Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!
Quantum Key Agreement Protocol Based on GHz State
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A quantum key agreement and secret key technology, which is applied in the field of quantum key agreement agreement based on GHZ state, can solve the problems of low qubit efficiency, inability to resist Trojan horse attacks and delayed photon Trojan horse attacks, etc.
Active Publication Date: 2018-06-12
XIAN UNIV OF POSTS & TELECOMM
View PDF2 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
The disadvantage of this protocol is: since the protocol is a Ping-Pong protocol, that is, the same particle is transmitted back and forth in the quantum channel, the protocol cannot resist the invisible photon eavesdropping (IPE) Trojan attack and delayed photon Trojan attack
The disadvantage of this protocol is: the qubit efficiency of this protocol is too low, its qubit efficiency is only 10%
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0027] 1. Preliminary knowledge
[0028]
[0029] The four Bell states are defined as follows:
[0030]
[0031]
[0032] They form a set of completely orthonormal basis of the four-dimensional Hilbert space. When a unitary transformation When executed on the second particle of a Bell state, the Bell state will transform into another Bell state. The relationship between the four Bell states and the four unitary transformations is shown in the table below:
[0033] Table 1
[0034]
[0035] The GHZ state is a maximally entangled state of three particles, which form a set of completely orthogonal basis of the eight-dimensional Hilbert space. In the present invention, the following GHZ state is used as the quantum information source, namely
[0036]
[0037] According to the expression, if for the GHZ state |η> 123 Bell measurements are performed on particles 1 and 2 of , and an X-basis measurement is performed on particle 3, then the system collapses to the s...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a quantum key agreement protocol based on GHZ state, comprising the following steps that: step 1, Alice and Bob randomly generate respective classical keys; step 2, Alice prepares the GHZ state and divides all particles into sequences, inserts decoy photons into one of the sequences and then transmits the sequence to Bob; step 3, Bob measures the decoy photons, Alice calculates an error rate, if the error rate is low, a step 4 is executed, otherwise, the step 2 is executed again; step 4, Alice and Bob respectively perform measurement and obtain the measurement result of each other; step 5, Alice executes unitary transformation and obtains a new sequence, and Alice transits the sequence with the inserted decoy photons to Bob; step 6, Bob measures the decoy photons, and Alice calculates the error rate, if the error rate is low, a step 7 is executed, and otherwise, the step 2 is executed again; step 7, Alice calculates a shared key of both sides; step 8, Bob generates the shared key. The quantum key agreement protocol based on GHZ state can resist participant attack, outside attack and Trojan horse attack. The quantum key agreement protocol based on GHZ state is safe in both a noiseless quantum channel and a quantum noisy channel. Moreover, quantum bit efficiency of the quantum key agreement protocol based on GHZ state is higher than the existing protocols.
Description
technical field [0001] The invention belongs to the field of quantum communication, in particular to a quantum key agreement (Quantum key agreement) protocol, in particular to a GHZ state-based quantum key agreement protocol. Background technique [0002] Quantum cryptography is a new technology for communication and network security, and its security is guaranteed by the basic principles of quantum mechanics. Unlike traditional cryptography, which is mostly computationally secure, quantum cryptography can achieve unconditional security, which has attracted a lot of attention. The quantum key agreement (QKA) protocol is a new important branch of quantum cryptography, which allows participants to negotiate a classical shared secret key through an open quantum channel, and the contribution of each participant is the same, any participant None or a subset of participants can independently determine the shared secret. Using the shared secret key established by the Quantum Key ...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.