Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantum Secure Dialogue Method Based on Quantum Encryption

A technology of quantum encryption and quantum dialogue, applied in secure communication devices, digital transmission systems, electrical components, etc., can solve problems such as information leakage, and achieve the effect of avoiding information leakage problems

Active Publication Date: 2017-02-15
浙江康奥思信息技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0051] The purpose of this invention is to design a quantum security dialogue protocol based on quantum encryption, introduce the idea of ​​quantum encryption into the field of quantum dialogue, and propose to use quantum encryption sharing to secretly share the initial quantum state between communicators to solve the problem of information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum Secure Dialogue Method Based on Quantum Encryption
  • Quantum Secure Dialogue Method Based on Quantum Encryption
  • Quantum Secure Dialogue Method Based on Quantum Encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0086] 1. Application example of quantum dialogue protocol

[0087] Suppose the first bits of Alice's and Bob's secret messages are 0 and 1, respectively. In other words, r 1 = 0 and k 1 =1. Moreover, suppose Alice prepares the first transmitted photon P 1 At |0>. That is to say, m 1 =0. Alice prepares the quantum private key And share it with Bob. Alice then uses photon A via the CNOT operation 1 to encrypt P 1 . Bob also uses another photon B via the CNOT operation 1 to decrypt P 1 . Bob then measures P with the Z basis 1 , so he can know P 1 initial state. According to his measurement result, Bob recreates a new photon in the same state as the measurement result, denoted as P′ 1 . Then, this new P′ 1 Will evolve along the following path:

[0088]

[0089] Based on three known pieces of information: the announced measurements Initial state of preparation and her unitary operation I, Alice is able to read k 1 is 1. Similarly, according to the ann...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

To solve the information leakage problem is a research focus of a quantum dialogue. To solve the information leakage problem, a quantum encryption thought is first introduced to the field of quantum dialogues, and a novel method for privately sharing an initial quantum state between correspondents is provided, namely quantum encryption sharing is provided. The quantum encryption sharing is utilized to provide a quantum secure dialogue protocol based on quantum encryption. According to the protocol, an EPR serves as a quantum private key to encrypt and decode transmission photons, and the private key can be reused after rotating operation. Public announcement of the initial quantum state can be omitted due to the quantum encryption sharing, and accordingly the information leakage problem is solved. Information theory efficiency of the protocol is nearly 100% and is higher than that of a previous information leakage resisting quantum dialogue protocol. In addition, only single photon measurement is needed by the protocol, nearly only single photons are utilized to serve as quantum resources, and accordingly the protocol is easy to execute in practice.

Description

technical field [0001] The invention relates to the field of quantum security communication. The present invention designs a quantum security dialogue protocol based on quantum encryption, introduces the idea of ​​quantum encryption into the field of quantum dialogue for the first time, and proposes to use quantum encryption sharing to secretly share the initial quantum state between communicators to solve the problem of information leakage. Background technique [0002] Quantum cryptography based on the properties of quantum mechanics has become an interesting branch of quantum information processing. So far, quantum cryptography has received great attention from scholars so that many good quantum cryptography protocols have been designed from different perspectives, including quantum key distribution (Quantum Key Distribution, QKD) [1-3], quantum secret sharing (Quantum Secret Sharing, QSS) [4-6], Quantum Secure Direct Communication (Quantum Secure Direct Communication, Q...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
Inventor 叶天语
Owner 浙江康奥思信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products