actual situations.
Also to be described is: reference to "a plurality" in this application means two or more than two. "and/or" describes an association relationship of an association object, meaning that there may be three relationships, e.g., a and/or B may represent: a exists alone, A and B exist together, and B exists alone. The character "/" generally indicates that the context-dependent object is an "or" relationship.
It should be noted that, the network elements referred to in the embodiments of the present application may also be referred to as functions or functional entities, which are not limited in the present application. For example, the access and mobility management function network element may also be referred to as an access and mobility management function or an access and mobility management function entity, the session management function network element may be referred to as a session management function or a session management function entity, etc. The names of the network elements are not limited in the application, and those skilled in the art can replace the names of the network elements with other names to perform the same function, which falls within the scope of protection of the application.
In order to better understand and describe the schemes of the embodiments of the present application, the technical terms related to the embodiments of the present application will be briefly described below.
Quantum key distribution is the use of quantum mechanical properties to secure communications, which enable two parties to a communication to generate and share a random, secure key to encrypt and decrypt messages. The security of quantum key distribution is based on the fundamental principles of quantum mechanics, whereas traditional cryptography is based on the computational complexity of certain mathematical algorithms. Traditional cryptography cannot detect eavesdropping, and therefore the security of the secret key cannot be guaranteed. Quantum key distribution is used only to generate and distribute keys and does not transmit any substantial messages. The key may be used in some encryption algorithms to encrypt messages, which may be transmitted in standard channels.
The process of prior art quantum key distribution is as follows: a single photon is usually used as a classical bit of polarization or phase freedom, and a 0,1 random number to be transferred can be encoded onto this quantum superposition state, e.g. it is agreed in advance that the circular polarization of the photon represents 1 and the linear polarization represents 0. The light source emits a photon, each photon is randomly prepared into a circular polarization state or a linear polarization state by the first party, and then the circular polarization state or the linear polarization state is sent to the second party of a legal user, the second party receives the photon, and in order to confirm the polarization state (namely 0 or 1) of the photon, the circular polarization or the linear polarization analyzer is randomly adopted for measurement. If the type of the analyzer is exactly the same as the polarization state of the photon being measured, the measured random number must be the same as the random number encoded by the a, otherwise, the measured random number of the b is different from the one emitted by the a. And B, measuring photons emitted by the A one by one, and recording the measurement result. Party b then tells party a via the public channel the type of analyzer he employs. At this time, the A-party can conveniently know which photons are correctly detected and which are not, and can possibly make mistakes when the B-party detects, so that he tells the B-party only to leave the result of the correct detection as a key, and thus both parties have completely identical 0,1 random number sequences.
In the existing quantum key distribution mode, the quantum state may be changed by measuring the unknown quantum state, so that both communication parties discard information of the inconsistent basic vector part, namely about 50% of information, and the QKD system has lower code rate.
In order to solve at least the above problems in the prior art, a quantum key distribution method, a quantum key distribution apparatus, an electronic device, and a computer readable storage medium according to embodiments of the present application are provided, and these embodiments will be described in detail below.
Referring to fig. 1, fig. 1 is a block diagram of an implementation environment of a prior art quantum key distribution method according to an exemplary embodiment of the present application, and as shown in fig. 1, the implementation environment of the prior art quantum key distribution method includes a transmitting device Alice and a receiving device Bob, where a quantum channel and a classical channel exist between Alice and Bob, and during quantum key distribution, alice first generates a plurality of photons through a single photon communication source, and Alice randomly generates a string of bits; each photon is modulated by Alice by randomly selecting a Z base vector or an X base vector each time, so that a quantum state is obtained; alice sends the quantum state to Bob through a quantum channel; bob randomly selects either the Z-basis vector or the X-basis vector to bit decode the received quantum state; bob detects the decoded quantum state by means of a single photon detector.
The basic vector comparison process comprises the following steps: bob sends the detected basis vector sequence to Alice through a classical channel; alice replies Bob error basis vector order; bob removes the wrong basis vectors, leaving the correct basis vectors, and demodulates the random number. In this embodiment, after Alice and Bob demodulate the random number, alice and Bob also respectively perform data processing such as error rate estimation, error correction, privacy enhancement, etc. on the random number, and finally, a common key negotiated by Alice and Bob can be obtained, for example, the error rate of the key distribution system may be calculated by the following manner: the receiving device Bob sends partial bit data included in the key to the sending device Alice, and the sending device Alice compares the received bit data with the values at the corresponding positions in the original key respectively, and takes the total number of the positions with different results and the ratio of the total number of the positions accounting for the comparison as the error rate.
