A Dynamic Serial Key Distribution Method Based on ghz State
A key distribution and dynamic technology, applied in the field of quantum information security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment
[0075] We take a key with a length of 4 as an example to illustrate, each A in this protocol i , B i , C i The particle sending directions are as follows:
[0076]
[0077]
[0078]
[0079] Suppose three user sets are
[0080] Alice={Alice t1 |t1=1,2,3}, Bob={Bob t2 |t2=1,2,3},
[0081] Charlie={Charlie t3 |t3=1,2}. Each user to each A i , B i , C i The single-bit operation or measurement results of the particles are shown in Table 2 to Table 4:
[0082]
[0083] Table 2
[0084]
[0085] table 3
[0086]
[0087] Table 4
[0088] Afterwards, the third-party Dick sends a request to obtain the key to the three user sets Alice, Bob, and Charlie. The user set Alice and Bob agree to publish the operation process or measurement results to the third-party Dick, while the user set Charlie refuses to publish the operation to the third-party Dick. process or measurement result. According to Table 2 ~ Table 3, Dick can get the particle A 1 ,A 2 ,A 3 ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



