Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantum secure direct communication method based on Omega state and ultra dense coding

A technology of secure direct communication and ultra-dense encoding, applied in the field of quantum secure direct communication based on Omega state and ultra-dense encoding, can solve problems such as poor efficiency

Inactive Publication Date: 2019-03-08
BEIJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method of intrusion detection is inefficient. In order to improve the efficiency of intrusion detection, we propose a QSDC protocol based on the quantum Omega state, which improves the detection efficiency of the original protocol.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum secure direct communication method based on Omega state and ultra dense coding
  • Quantum secure direct communication method based on Omega state and ultra dense coding
  • Quantum secure direct communication method based on Omega state and ultra dense coding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0008] 1. The communication protocol process between the receiver and the sender is as follows:

[0009] The four Bell states are:

[0010]

[0011]

[0012] The Omega state mentioned in the article is:

[0013]

[0014] in B 1 >∈{|Ψ ± >,|Φ ± >}, so there are 16 Omega states that can be generated from Bell states. In this paper, we assume that |B 0 >=|Φ + >,|B 0 >=|Φ - >. We can use |Ω> to enhance the efficiency of intrusion detection.

[0015] Assume four unitary operations {U 0 ,U 1 ,U 2 ,U 3} After operating on one of the particles in the Bell state, the Bell state |Φ + > Converted to |Φ + >,|Ψ + >,|Ψ - >,|Φ - >. Then the four unitary operations can be agreed as 00, 01, 11, 10 respectively. By analyzing the change of the Bell state at the corresponding position when sending and receiving, Bob can analyze what type of unitary operation Alice uses, so that Alice and Bob complete the transmission of two classical bits by transmitting one qubit. Th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a QSDC protocol of a quantum secure direct communication method based on an Omega state and ultra dense coding. Assigning a key is a very important research topic in the cryptography, unlike the traditional encryption algorithms based on mathematical difficulties, a quantum secure transmission protocol is based on the physics and can be proved to be theoretically secure, theoriginal QSDC protocol divides entangled particles into two sequences, a check sequence is used for detecting an intrusion behavior, a message coding sequence is used for transmitting a ciphertext, however, the efficiency of the intrusion detection mode is worse, and to improve the efficiency of the intrusion detection, a QSDC protocol based on the Omega state is proposed. A sender forms a message qubits sequence by using particles in a Bell state so as to transmit security information, inserts a check sequence C into the qubits sequence, and records the location of the check sequence C to obtain a sequence data block T, and a receiver extracts the check sequence C and a quantum bit sequence A from the T, performs Omega measurement on the check sequence C, and compares a measured value with a threshold to judge whether the current environment is secure.

Description

technical field [0001] The invention relates to a quantum safe direct communication method based on the Omega state, which can theoretically improve the efficiency of intrusion detection by using the measurement of information entropy. Background technique [0002] How to distribute secret keys is a very important research topic in cryptography. The only key transmission protocol that has been proved to be theoretically safe is OTP (one time pad). However, OTP needs to transmit a key with the same length as the ciphertext, and the key The key cannot be reused, making it difficult to apply. The key distribution methods widely used today are based on mathematically difficult problems. Through computational complexity, the intruder cannot crack the key within a limited time. However, this method The security of Shor has not been proved theoretically. In 1994, Shor proposed the quantum Las Vegas algorithm, which proved that the traditional encryption algorithm will be cracked in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0852H04L63/1441
Inventor 黎雷蕾景春臻李恒吉李朝阳王娜李剑
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products