Semi-quantum secure direct communication method based on bell state

A secure direct communication, quantum technology, used in secure communication devices, photonic quantum communication, key distribution

Active Publication Date: 2020-04-28
CHENGDU UNIV OF INFORMATION TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The difficulty of solving this problem is to ensure that only the first participating user has a strong quantum function among the two communicating parties, while the second participating user of the other party only has basic quantum functions. The goal of participating users to directly communicate secret information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Semi-quantum secure direct communication method based on bell state
  • Semi-quantum secure direct communication method based on bell state
  • Semi-quantum secure direct communication method based on bell state

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0092] See figure 1 , this embodiment includes a first participating user with strong quantum functions and a second participating user with only basic quantum functions, and the second participating user needs to transmit secret information to the first participating user;

[0093] The first participating user Alice prepares 2n Bell states, extracts one particle in each Bell state to form a particle sequence and sends it to the second participating user Bob; after receiving the quantum, the second participating user Bob, who has basic quantum functions, randomly selects n among them n particles are used as detection particles to detect external eavesdroppers; the other n particles are used to load secret information; the second participating user performs random operations on the detection particles and uses the remaining particles to encode secret information; the second participating user performs a random operation on the generated particles Sequence, processed out of ord...

Embodiment 2

[0095] See figure 2 , the usage method of Embodiment 1, the quantum communication volume required for the protocol to realize the transmission of secret information, and compare it with related work;

Embodiment 3

[0097] See image 3 , using the method of embodiment 1, if the attacker wants to obtain complete information, the probability of being detected is 50%;

[0098] The present invention needs to be executed in a quantum communication network environment, so the participating computers have quantum functions, and a quantum network is required for transmission;

[0099] In the above-mentioned embodiments, it can be realized in whole or in part by software, hardware, firmware or any combination thereof; when using a computer program product in whole or in part, the computer program product includes one or more ; When loading or executing the computer program instructions on the computer, all or part of the processes or functions according to the embodiments of the present invention are generated; the computer needs to be equipped with a quantum device; the computer instructions can be stored in a computer-readable storage media, or transmitted from one computer-readable storage med...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of quantum secure communication, and discloses a semi-quantum secure direct communication method and system. There are two users participating in the execution of this agreement, and the first participating user has advanced quantum functions, can prepare Bell states, and can use Bell bases. Measuring the quantum state has the function of quantum storage; the second participating user only has the basic quantum function, specifically: measurement: use the classical basis {|0>,|1>} to measure the quantum, according to the measurement result |0>(|1> ), generate a quantum |1>(|0>) in the opposite state, and send it out; reflection: after receiving the quantum, it will be sent back to the sender without any modification; out-of-order: using delay technology, The sending order of random quantum sequences. The protocol proposed by the invention is a semi-quantum secure direct communication protocol, which improves the communication efficiency of the protocol on the premise of ensuring the absolute security of secret information transmission.

Description

technical field [0001] The invention belongs to the field of quantum security communication, and in particular relates to a semi-quantum security direct communication method and system. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: [0003] Quantum secure direct communication is an important research direction in quantum information science. It mainly realizes the direct transmission of secret information between two legitimate users through quantum channels without negotiating a shared key; in 2000, Long Gui Lu et al. first proposed a quantum-safe direct communication scheme (QSDC) based on Einstein-Podolsky-Rosen (EPR) pairs [1]; subsequently, researchers did a lot of work on the quantum-safe direct communication protocol; in 2003, Deng Fuguo proposed a well-known two-step quantum-safe direct communication protocol [2]; subsequent researchers proposed a controllable quantum-safe direct communication prot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08H04B10/70
CPCH04B10/70H04L9/0852H04L63/145H04L63/16
Inventor 闫丽丽张仕斌昌燕盛志伟
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products