Two-Party Quantum Key Agreement Protocol Based on Four-Particle GHz State
A quantum key agreement and four-particle technology, which is applied in the field of two-party quantum key agreement agreement, can solve the problems of inability to resist Trojan horse attacks and delayed photon Trojan horse attacks, and low qubit efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] 1. Preliminary knowledge
[0036] First, introduce four unitary transformations U 00 ,U 01 ,U 10 and U 11 , namely U 00 =I=|0>01 =X=|0>10 =Z=|0>11 =iY=|0>,|1>} forms the Z base, and {|+>,|->} forms the X base, where, The four Bell states are defined as follows:
[0037]
[0038]
[0039] They form a set of completely orthonormal basis of the four-dimensional Hilbert space. When a unitary transformation When executing on the first particle of a Bell state, the Bell state will be transformed into another Bell state. The relationship between the four Bell states and the four unitary transformations is as follows:
[0040]
[0041] In the protocol of the present invention, the following four four-particle GHZ states are used as quantum information sources, namely
[0042]
[0043]
[0044]
[0045]
[0046] When we use particle b as the control qubit, and particles c and d as the target qubits, and perform two CNOT operations on the GHZ state...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com