Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for determining secure quantum communication and identity authentication protocol based on extended W-GHZ state and quantum one-time pad

A GHZ-W, quantum communication technology, applied to key distribution, can solve problems such as low efficiency of wiretapping detection, wiretapping of confidential information, damage to communication process, etc., and achieve the effect of improving the efficiency of wiretapping detection

Inactive Publication Date: 2016-01-06
BEIJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, there are always security problems in the field of quantum security communication, such as eavesdropping, denial of service attacks, man-in-the-middle attacks and other attacks. These attacks will cause confidential information to be eavesdropped or cannot be accurately transmitted to the receiver, especially through "entanglement" Eavesdropping on confidential information can cause great disruption to the communication process
In the field of quantum security communication, the eavesdropping detection efficiency of existing communication protocols is not very high. For example, in 2003, Deng Fuguo and others proposed a two-step quantum direct communication based on EPR pairs based on quantum direct communication and quantum ultra-dense coding. protocol [1] , the detection efficiency can only reach 50%, which is far from meeting the requirements of secure communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for determining secure quantum communication and identity authentication protocol based on extended W-GHZ state and quantum one-time pad
  • Method for determining secure quantum communication and identity authentication protocol based on extended W-GHZ state and quantum one-time pad
  • Method for determining secure quantum communication and identity authentication protocol based on extended W-GHZ state and quantum one-time pad

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] 1. The communication protocol process between the receiver and the sender is as follows:

[0025] The Bell state mentioned in the article is

[0026]

[0027] GHZ-W state is

[0028] | Ψ > 1234 = 1 3 ( | 0000 > + | 1100 > + | 1111 > ) 1234

[0029] The receiver Bob and the sender Alice are legal communication parties, and Eve is an eavesdropper. The communication process of the whole program is as follows:

[0030] Step 1: The receiver Bob prepares N Bell states for message transmission, and extracts the first particle from each Bell state to form the transmission sequence S in sequence A , the remaining part...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for determining a secure quantum communication and identity authentication protocol based on an extended W-GHZ state and a quantum one-time pad. In the field of secure quantum communication, the security detection efficiency of existing communication protocols is not very efficient. In order to improve the eavesdropping detection efficiency in the secure quantum communication, particles in the extended W-GHZ state are used as detection particles to be inserted in particle stream of the secure quantum communication according to an identity character string ID to carry out eavesdropping detection. A secret message is transmitted in a block transmission manner. After receiving a particle sequence, a receiver extracts corresponding detection particles, measures corresponding states, checks whether the detection particles are in original states and analyzes the security. A relation of a detected probability of an eavesdropper after eavesdropping and eavesdropped information quantity is quantitatively analyzed, which proves the superiority of the eavesdropping detection method in the invention. By means of the security analysis, the eavesdropping detection efficiency of the method can reach 81%, and thus the high security requirements of the secure quantum communication can be better satisfied.

Description

technical field [0001] The invention relates to an eavesdropping detection method in quantum security communication, which adopts an extended GHZ-W state as a detection particle, combines identity authentication and one-time pad, and can increase the eavesdropping detection efficiency to 81%. Background technique [0002] At present, there are always security problems in the field of quantum security communication, such as eavesdropping, denial of service attacks, man-in-the-middle attacks and other attacks. These attacks will cause confidential information to be eavesdropped or cannot be accurately transmitted to the receiver, especially through "entanglement" Eavesdropping on confidential information will cause great damage to the communication process. In the field of quantum security communication, the eavesdropping detection efficiency of existing communication protocols is not very high. For example, in 2003, Deng Fuguo and others proposed a two-step quantum direct com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
Inventor 王涛李娜李剑
Owner BEIJING UNIV OF POSTS & TELECOMM