Controlled bi-directional quantum secure direct communication protocol free of information leakage

A technology of secure direct communication and information leakage, which is applied in the field of quantum security communication and can solve problems such as information leakage

Active Publication Date: 2013-09-11
浙江海宁经编产业园区开发有限公司
View PDF5 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It should be pointed out that Chen’s protocol [18] and Yang’s protocol [19] also have the problem of information leakage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Controlled bi-directional quantum secure direct communication protocol free of information leakage
  • Controlled bi-directional quantum secure direct communication protocol free of information leakage
  • Controlled bi-directional quantum secure direct communication protocol free of information leakage

Examples

Experimental program
Comparison scheme
Effect test

preparation example Construction

[0058] S1) Preparation of the initial state: Alice prepares 3N pieces in |Φ + >'s Bell state and divide it into N groups, so that each group has 3 in |Φ + > Bell state (i.e. with ). Moreover, she divided these particles into 6 particle sequences, namely S A 2 = { P 1 ( A 2 ) , P 2 ( A 2 ) , · · · , P N ( A 2 ) } , S B 1 = { P 1 ( ...

Embodiment

[0070] 1. Application example of controlled two-way QSDC protocol

[0071] An example is used to further explain the controlled two-way QSDC protocol of the present invention. Assuming that Alice has 2-bit secret information 11, and Bob has 2-bit secret information 10, take the first particle pair as an example to illustrate the dialogue process. Alice, Bob, and Charlie all use the Bell basis to measure (P 1 (A 1 ), P 1 (A 2 )), (P 1 (B 1 ), P 1 (B 2 )) and (P 1 (C 1 ), P 1 (C 2 )), then after entanglement exchange, (P 1 (A 1 ), P 1 (A 2 )), (P 1 (B 1 ), P 1 (B 2 )) and (P 1 (C 1 ), P 1 (C 2 )) will all start with The probability of collapses to or Without loss of generality, assume that after entanglement exchange (P 1 (A 1 ), P 1 (A 2 )), (P 1 (B 1 ), P 1 (B 2 )) and (P 1 (C 1 ), P 1 (C 2 )) collapses to Alice then Apply unitary operation σ z to encode its own 2-bit secret message, such that it turns...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Bi-directional quantum secure direct communication aims at enabling two legal communication parties to exchange secret information of each other simultaneously. The invention provides a controlled bi-directional quantum secure direct communication protocol free of information leakage. In the protocol, two legal communication parties Alice and Bob are controlled by a controller Charlie to achieve exchange of the secret information of each other without information leakage. The protocol utilizes measuring relevancy after entanglement swapping of 3 Bell states to solve an information leakage problem. In addition, the protocol only uses the Bell states as quantum resources, only Bell measuring is required to be conducted, and the controlled bi-directional quantum secure direct communication protocol is convenient to achieve.

Description

technical field [0001] The invention relates to the field of quantum security communication. The invention designs a controlled two-way quantum safe direct communication protocol without information leakage, overcomes the problem of information leakage by using the measurement correlation after entanglement exchange of three Bell states, and improves the security of the existing two-way quantum safe direct communication protocol. Background technique [0002] Quantum Key Distribution (Quantum Key Distribution, QKD) uses the transmission of quantum signals to establish a shared key between two long-distance legitimate users. Since the well-known BB84 protocol was proposed [1], many different QKD protocols have appeared [2-4]. Since then, the new concept of Quantum Secure Direct Communication (QSDC) has also been proposed. Unlike QKD, QSDC allows secret information to be communicated directly without prior establishment of a key for encryption. Since Beige et al. [5] propos...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
Inventor 叶天语
Owner 浙江海宁经编产业园区开发有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products