Bell state-based two-party quantum key negotiation method and system

A quantum key agreement and quantum technology, applied in the field of Bell state-based two-party quantum key agreement methods and systems, can solve problems such as difficulty in fair communication, and achieve the effects of easy deployment and reduced hardware costs

Active Publication Date: 2019-08-06
南京科信量子科技有限公司
View PDF11 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] In addition, in the case of inconsistent functions of quantum nod

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bell state-based two-party quantum key negotiation method and system
  • Bell state-based two-party quantum key negotiation method and system
  • Bell state-based two-party quantum key negotiation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] like figure 1 As shown, this embodiment includes two parties, Alice and Bob, negotiating a key.

[0052] Alice sends the sequence of particles to Bob, who randomly performs the measurement and reflection operations.

Embodiment 2

[0054] As shown in the protocol listening detection and key generation process of the present invention in table 1, it includes the following steps:

[0055] Detect particles for listening. Bob performs the reflection operation, and Alice discovers the eavesdropper by performing the Bell measurement combined with the prepared initial state.

[0056] For the particle used to generate the key, Bob performs the measurement operation, and Alice calculates K by performing the Bell measurement, combining the measurement result and the initial state of the prepared quantum B , and generate the final shared secret.

[0057] Table 1 shows the protocol monitoring detection and key generation process of the present invention.

[0058]

[0059]

[0060] The present invention will be further described in terms of security analysis of the protocol from two aspects of external attack and internal attack.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of quantum secure communication, and discloses a Bell state-based two-party quantum key negotiation method and system. According to the Bell state-based two-party quantum key negotiation method, the participation of a third party is not needed, and the users of the two communication parties execute the protocol, so that the key is negotiated by the twocommunication parties in a common and fair manner on the premise of ensuring the key security, and any one of the protocol parties cannot independently decide or know the final key in advance before the other party. The method and system are realized by adopting a semi-quantum technology, so that the hardware cost of a user is reduced. The two parties participating in the key negotiation only needto have two basic quantum functions, and the key negotiation can be completed without complex quantum operation; the method and system are easy to deploy and can be easily applied to promotion of thequantum communication protocol.

Description

technical field [0001] The invention belongs to the technical field of quantum secure communication, and in particular relates to a Bell state-based two-party quantum key agreement method and system. Background technique [0002] Currently, the closest prior art: [0003] Key management is an extremely important research field in cryptography, among which key establishment mainly studies how to securely and efficiently generate session keys between transmission entities. According to different ways of generating session keys, key establishment protocols can be divided into two categories: key distribution protocols and key agreement protocols. At present, the research on key establishment in quantum communication network mainly focuses on the key distribution problem, while the research on key agreement is seldom mentioned. This is mainly related to the working mechanism of quantum communication devices. In quantum communication networks, most nodes are deployed as receivi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
CPCH04L9/0838H04L9/0852
Inventor 闫丽丽张仕斌昌燕盛志伟
Owner 南京科信量子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products