Quantum key distribution techniques based on the basic laws of quantum mechanics, the principles of hessian uncertainty and the theorem of quantum state unclonable are considered to provide encrypted communications with the highest security. During quantum key distribution, some errors are inevitably introduced, and possible sources of these errors include: interference of quantum channels, imperfections of optical calibration, noise introduced by a receiver, introduction of attacks by an attacker, etc., these errors may be represented in an initial Key (sfted Key) generated by sender Alice and receiver Bob, the positions of these errors are random, and the sender Alice and receiver Bob are required to correct the portions of the two initial keys that are different, so as to obtain a completely consistent Key (CorrectedKey). The above correction procedure is called error correction. Common error correction algorithms include BBSSS algorithm, cascade algorithm, window algorithm, LDPC algorithm, and the like.
Referring to fig. 2, fig. 2 is a block diagram of an implementation environment of a quantum key distribution method according to an exemplary embodiment of the present application, and as shown in fig. 2, the implementation environment of the quantum key distribution method provided in the present application includes a transmitting device Alice and a receiving device Bob, where Alice first generates a plurality of photons through a single photon communication source, and Alice randomly generates a string of bits; each photon is modulated by Alice by randomly selecting a Z base vector or an X base vector each time, so that a quantum state is obtained; alice sends the quantum state to Bob through a quantum channel; and (3) carrying out quantum computation on each quantum state by using a preset quantum gate by Bob, sending the converted quantum state to Alice, carrying out bit decoding on the converted quantum state by Alice, and matching the decoded quantum state with the original quantum state by using a single photon detector to obtain the initial key.
It will be appreciated that after Alice and Bob demodulate the random numbers, alice and Bob also perform data processing such as error rate estimation, error correction, and confidentiality enhancement on the initial key, so as to obtain the final key.
Referring to fig. 3, fig. 3 is a flow chart of a quantum key distribution method according to an exemplary embodiment of the present application, where the quantum key distribution method provided in the present embodiment is applied to the implementation environment illustrated in fig. 1 or fig. 2, and as shown in fig. 3, the quantum key distribution method provided in the present embodiment includes steps S101 to S104, and the detailed description refers to the following:
Step S101: the transmitting device encodes each first bit in the first random bit sequence by using a corresponding target basis vector to obtain a first quantum state sequence, wherein the first quantum state sequence comprises a plurality of first quantum states, and transmits the first quantum state sequence to the receiving device.
In this embodiment, the transmitting apparatus randomly generates a first random bit sequence, where the first random bit sequence includes a plurality of first bits, and the number of the first bits included in the first random bit sequence is not limited in this embodiment, and may be determined according to an actual application scenario. For example, the number of the cells to be processed, the random bit sequence is {0, 1 ] 1, 0, 1).
In this embodiment, the target base vector corresponds to each first bit in the first random bit sequence one by one, i.e. the corresponding target base vector is selected for each first bit. For example, the target basis vector is a horizontal vertical basis vector or a diagonal basis vector.
In this embodiment, the transmitting device first generates a plurality of optical pulse signals, and the transmitting device includes a pulse laser, and generates a plurality of optical pulse signals by using the pulse laser, where the number of optical pulse signals generated in this embodiment is equal to the number of first bits in the first random bit sequence. The optical pulse signal is then polarized based on each first bit of the first random bit sequence, which is a process of encoding each first bit of the first random bit sequence with the target basis vector, respectively.
Illustratively, each first bit in the first random bit sequence is encoded with two sets of orthogonal bases |0> and |1> (horizontal vertical basis vectors), |++ >, and |- > (diagonal basis vectors) contained in the BB84 protocol. Illustratively, the present embodiment randomly selects the four basis vectors described above for encoding each optical pulse signal with equal probability.
The BB84 protocol selects the basis vectors of the two pairs of directions X and Z for encoding the random bits 0 and 1, and the specific encoding method is shown in fig. 4, and fig. 4 is a schematic diagram of quantum states obtained by encoding the first bit with four basis vectors in BB84 according to the exemplary embodiment of the present application, as shown in fig. 4, when encoding the first bit 0, if the basis vector |1 is selected>Horizontally polarizing the optical pulse signal to obtain a quantum state "→"; if select | +>The optical pulse signal is subjected to pi/4 phase polarization to obtain the encoded quantum state ofWhen encoding the first bit 1, if the base vector |0 is selected>Vertically polarizing the light pulse signal to obtain encoded quantum state ++; if choosing->Then the optical pulse signal is subjected to pi/4 phase polarization to obtain the encoded quantum state of +.>
In this embodiment, a fiber channel is established between the transmitting device and the receiving device, and the transmitting device transmits the encoded first quantum state sequence to the receiving device through the fiber channel between the transmitting device and the receiving device.
