Efficient and practical quantum secret sharing method based on d-level single particles

A quantum secret, single-particle technology, applied in the field of quantum information, can solve the problems of complex quantum operation ability and low efficiency

Active Publication Date: 2019-07-12
FUJIAN NORMAL UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Considering the difficulty of preparing multi-particle GHZ entangled states under the current technical conditions, people have tried to use two-particle Bell states, single-particle qu...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient and practical quantum secret sharing method based on d-level single particles
  • Efficient and practical quantum secret sharing method based on d-level single particles
  • Efficient and practical quantum secret sharing method based on d-level single particles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0043] Such as figure 1 As shown, this embodiment provides an efficient and practical quantum secret sharing method based on d-level single particles, including the following steps:

[0044] Step S1: Let the secret distributor be R 0 , N participants are R 1 ,...R j ... R N , where R j is the jth participant; the secret distributor R 0 Divide the secret into N equal-length sub-secrets, and randomly distribute the N sub-secrets to N participants, who can collaborate to recover the distributor's secret;

[0045] Step S2: The secret distributor R 0 Provide a series of d-level single-particle strings as information carriers, that is, carrier particles, and embed random messages into carrier particles through local unitary operations on particles, and transmit the coded particle strings to the first participant R j (j=1); after receiving the particl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an efficient and practical quantum secret sharing method based on d-level single particles, and the method comprises the steps: a secret distributor prepares the d-level single particles, uses the d-level single particles as an information carrier, and carries out the annular transmission among all participants; each participant encodes the sub-secret thereof into the signal particles through the local unitary operation without quantum storage, so that the practicability of the scheme is improved. Quantum Fourier transform is utilized to construct two unbiased ground states on a d-level quantum system, and unconditional safety of a scheme in theory is ensured by combining quantum unclonability. According to the invention, one d-level particle can share one classicbit, and the number of particles required by eavesdropping detection is reduced through a combined eavesdropping detection method, so that the higher quantum efficiency of the scheme is ensured.

Description

technical field [0001] The invention relates to the technical field of quantum information, in particular to an efficient and practical quantum secret sharing method based on a d-level single particle. Background technique [0002] Secret sharing is an important branch of modern cryptography. It is mainly created to strengthen the confidentiality of keys and reduce the risk of key leakage. It is currently widely used in key management protocols, multi-party secure computing, and electronic auctions. . In a simple three-party secret sharing protocol, a secret owner splits a secret message S into 2 sub-secrets and sends them to two participants respectively. Each participant only knows its own sub-secret and cannot deduce any information about S from it. The secret message S can only be recovered if the two participants collaborate using their sub-secrets. However, since the classical signal can be arbitrarily copied by an attacker without detection, the secret owner cannot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
CPCH04L9/0858H04L9/085
Inventor 刘晓芬王开军林崧
Owner FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products