Semi-quantum secure direct communication protocol based on Bell state

A secure direct communication, semi-quantum technology, applied in the field of semi-quantum secure direct communication methods and systems

Active Publication Date: 2018-11-23
CHENGDU UNIV OF INFORMATION TECH
View PDF6 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The difficulty of solving this problem is to ensure that only the first participating user has a strong quantum function among the two communicating parties,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Semi-quantum secure direct communication protocol based on Bell state
  • Semi-quantum secure direct communication protocol based on Bell state
  • Semi-quantum secure direct communication protocol based on Bell state

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0091] See figure 1 , this embodiment includes a first participating user with strong quantum functions and a second participating user with only basic quantum functions, and the second participating user needs to transmit secret information to the first participating user;

[0092] The first participating user Alice prepares 2n Bell states, extracts one particle in each Bell state to form a particle sequence and sends it to the second participating user Bob; after receiving the quantum, the second participating user Bob, who has basic quantum functions, randomly selects n among them n particles are used as detection particles to detect external eavesdroppers; the other n particles are used to load secret information; the second participating user performs random operations on the detection particles and uses the remaining particles to encode secret information; the second participating user performs a random operation on the generated particles Sequence, processed out of ord...

Embodiment 2

[0094] See figure 2 , the usage method of Embodiment 1, the quantum communication volume required for the protocol to realize the transmission of secret information, and compare it with related work;

Embodiment 3

[0096] See image 3 , using the method of embodiment 1, if the attacker wants to obtain complete information, the probability of being detected is 50%;

[0097] The present invention needs to be executed in a quantum communication network environment, so the participating computers have quantum functions, and a quantum network is required for transmission;

[0098] In the above-mentioned embodiments, it can be realized in whole or in part by software, hardware, firmware or any combination thereof; when using a computer program product in whole or in part, the computer program product includes one or more ; When loading or executing the computer program instructions on the computer, all or part of the processes or functions according to the embodiments of the present invention are generated; the computer needs to be equipped with a quantum device; the computer instructions can be stored in a computer-readable storage media, or transmitted from one computer-readable storage med...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of quantum security communication, and discloses a semi-quantum secure direct communication method and system based on a Bell state. Two users participate in the execution of a present protocol, the first participating user has advanced quantum functions, can prepare the Bell state, and can use a Bell base to measure a quantum state and has a quantum storage function; the second participating user only has basic quantum functions, specifically: measurement: using a classical base {|0), |1)} to measure quanta, generating a quantum |1) (|0)) in an opposite state according to a measurement result |0) (|1) ), and sending the quantum; reflection: after receiving the quantum, directly sending the quantum to a sender without any modification; and disorder: disturbing the sending sequence of the quantum sequence by using the delay technology. The protocol proposed by the invention is a semi-quantum secure direct communication protocol, which improves the communication efficiency of the protocol while ensuring the absolute security of secret information transmission.

Description

technical field [0001] The invention belongs to the field of quantum security communication, and in particular relates to a semi-quantum security direct communication method and system. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: [0003] Quantum secure direct communication is an important research direction in quantum information science. It mainly realizes the direct transmission of secret information between two legitimate users through quantum channels without negotiating a shared key; in 2000, Long Gui Lu et al first proposed a quantum safe direct communication scheme (QSDC) based on the Einstein-Podolsky-Rosen (EPR) pair [1]; subsequently, researchers did a lot of work on the quantum safe direct communication protocol; in 2003, Deng Fuguo proposed a well-known two-step quantum-safe direct communication protocol [2]; subsequent researchers proposed a controllable quantum-safe direct communication pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08H04B10/70
CPCH04B10/70H04L9/0852H04L63/145H04L63/16
Inventor 闫丽丽张仕斌昌燕盛志伟
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products