A method for passive decoy state quantum digital signature

A decoy state quantum, digital signature technology, applied in photon quantum communication, digital transmission system, key distribution

Active Publication Date: 2018-12-18
NANJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the previous passive decoy method has only two de

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for passive decoy state quantum digital signature
  • A method for passive decoy state quantum digital signature
  • A method for passive decoy state quantum digital signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In the scheme of the present invention, a decoy state method and a novel low-loss unequal-arm MZ (AMZI, asymmetricMach-Zehnde interferometer) interferometer are used.

[0043] The following will introduce the implementation process of passive decoy QDS in detail:

[0044] distribution stage

[0045] In the distribution phase, the client Bob and Charlie act as the sender, and Alice acts as the receiver. The distribution phase includes the following steps:

[0046] (1) Bob / Charlie at the sending end uses the PDC process to generate N pulse pairs, and disassembles each pulse pair to form two beams containing N pulses, one of which is leisure light and the other is signal light ;

[0047] (2) Divide leisure light into two beams, and these two beams of leisure light are respectively set on two local detectors D 1 、D 2 Collect; 4 response events are generated according to the triggering results of the detector, which are recorded as X 1 ~X 4 :

[0048] x 1 :D 1 、D 2...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a passive decoy state quantum digital signature method, which is applied in a quantum digital signature system. In the key distribution phase of the quantum digital signature, the invention utilizes the parametric down conversion process to generate signal light and casual light, the signal light is sent to the receiving end, and the casual light is used for local detection.The local detection at the transmitting end comprises a beam splitter (BS) and two detectors (D1, D2), After passing through the beam splitter, the casual light triggers two detectors to generate four different response events. The four response events are recorded and utilized to construct a new passive decoy state method, which greatly increases the number of keys that can be used for signatureunder the given security conditions. The method realizes over 200 km passive decoy state quantum digital signatures using a single mode standard commercial optical fiber, and the final signature rateis higher than that of some previous QDS systems. The scheme of the invention applies the passive decoy state technology to a quantum digital signature system for the first time.

Description

technical field [0001] The invention relates to the technical field of quantum digital signatures in quantum communication, in particular to a quantum digital signature method in a passive decoy state. Background technique [0002] Digital signature is one of the most important cryptographic protocols, which has been used in many occasions, such as software distribution, financial transactions, electronic contracts, etc. Classical digital signatures are based on computational security. For example, the RSA algorithm used in classic digital signatures relies on the difficulty of decomposing large integers. However, classical digital signatures are vulnerable to threats from algorithmic breakthroughs and quantum computers. In contrast, based on the theory of quantum mechanics, Quantum Digital Signature (QDS, Quantum DigitalSignature) aims to provide legitimate users (Alice, Bob, and Charlie) with information-theoretic security. The first QDS protocol was proposed by Gottesma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04B10/70
CPCH04B10/70H04L9/0852H04L9/3247
Inventor 张春辉丁华健王琴张春梅
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products