Disordered high capacity multiparty quantum key agreement method based on high energy level bell state

A multi-party quantum and key agreement technology, applied in the field of disordered high-capacity multi-party quantum key agreement

Active Publication Date: 2018-11-13
SUZHOU UNIV
View PDF6 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the quantum non-cloning theorem ensures that eavesdroppers will not succeed, and it is impossible for any

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Disordered high capacity multiparty quantum key agreement method based on high energy level bell state
  • Disordered high capacity multiparty quantum key agreement method based on high energy level bell state
  • Disordered high capacity multiparty quantum key agreement method based on high energy level bell state

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] Such as figure 1 As shown, this embodiment is based on a disordered high-capacity multi-party quantum key agreement method based on a high-energy-level bell state. All users perform corresponding d-dimensional unitary operations on the transmission sequence, and finally the initial sender determines the system by quantum measurement. The final state, so as to encode the negotiated secret key K, the specific steps are as follows:

[0059] Suppose there are n users P i (i=1, 2...n) participate in the quantum key agreement, and they have all passed the identity authentication of the network center server in advance. Each user has a set of d-ary key sequence K with length m (m is a positive integer divisible by 2) i :

[0060] K 1 =(K 1,1 , K 1,2 …K 1,m )

[0061] K 2 =(K 2,1 , K 2,2 …K 2,m )

[0062] ...

[0063] K n =(K n,1 , K n,2 …K n,m )

[0064] Step 1: Every legitimate user participating in the key negotiation receives m / 2 initial d-level bell stat...

Embodiment 2

[0103] Such as figure 2 As shown, this embodiment is based on a disordered high-capacity multi-party quantum key agreement method based on a high-energy-level bell state. Taking a three-party particle key agreement method based on a three-energy-level bell state as an example, it includes:

[0104] Step 1: Assume that there are three users Alice, Bob and Charlie participating in the key negotiation. They have all passed the identity authentication of the network center server in advance, and each user has a set of 9-ary key sequences with a length of 2: K A =(12), K B =(69),K C =(23). In order to be consistent with the dimension of the bell state, the user needs to preprocess the key sequence first, according to the formula:

[0105]

[0106] The user can convert the key sequence into a 3-ary key sequence of 4: K A =(0102),K B =(2120),K C =(0212). After the preprocessing, Alice, Bob, and Charlie all received the two initial 3-level bell states sent by the network ce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a disordered high capacity multiparty quantum key agreement method based on a high energy level bell state, which is designed for providing a more flexible and efficient quantum key sharing mode. The method provided by the invention comprises the following steps: dividing an initial bell state into two particle sequences Si, 1 and Si, 2, inserting a bait single photon sequence into the particle sequence Si, 2, forming a transmission sequence (represented as a formula in specification) and then sending the transmission sequence to the next user (represented as a formulain specification) to confirm security, and then performing d-dimension unitary operation for the particle sequence according to content of owned key sequence (represented as a formula in specification), inserting the bait single photon sequence in an operation result, sending the result to the next user (represented as a formula in specification), and repeating the steps above to perform security detection and message coding by the users (represented as a formula in specification). When the user Pi receives the particle sequence S1, 2 sent out by itself, after confirming security, the user Pi performs the d-dimension unitary operation for the particle sequence. The user Pi performs two qudit unitary operations for the finally recycled d-energy level bell state, and respectively performssingle particle measurement based on a base H and a base Z for a first particle and a second particle of the bell state.

Description

technical field [0001] The invention belongs to the technical field of quantum secure communication, in particular to a disordered high-capacity multi-party quantum key negotiation method based on a high-energy-level bell state. Background technique [0002] Quantum cryptography is the product of the combination of cryptography and quantum mechanics. Usually, the two parties to the communication use the quantum state as the information carrier, use the principle of quantum mechanics, transmit through the quantum channel, and establish a shared key between the two parties in the secure communication, which is called quantum key distribution. Its security is guaranteed by the uncertainty relationship in quantum mechanics and the quantum non-cloning theorem. Absolute security means that the eavesdropper has a very high IQ, adopts the most brilliant eavesdropping strategy, and uses all possible advanced instruments. Under these conditions, the key is still safe. There are two ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
CPCH04L9/0838H04L9/0852
Inventor 曹刚姜敏李青孙兵黄旭
Owner SUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products