Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Two-Party Quantum Key Agreement Protocol Based on Four-Particle χ State

A quantum key agreement and four-particle technology, applied in the field of two-party quantum key agreement agreement, can solve the problems of low qubit efficiency, inability to resist Trojan horse attacks and delayed photon Trojan horse attacks, etc., and achieve the effect of high qubit efficiency

Active Publication Date: 2018-04-03
XIAN UNIV OF POSTS & TELECOMM
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this protocol is: since the protocol is a Ping-Pong protocol, that is, the same particle is transmitted back and forth in the quantum channel, the protocol cannot resist the invisible photon eavesdropping (IPE) Trojan attack and delayed photon Trojan attack
The disadvantage of this protocol is: the qubit efficiency of this protocol is too low, its qubit efficiency is only 10%

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-Party Quantum Key Agreement Protocol Based on Four-Particle χ State
  • Two-Party Quantum Key Agreement Protocol Based on Four-Particle χ State
  • Two-Party Quantum Key Agreement Protocol Based on Four-Particle χ State

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] 1. Preliminary knowledge

[0024] As we all know, {|0>,|1>} forms the Z basis, and {|+>,|->} forms the X basis, where The four Bell states are defined as follows:

[0025]

[0026]

[0027] They form a set of completely orthogonal basis of four-dimensional Hilbert space, namely Bell basis. The χ state is the maximum entangled state of four particles, and they can form a set of completely orthogonal basis of 16-dimensional Hilbert space. In the protocol of the present invention, we use the following χ state as the quantum information source, namely

[0028]

[0029] According to the expression, if for the χ state |χ 00 > ABCD Bell measurements are performed on particles A and B, and on particles C and D basis measurement, the system collapses to the state |φ with probability 1 / 4 + > AB |00> CD ,|ψ - > AB |01> CD ,|ψ + > AB |10>CD and |φ - > AB |11> CD .

[0030] 2. The two-party quantum key agreement protocol based on the four-particle χ sta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a four-particle x state-based two-party quantum key agreement protocol. The protocol includes following steps that: step 1, Alice and Bob negotiate on quantum-state codes; step 2, Alice prepares n x-state|x<00>>ABCD, and divides all the particles into four ordered sequences, and selects out 2m decoy photons and inserts the decoy photons into the sequences and transmits the sequences to Bob; step 3, Bob measures corresponding decoy photons with a correct measurement base, and informs Alice of measurement results; Alice compares the measurement results and the initial states of the decoy photons, and calculates an error rate, and executes step 4 if the error rate is low, otherwise, executes step 2; and step 4, Alice performs Bell measurement on the particles, Bob executes Z convolution Z-base measurement on the sequences, and Alice and Bob both obtain a shared key. The protocol of the invention can resist existing participant attacks, external attacks and Troy Trojan horse attacks; and the protocol is safe in a noise-free quantum channel and a quantum noise channel. The quantum bit efficiency of the protocol of the invention is higher than that of an existing secure multi-particle entangled state-based quantum key agreement protocol.

Description

technical field [0001] The invention belongs to the field of quantum communication, and in particular relates to a quantum key agreement (Quantum key agreement) protocol, in particular to a two-party quantum key agreement agreement based on a four-particle χ state. Background technique [0002] Quantum cryptography is a new technology for communication and network security, and its security is guaranteed by the basic principles of quantum mechanics. Unlike traditional cryptography, which is mostly computationally secure, quantum cryptography can achieve unconditional security, which has attracted a lot of attention. The quantum key agreement (QKA) protocol is a new important branch of quantum cryptography, which allows participants to negotiate a classical shared secret key through an open quantum channel, and the contribution of each participant is the same, any participant None or a subset of participants can independently determine the shared secret. Using the shared se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
Inventor 何业锋
Owner XIAN UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products