Step S102: the receiving device performs unitary transformation on each first quantum state based on the original key sequence to obtain a second quantum state sequence, wherein the second quantum state sequence comprises a plurality of second quantum states, each first quantum state is identical to a basic vector of a corresponding second quantum state, and the second quantum state sequence is sent to the sending device.
For convenience of description, the present embodiment describes step S102 as being divided into the following sub-steps:
step S201: the receiving device generates an original key sequence.
In this embodiment, the receiving device generates an original key sequence after receiving the first quantum state sequence, where the original key sequence includes a plurality of classical bits, and in this embodiment, the number of classical bits included in the original key sequence is equal to the number of first bits in the first random bit sequence. Each classical bit is either 0 or 1. In this embodiment, the original key sequence is an initial key generated by the receiving device, and the subsequent receiving device performs a series of operations on the first quantum state sequence based on the original key sequence, so as to send the information quantum state carrying the original key sequence to the sending device, and further obtain a key sequence negotiated by the two.
Step S202: the receiving device performs unitary transformation on each first quantum state based on the original key sequence to obtain a second quantum state sequence.
Unitary transformation refers to an isometric transformation of unitary space V. For a pair ofThe linear transformation σ satisfying the condition (σ (α), σ (β))= (α, β) is called unitary transformation. For each unitary transformation σ of an n-dimensional unitary space V, there is a standard orthogonal basis for V, such that the matrix for σ with respect to this basis is diagonal and the modulus of the element on the diagonal is 1.
In a practical application scenario, the unitary transformation satisfies the following equation:
U * U=UU * =I,
wherein I is a unit square matrix, a matrix U is called unitary matrix, and U satisfies U conjugate symmetric matrices U such as U inverse matrix and the like *
In this embodiment, a unitary matrix corresponding to unitary transformation for the first quantum state is determined based on classical bits corresponding to the first quantum state in the original key sequence. That is, if the classical bits corresponding to the two first quantum states are different, the unitary matrices used for unitary transformation may be different and may be the same.
Each first quantum state is identical to the basis vector of the corresponding second quantum state. In this embodiment, the basis vector of the quantum state can accurately measure the basis vector of the quantum state, for example, if the quantum state is "→" the basis vector of the quantum state is the Z basis vector, if the quantum state is The basis vector of the quantum state is the X-basis vector.
Illustratively, each first quantum state is the same or orthogonal to the polarization direction of the corresponding second quantum state. For example, if the first quantum state is "→" the second quantum state after unitary transformation may be "→" or "+.. If the first quantum state isThe second quantum state after unitary transformation may also be +>
Step S203: the second quantum state sequence is transmitted to the transmitting device. In this embodiment, the second quantum state sequence carries the original key sequence of the receiving device, and after the sending device obtains the second quantum state sequence, the original key sequence sent by the receiving device may be determined.
In this embodiment, the receiving device does not need to measure the first quantum state in the first quantum state sequence, only needs to perform unitary transformation on each quantum state, and the unitary transformation does not change the basis vector of the first quantum state, so that after the sending device obtains the corresponding second quantum state, the sending device can still measure the second quantum state based on the target basis vector corresponding to the first quantum state, thereby retaining more key generation information and further improving the code rate.
Step S203: and transmitting the obtained second quantum state sequence to a transmitting device.
Because the second quantum state is obtained by unitary transformation of each first quantum state based on the original key sequence, the second quantum state carries the information of the original key sequence, and the receiving device sends the second quantum state to the sending device, so that the sending device identifies the second quantum state to further determine classical bits in the original key sequence.
Step S103: the transmitting device decodes the corresponding second quantum state in the second quantum state sequence by utilizing the target basis vector corresponding to each first quantum state, matches the third quantum state sequence obtained by decoding with the first quantum state sequence, and uses the random bit sequence obtained by matching as the bit data sequence of the construction key.
For convenience of description, the step S103 is split into a plurality of sub-steps to be described:
step S301: the transmitting device decodes a corresponding second quantum state in the sequence of second quantum states using a target basis vector corresponding to each first quantum state.
