Two-Party Quantum Key Agreement Protocol Based on Four-Particle GHz State

A quantum key agreement and four-particle technology, which is applied in the field of two-party quantum key agreement agreement, can solve the problems of inability to resist Trojan horse attacks and delayed photon Trojan horse attacks, and low qubit efficiency

Active Publication Date: 2018-04-03
XIAN UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this protocol is: since the protocol is a Ping-Pong protocol, that is, the same particle is transmitted back and forth in the quantum channel, the protocol cannot resist the invisible photon eavesdropping (IPE) Trojan attack and delay photon Trojan attack
The disadvantage of this protocol is: the qubit efficiency of this protocol is too low, its qubit efficiency is only 10%

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-Party Quantum Key Agreement Protocol Based on Four-Particle GHz State
  • Two-Party Quantum Key Agreement Protocol Based on Four-Particle GHz State
  • Two-Party Quantum Key Agreement Protocol Based on Four-Particle GHz State

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] 1. Preliminary knowledge

[0036] First, introduce four unitary transformations U 00 ,U 01 ,U 10 and U 11 , namely U 00 =I=|0>01 =X=|0>10 =Z=|0>11 =iY=|0>,|1>} forms the Z base, and {|+>,|->} forms the X base, where, The four Bell states are defined as follows:

[0037]

[0038]

[0039] They form a set of completely orthonormal basis of the four-dimensional Hilbert space. When a unitary transformation When executing on the first particle of a Bell state, the Bell state will be transformed into another Bell state. The relationship between the four Bell states and the four unitary transformations is as follows:

[0040]

[0041] In the protocol of the present invention, the following four four-particle GHZ states are used as quantum information sources, namely

[0042]

[0043]

[0044]

[0045]

[0046] When we use particle b as the control qubit, and particles c and d as the target qubits, and perform two CNOT operations on the GHZ state...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a two-party quantum key agreement protocol based on the four-particle GHZ state: Step 1: Alice and Bob randomly generate their own classical keys and negotiate functions; Step 2: Alice selects n four-particle GHZs and divides them Sequence, randomly insert decoy photons into three sequences and send them to Bob; Step 3: Bob measures the decoy photons; Alice calculates the error rate; Step 4: Alice performs two CNOT operations on every three corresponding particles with the same serial number in the sequence; Step 5 : Alice performs unitary transformation to obtain a new sequence, selects the decoy photon insertion sequence and sends it to Bob; Step 6: Bob measures the decoy photon; Alice compares the measurement results to calculate the error rate; if the error rate is low, go to step 7; otherwise, return to step 2; 7: Alice generates a shared key; Step 8: Bob generates a shared key. The present invention can resist existing participant attacks and external attacks. At the same time, qubit efficiency is much higher than existing protocols.

Description

technical field [0001] The invention belongs to the field of quantum communication, and in particular relates to a quantum key agreement (Quantum key agreement) protocol, in particular to a two-party quantum key agreement agreement based on a four-particle GHZ state. Background technique [0002] Quantum cryptography is a new technology for communication and network security, and its security is guaranteed by the basic principles of quantum mechanics. Unlike traditional cryptography, which is mostly computationally secure, quantum cryptography can achieve unconditional security, which has attracted a lot of attention. The quantum key agreement (QKA) protocol is a new important branch of quantum cryptography, which allows participants to negotiate a classical shared secret key through an open quantum channel, and the contribution of each participant is the same, any participant None or a subset of participants can independently determine the shared secret. Using the shared ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
Inventor 何业锋
Owner XIAN UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products