Quantum secret sharing method based on round-robin differential phase-shifting quantum key distribution protocol

A quantum key distribution and quantum secret technology, applied in the field of quantum secret sharing, can solve problems such as low noise tolerance, and achieve the effect of high noise tolerance and easy operation

Inactive Publication Date: 2018-11-13
南京南瑞国盾量子技术有限公司 +3
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to overcome the deficiencies in the prior art, and propose a quantum secret sharing method based on the cyclic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum secret sharing method based on round-robin differential phase-shifting quantum key distribution protocol
  • Quantum secret sharing method based on round-robin differential phase-shifting quantum key distribution protocol
  • Quantum secret sharing method based on round-robin differential phase-shifting quantum key distribution protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0021] A quantum secret sharing method based on the cyclic differential phase shift quantum key distribution protocol of the present invention, wherein an application scenario includes a secret distributor Alice, and at least two participants Bob and Charlie, the sender Alice wants a message It is divided into two parts and sent to Bob and Charlie respectively. Only when Bob and Charlie cooperate with each other honestly can Alice’s information be jointly obtained; the quantum secret sharing method includes the following steps:

[0022] Step S1, Alice first generates two strings of L-long random bit sequences: B=S 1b S 2b ... S Lb and C=S 1c S 2c ... S Lc , and then use a single-photon lig...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a quantum secret sharing method based on a round-robin differential phase-shifting quantum key distribution protocol. The method comprises a secret distributor Alice and at least two participants Bob and Charlie; the distributor Alice divides one piece of information into two parts to respectively send to the Bob and the Charlie following the cyclic differential phase-shifting quantum key distribution protocol; and the information of the Alice can be acquired as long as the Bob and the Charlie mutually cooperate in honest. The single-photon light source is used in the method disclosed by the invention, the RRDPS-QKD protocol is applied to the quantum secret sharing, and higher noise tolerance and operation convenience are provided.

Description

technical field [0001] The invention relates to a realization method of quantum secret sharing based on a cyclic differential phase shift quantum key distribution protocol, and belongs to the interdisciplinary technical field of quantum mechanics and information science. Background technique [0002] Secret sharing is an important application of cryptography. The secret sharing method is to use mathematical algorithms to divide the secret into several sub-secrets, and distribute them to different agents through classical communication. The authorized agent combination can recover the original secret through the combination of their sub-secrets, but any agent alone or unauthorized None of the proxy combinations can reconstruct the original secret. [0003] However, because its security is based on the complexity of the algorithm, with the continuous improvement of computer computing power, the classic secret sharing method is no longer safe. In 1999, Hillery et al. proposed...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
Inventor 刘金锁于浩潘子春冯宝卓文合李振伟张影胡倩倩贾玮马亚妮李洋完颜绍澎卞宇翔吕超朱雪阳赵生妹胡康
Owner 南京南瑞国盾量子技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products