The present embodiment decodes each second quantum state included in the second quantum state sequence, and the target basis vector corresponding to the second quantum state is the target basis vector corresponding to the first quantum state before unitary transformation.
In this embodiment, the measurement basis vector used for decoding each second quantum state is the target basis vector of the corresponding first quantum state, and since the basis vector of the first quantum state is not changed when unitary transformation is performed on the first quantum state in this embodiment, the second quantum state can be accurately measured through the corresponding target basis vector, and if the polarization directions of the second quantum state and the first quantum state are the same or orthogonal, for example, the target basis vector is the same when decoding the second quantum state, the obtained third quantum state is the same as the second quantum state.
Step S302: and matching the third quantum state sequence obtained by decoding with the first quantum state sequence, and constructing a key based on the bit sequence obtained by matching.
In the present embodiment, the process of matching the third quantum state sequence with the first quantum state sequence is a process in which the transmitting apparatus determines the original key sequence generated by the receiving apparatus.
Illustratively, if the polarization directions of the third quantum state and the first quantum state are determined to be the same, the bit data is determined to be 0, and if the polarization directions of the third quantum state and the first quantum state are determined to be mutually orthogonal, the bit data is determined to be 1.
According to the quantum key distribution method provided by the embodiment, a receiving device does not need to select a measurement basis vector to measure an unknown first quantum state sequence, but performs unitary transformation on each first quantum state based on an original key sequence to obtain a second quantum state sequence, and because each first quantum state is identical to a basis vector of a corresponding second quantum state, when the corresponding second quantum state in the second quantum state sequence is decoded by using a target basis vector corresponding to each first quantum state, the sending device can completely and correctly decode all second quantum states, and all third quantum states obtained by decoding are used for constructing keys, so that the situation that the information of inconsistent parts of basis vectors need to be discarded in the conventional quantum key distribution scheme, and the occurrence of a low code rate of a QKD system is avoided, and the code rate of quantum key distribution is improved.
Referring to fig. 5, in the embodiment shown in fig. 3, step S102 is a flowchart of an exemplary embodiment of step S102, and as shown in fig. 5, step S102 includes steps S401 to S402, and the following is referred to for details:
step S401: a quantum gate is determined for the corresponding first quantum state based on classical bits included in the original key sequence.
In this embodiment, the corresponding quantum gate is selected for the corresponding first quantum state based on classical bits in the original key sequence corresponding to the first quantum state. The classical bit corresponding to the first quantum state is the classical bit in the original key sequence that is located at the same position in the first quantum state sequence as the first quantum state. That is, the classical bit at the first position in the original key sequence corresponds to the first quantum state at the first position in the first quantum state sequence, the classical bit at the second position in the original key sequence corresponds to the first quantum state at the second position in the first quantum state sequence, and so on.
Illustratively, when the classical bit corresponding to the first quantum state in the original key sequence is 0, if the classical bit included in the original key sequence is 0, the quantum gate determined for the corresponding first quantum state is a unitary gate, that is, when the unitary gate is applied to the corresponding first quantum state, a unitary transformation in the form of a unitary matrix is applied to the first quantum state, that is, the original state is maintained; if the classical bit included in the original key sequence is 1, the quantum gate determined for the corresponding first quantum state is
When the quantum gate is applied to the corresponding first quantum state, the polarization direction of the finally obtained second quantum state is orthogonal to the polarization direction of the corresponding first quantum state.
In this embodiment, each first quantum state is a two-dimensional matrix, for example, if the first quantum state is "→" and the corresponding coordinate representation is 1×|1> +0×|0>, the corresponding matrix representation is [1,0], and in this embodiment, the unit gate is a second-order unit matrix, and the matrix representation is:
step S402: and carrying out quantum computation on each first quantum state based on the determined quantum gate to obtain a second quantum state sequence.
In this embodiment, a second quantum state sequence is obtained by multiplying the corresponding first quantum state by each quantum gate.
Exemplary, if the original key sequence is [1,1,0,1,0,0 ]]If the first quantum state sequence is [ "→", "+#,“→”]classical bits of the first position, the second position and the fourth position in the original key sequence are 1, and a first quantum state sequence is determinedThe first quantum state "→" of the first position, the first quantum state "≡of the second position, the first quantum state ≡of the fourth position>All of the quantum gates are
Thus, the quantum gate is multiplied to change the polarization direction of the first quantum state to a direction orthogonal thereto.
