Quantum secrecy transmission method and device

A quantum encryption and key technology, applied in the security field, can solve the problem of low security of session key

Active Publication Date: 2014-10-15
HUAWEI TECH CO LTD +1
View PDF2 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] During the transmission of the above session key, it may be intercepted by an eavesdropper. Once the eavesdropper knows the Bell state of one of the EPR entangled pairs, he also knows

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum secrecy transmission method and device
  • Quantum secrecy transmission method and device
  • Quantum secrecy transmission method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0085] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0086] The method and device for quantum secure transmission provided by the embodiments of the present invention will be described in detail below with reference to the accompanying drawings. The device performing the method may be a quantum computer, which can process qubits. Compared with the "0" and "1" bits in traditional computers, qubits can store more information, so the performance of quantum computers will greatly exceed that of traditional computers. Of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a quantum secrecy transmission method and device, relates to the technical field of security, and is used for reducing effective decoding probability of interception information intercepted by eavesdroppers in the process of quantum secrecy transmission. The method comprises the steps that a sender and a receiver share a string of EPR entanglement pairs and state information of each EPR entanglement pair; each EPR entanglement pair is randomly in any one of two different types of Bell states or any one of at least three types of Bell states; a quantum state secrecy object is generated; the quantum state secrecy object comprises multiple secrecy bits; the secrecy bits are encrypted by utilizing first secret key particles so that the secrecy object after encryption is obtained; the secrecy object after encryption is sent to the receiver so that the secrecy object after encryption is decrypted and measured by the receiver by utilizing second secret key particles according to the Bell state of the EPR entanglement pairs so that a classic state decryption object is obtained; and the classic state decryption object comprises multiple decryption bits.

Description

technical field [0001] The invention relates to the field of security technology, in particular to a quantum secret transmission method and device. Background technique [0002] Cryptography techniques can be roughly divided into two categories: one is traditional mathematics-based cryptography, such as symmetric cryptography, asymmetric cryptography, etc.; the other is non-mathematical cryptography, such as quantum cryptography, DNA cryptography, etc. Quantum cryptography uses a single quantum state as the carrier of information, and different quantum states represent different information, which is then sent to the receiver using the communication network. Common expressions of quantum states are |0>, |1>, etc. Different quantum states represent different codes, for example, |0> can represent 0, and |1> can represent 1. [0003] Based on the quantum cryptography technology, a scheme for encrypting a session key is provided in the prior art. Specifically incl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
Inventor 郑世慧常利伟郑强
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products