Quantum dialogue protocol with collective-dephasing noise resisting authentication based on logic Bell states

A technology of phase noise and quantum dialogue, applied in user identity/authority verification, electrical components, transmission systems, etc.

Active Publication Date: 2015-03-25
CHONGQING JINLONG TECH
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Another disadvantage of the protocol of Lin et al. [41] is that it only works in ideal channel
It is necessary

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum dialogue protocol with collective-dephasing noise resisting authentication based on logic Bell states
  • Quantum dialogue protocol with collective-dephasing noise resisting authentication based on logic Bell states
  • Quantum dialogue protocol with collective-dephasing noise resisting authentication based on logic Bell states

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0114] 1. Application example of AQD protocol

[0115] Suppose (i 1 , j 1 ) and (t 1 , l 1 ) are (0, 1) and (1, 0) respectively. Moreover, suppose (A' 1 , B' 1 ) is prepared at Apply Ω to Alice and Bob respectively 01 and Ω 10 After encoding, (A' 1 , B' 1 ) is transformed into Bob can then easily read (i 1 , j 1 ) is (0, 1). After Bob sends him to After sending the measurement results of , Alice can easily deduce that (t 1 , l 1 ) is (1, 0). After decoding m' A ||h(m A )', Bob calculates h(m' A ) and h(m′ A ) and h(m A )' to authenticate Alice's m A . Similarly, after decoding m' B ||h(m B )', Alice calculates h(m' B ) and h(m′ B ) and h(m B )' to authenticate Bob's m B .

[0116] 2. Discussion

[0117] The information leakage problem means that anyone else can extract some classic information from public announcements without any active attack. Since every two adjacent information logic Bell states (A 2n-1 , B 2n-1 ) and (A 2n , B 2n ) ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a quantum dialogue protocol with collective-dephasing noise resisting authentication based on logic Bell states. Through the protocol, mutual identity authentication and dialogue can be simultaneously achieved securely between two participators on a collective-dephasing noise channel, wherein information transmitted through a classical channel can be intercepted and modified. A secret key used for selecting a sample logic qubit measurement base is shared by the two participators secretly in advance. Bell state measurement, instead of four-qubit joint measurement, is adopted for decoding. The two participators share the initial state of the information logic Bell state by the aid of direct transmission of the auxiliary logic Bell state. In this way, information leakage is avoided. Acting attacks from Eve, man-in-the-middle attacks and modification attacks can all be detected, and besides Trojan attacks can be avoided naturally.

Description

technical field [0001] The invention relates to the field of quantum security communication. The invention designs a logical Bell state-based anti-collective dephasing noise authentication quantum dialogue protocol, and achieves the purpose of safely simultaneously realizing mutual identity authentication and dialogue between two participants on a collective dephasing noise channel. Background technique [0002] In order to realize the direct transmission of secret information between two participants through quantum signals, Long and Liu[1] proposed the first Quantum Secure Direct Communication (Quantum Secure Direct Communication, QSDC) protocol in 2002 (subsequently known as State-encoded two-step protocol). This protocol invented the idea of ​​quantum data block transmission. Since then, many good QSDC protocols have been constructed [2-11]. [0003] In order to realize two-way communication of secret information between two participants through quantum signals, Nguye...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 叶天语
Owner CHONGQING JINLONG TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products