And classical bits of the third position, the fifth position and the sixth position in the original key sequence are 0, and a first quantum state of the third position in the first quantum state sequence is determinedFirst quantum state of fifth position +.>The quantum gates of the first quantum state "→" at the sixth position are all unit gates, and thus the unit matrix corresponding to the unit gate is multiplied to the left to maintain the polarization direction of the first quantum state.
Illustratively, the bit data sequence is sequentially subjected to error correction and privacy enhancement processing to obtain a key.
Since the bit sequences determined by the transmitting device and the receiving device through the embodiment may also have a risk of eavesdropping, that is, the transmitting device matches the decoded third quantum state sequence with the first quantum state sequence, the obtained bit sequence may be in an unsafe state, so that the embodiment obtains the secret key by sequentially performing error correction and privacy enhancement processing on the bit data sequence to strengthen the security of the secret key obtained by the embodiment.
Illustratively, the present embodiment corrects the Error of the bit sequence by means of information coordination (Information Reconciliation, IR), which is a way of correcting the Error of the key (EC), so as to ensure the consistency of the key commonly owned by the transmitting device and the receiving device. This is done in the common channel, and since it may be eavesdropped, it is better to ensure that the information about the key itself is published less. The part of the key error caused by channel noise or third party eavesdropping can be deleted, and the key after information coordination is shorter.
Privacy enhancement (Privacy Amplification) is one way to reduce or remove the portion of key information that is intercepted. This key information may be intercepted during key transmission or may be obtained later during information coordination via the common channel. Privacy enhancement uses keys in the hands of the transmitting device and the receiving device to generate a new, shorter key so that an eavesdropper is very little aware of this new key.
In an exemplary embodiment, referring to fig. 6, fig. 6 is a flow chart illustrating a quantum key distribution method according to an exemplary embodiment, and as shown in fig. 6, the quantum key distribution method according to the present embodiment includes steps 1 to 10.
Step 1: alice generates a string of random bit strings.
In this embodiment Alice represents a transmitting device, illustratively a random bit string 0,1,1,1,0,1,0,0,0,1.
Step 2: alice randomly selects either the Z basis vector or the X basis vector each time to modulate.
Alice randomly selects a Z-base vector (horizontal vertical base vector) or an X-base vector (diagonal base vector) to modulate the bits in the random bit string, respectively, to obtain a quantum state corresponding to each bit data, and since the base vectors selected for each bit data are not necessarily the same, the quantum states corresponding to the bit data are not necessarily the same. Illustratively, if the bit string is random [0,1,1,1,0,1,0,0,0,1], the selected basis vectors are [ Z basis vector, X basis vector, Z basis vector, X basis vector ].
Step 3: alice modulates the corresponding quantum state S according to the random number in the step 1 and the basis vector in the step 2, and sends the quantum state S to Bob.
In the present embodiment Bob represents the receiving device, illustratively if a random bit string [0,1,1,1,0,1,0,0,0,1 ]]The modulated quantum state sequence is [ "→",“↑”,“↑”,/>“↑”,/>“→”,/>]。
step 4: bob generates a random bit string K (original key string).
Illustratively, bob produces an original key string of [1,1,0,1,1,0,1,0,1,1].
Step 5: and (3) Bob performs corresponding quantum gate operation according to the quantum state S received in the step (3) and the random number K in the step (4), and sends a result S' to Alice.
Illustratively, the quantum gate operates as: if the classical bit corresponding to the quantum state sequence position in the key string is equal to 0, a unit gate is used to act on the quantum state so as to further maintain the polarization direction of the quantum state, and if the classical bit corresponding to the quantum state sequence position in the key string is equal to 1, a quantum gate is used
Acts on the quantum state so that the quantum state after the acting is orthogonal to the polarization direction of the quantum state.
Step 6: alice measures S' using the same basis vector as in step 2 to obtain a measurement result S ".
In this embodiment, since the polarization direction of the quantum state obtained by quantum calculation on the quantum state sequence is the same as or orthogonal to the polarization direction of the quantum state before calculation, the measurement basis vector of the quantum state is not changed, and thus the measurement result s″ obtained by measuring S' using the same basis vector as in step 2 is the same as the quantum state after quantum calculation on the quantum state sequence.
For example, the quantum state after quantum computation of the quantum state sequence is [ "+%) and,“↑”,“→”,“↑”,/>“↑”,/>]. The measurement result S "is [" ≡ ", too>“↑”,“→”,“↑”,/>“↑”,/>]。
Step 7: alice obtains a random number (original key) from the quantum state S of step 3 and the measurement result S "of step 6.
In this embodiment, if the measurement result s″ in step 6 is the same as the quantum state S, the random number is 0, otherwise, it is 1.
Step 8: alice and Bob perform error rate estimation on the random number.
Step 9: and judging whether the error rate exceeds a threshold value, if not, ending the key distribution flow, and if yes, jumping to the step 10.
Step 10: and performing operations such as error correction, privacy enhancement and the like by Alice and Bob to obtain a finally distributed secret key.
Referring to fig. 7, fig. 7 is a block diagram of a quantum key distribution system shown in an exemplary embodiment of the present application, and as shown in fig. 7, a quantum key distribution system 500 includes an encoding module 501, a transformation module 502, and a matching module 503.
The encoding module 501 is configured to control the transmitting device to encode each first bit in the first random bit sequence by using a corresponding target base vector, so as to obtain a first quantum state sequence, where the first quantum state sequence includes a plurality of first quantum states, and transmit the first quantum state sequence to the receiving device; the transformation module 502 is configured to control the receiving device to perform unitary transformation on each first quantum state based on the original key sequence to obtain a second quantum state sequence, where the second quantum state sequence includes a plurality of second quantum states, each first quantum state is identical to a base vector of a corresponding second quantum state, and send the second quantum state sequence to the sending device; the matching module 503 is configured to control the transmitting device to decode a corresponding second quantum state in the second quantum state sequence by using a target basis vector corresponding to each first quantum state, match a third quantum state sequence obtained by decoding with the first quantum state sequence, and construct a bit data sequence of the key according to a matching result.
In another exemplary embodiment, the transformation module 502 comprises a determination unit and a quantum computation unit, wherein the determination unit is configured to determine a quantum gate for a corresponding first quantum state based on classical bits comprised in the original key sequence; the quantum computing unit is used for carrying out quantum computation on each first quantum state based on the determined quantum gate to obtain a second quantum state sequence.
In another exemplary embodiment, the quantum determining unit includes a first determining subunit and a second determining subunit, where the first determining subunit is configured to determine, for the corresponding first quantum state, that the quantum gate is a unit gate if the classical bit included in the original key sequence is 0; the second determining subunit is configured to determine, for the corresponding first quantum state, that the quantum gate is
It should be noted that, the apparatus provided in the foregoing embodiments and the method provided in the foregoing embodiments belong to the same concept, and the specific manner in which each module and unit perform the operation has been described in detail in the method embodiments, which is not repeated herein.
In another exemplary embodiment, the present application provides an electronic device comprising a processor and a memory, wherein the memory has stored thereon computer readable instructions that when executed by the processor implement a quantum key distribution method as before.
Fig. 8 shows a schematic diagram of a computer system suitable for use in implementing the electronic device of the embodiments of the present application.
It should be noted that, the computer system 1000 of the electronic device shown in fig. 8 is only an example, and should not impose any limitation on the functions and the application scope of the embodiments of the present application.
As shown in fig. 8, the computer system 1000 includes a central processing unit (Central Processing Unit, CPU) 1001 that can perform various appropriate actions and processes, such as performing the information recommendation method in the above-described embodiment, according to a program stored in a Read-Only Memory (ROM) 1002 or a program loaded from a storage section 1008 into a random access Memory (Random Access Memory, RAM) 1003. In the RAM 1003, various programs and data required for system operation are also stored. The CPU 1001, ROM 1002, and RAM 1003 are connected to each other by a bus 1004. An Input/Output (I/O) interface 1005 is also connected to bus 1004.
The following components are connected to the I/O interface 1005: an input section 1006 including a keyboard, a mouse, and the like; an output portion 1007 including a Cathode Ray Tube (CRT), a liquid crystal display (Liquid Crystal Display, LCD), and a speaker; a storage portion 1008 including a hard disk or the like; and a communication section 1009 including a network interface card such as a LAN (Local Area Network ) card, a modem, or the like. The communication section 1009 performs communication processing via a network such as the internet. The drive 1010 is also connected to the I/O interface 1005 as needed. A removable medium 1011, such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like, is installed as needed in the drive 1010, so that a computer program read out therefrom is installed as needed in the storage section 1008.
In particular, according to embodiments of the present application, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present application include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising a computer program for performing the method shown in the flowchart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication portion 1009, and/or installed from the removable medium 1011. When executed by a Central Processing Unit (CPU) 1001, the computer program performs various functions defined in the system of the present application.
It should be noted that, the computer readable medium shown in the embodiments of the present application may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-Only Memory (ROM), an erasable programmable read-Only Memory (Erasable Programmable Read Only Memory, EPROM), flash Memory, an optical fiber, a portable compact disc read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present application, however, a computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with a computer-readable computer program embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. A computer program embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. Where each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units involved in the embodiments of the present application may be implemented by means of software, or may be implemented by means of hardware, and the described units may also be provided in a processor. Wherein the names of the units do not constitute a limitation of the units themselves in some cases.
Another aspect of the present application also provides a computer-readable storage medium having stored thereon computer-readable instructions which, when executed by a processor, implement the quantum key distribution method of any of the previous embodiments.
Another aspect of the present application also provides a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device performs the quantum key distribution method provided in the above-described respective embodiments.
It should be noted that, the computer readable medium shown in the embodiments of the present application may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium may be, for example, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination thereof. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-Only Memory (ROM), an erasable programmable read-Only Memory (Erasable Programmable Read Only Memory, EPROM), flash Memory, an optical fiber, a portable compact disc read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present application, however, a computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with a computer-readable computer program embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. A computer program embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. Where each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units involved in the embodiments of the present application may be implemented by means of software, or may be implemented by means of hardware, and the described units may also be provided in a processor. Wherein the names of the units do not constitute a limitation of the units themselves in some cases.
The foregoing is merely a preferred exemplary embodiment of the present application and is not intended to limit the embodiments of the present application, and those skilled in the art may make various changes and modifications according to the main concept and spirit of the present application, so that the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A quantum key distribution method, comprising:
the method comprises the steps that a sending device encodes each first bit in a first random bit sequence by using a corresponding target basic vector to obtain a first quantum state sequence, wherein the first quantum state sequence comprises a plurality of first quantum states, and the first quantum state sequence is sent to a receiving device;
the receiving device performs unitary transformation on each first quantum state based on the original key sequence to obtain a second quantum state sequence, wherein the second quantum state sequence comprises a plurality of second quantum states, each first quantum state is identical with a basic vector of a corresponding second quantum state, and the second quantum state sequence is sent to the sending device;
the transmitting device decodes the corresponding second quantum state in the second quantum state sequence by utilizing the target basis vector corresponding to each first quantum state, matches the third quantum state sequence obtained by decoding with the first quantum state sequence, and constructs a key based on the bit sequence obtained by matching.
2. The method of claim 1, wherein each first quantum state is the same as or orthogonal to the polarization direction of the corresponding second quantum state.
3. The method of claim 1, wherein unitary transforming each first quantum state based on the original key sequence comprises:
determining a quantum gate for a corresponding first quantum state based on classical bits included in the original key sequence;
and carrying out quantum computation on each first quantum state based on the determined quantum gate to obtain the second quantum state sequence.
4. A method according to claim 3, wherein quantum computing each first quantum state based on the determined quantum gate to obtain the sequence of second quantum states comprises:
and multiplying the corresponding first quantum state by each quantum gate to obtain the second quantum state sequence.
5. A method according to claim 3, wherein said determining a quantum gate for a corresponding first quantum state based on classical bits included in the original key sequence comprises:
if classical bits included in the original key sequence are 0, quantum gates determined for the corresponding first quantum states are unit gates;
If the classical bit included in the original key sequence is 1, the quantum gate determined for the corresponding first quantum state is:
6. the method of claim 1, wherein matching the decoded third sequence of quantum states to the first sequence of quantum states comprises:
and if the polarization directions of the third quantum state in the third quantum state sequence and the corresponding first quantum state in the first quantum state sequence are determined to be the same, determining that the corresponding bit data is 0, and if the polarization directions of the third quantum state in the third quantum state sequence and the corresponding first quantum state in the first quantum state sequence are determined to be mutually orthogonal, determining that the corresponding bit data is 1.
7. The method of claim 1, wherein constructing a key based on the matched bit sequence comprises:
and carrying out error correction and privacy enhancement processing on the bit sequence in sequence to obtain the secret key.
8. A quantum key distribution apparatus, comprising:
the encoding module is used for controlling the transmitting device to encode each first bit in the first random bit sequence by utilizing a corresponding target basic vector to obtain a first quantum state sequence, wherein the first quantum state sequence comprises a plurality of first quantum states, and the first quantum state sequence is transmitted to the receiving device;
The transformation module is used for controlling the receiving device to perform unitary transformation on each first quantum state based on the original key sequence to obtain a second quantum state sequence, wherein the second quantum state sequence comprises a plurality of second quantum states, each first quantum state is identical with a basic vector of a corresponding second quantum state, and the second quantum state sequence is sent to the sending device;
and the matching module is used for controlling the sending device to decode the corresponding second quantum state in the second quantum state sequence by utilizing the target basis vector corresponding to each first quantum state, matching the third quantum state sequence obtained by decoding with the first quantum state sequence, and constructing a bit data sequence of the key according to a matching result.
9. An electronic device, comprising:
a memory storing computer readable instructions;
a processor reading computer readable instructions stored in a memory to perform the method of any one of claims 1-7.
10. A computer readable storage medium having stored thereon computer readable instructions which, when executed by a processor of a computer, cause the computer to perform the method of any of claims 1-7.
CN202210791282.6A 2022-07-04 2022-07-04 Quantum key distribution method, quantum key distribution device, electronic equipment and storage medium Pending CN117394990A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202210791282.6A CN117394990A (en) 2022-07-04 2022-07-04 Quantum key distribution method, quantum key distribution device, electronic equipment and storage medium
PCT/CN2022/141145 WO2024007547A1 (en) 2022-07-04 2022-12-22 Quantum key distribution method and apparatus, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210791282.6A CN117394990A (en) 2022-07-04 2022-07-04 Quantum key distribution method, quantum key distribution device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117394990A true CN117394990A (en) 2024-01-12

Family

ID=89437886

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210791282.6A Pending CN117394990A (en) 2022-07-04 2022-07-04 Quantum key distribution method, quantum key distribution device, electronic equipment and storage medium

Country Status (2)

Country Link
CN (1) CN117394990A (en)
WO (1) WO2024007547A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117675029B (en) * 2024-01-31 2024-04-19 北京中科国光量子科技有限公司 Uninterrupted polarization compensation method for optical communication and quantum key distribution

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB201402275D0 (en) * 2014-02-10 2014-03-26 Univ Tartu Verification system and method
CN109495238A (en) * 2018-10-12 2019-03-19 北京邮电大学 It is a kind of based on EPR to tangling and the quantum key distribution method of dense coding

Also Published As

Publication number Publication date
WO2024007547A1 (en) 2024-01-11

Similar Documents

Publication Publication Date Title
Fung et al. Practical issues in quantum-key-distribution postprocessing
US8639927B2 (en) Method of user-authenticated quantum key distribution
JP4862159B2 (en) Quantum key distribution method, communication system, and communication apparatus
Inamori et al. Unconditional security of practical quantum key distribution
CN113038468B (en) Method for distributing and negotiating quantum key of wireless terminal of Internet of things
JP2019213239A (en) Method, apparatus and system for quantum key distribution, privacy amplification, and data transmission
EP1715615B1 (en) Quantum key delivering method and communication device
CN113141252B (en) Quantum key distribution method, quantum communication method, device and system
JP2004274459A (en) Method for delivering quantum key and communication apparatus
US20230299947A1 (en) Computer implemented system and method for sharing a common secret
US9002000B2 (en) Method for conversion of a first encryption into a second encryption
CN114244507A (en) Quantum direct communication method, device, equipment and system based on single-path transmission
WO2024007547A1 (en) Quantum key distribution method and apparatus, electronic device and storage medium
CN114268432B (en) Device-independent quantum secure direct communication method based on single photon source
Wang et al. Analysis of two countermeasures against the signal leakage attack
Gilbert et al. Secrecy, computational loads and rates in practical quantum cryptography
US7606367B2 (en) Quantum cryptography with fewer random numbers
JP2004179889A (en) Quantum key delivery method and communication device
Van Assche et al. Secure coherent-state quantum key distribution protocols with efficient reconciliation
CN114157418B (en) Trusted data uplink device and method based on quantum network
US11595200B2 (en) Quantum key distribution system and method for securely distributing quantum keys in a network
KR100822933B1 (en) Quantum key delivering method and communication device
US20230370494A1 (en) Quantum secure direct communication with mutual authentication via rotation of an arbitrary basis
Islam Quantum Encryption with Certified Deletion
Chen Homomorphic Encryption Based on Post-Quantum Cryptography

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination