Unlock instant, AI-driven research and patent intelligence for your innovation.

A two-party quantum key agreement method and system based on bell state

A quantum key agreement, quantum technology, applied in the two-party quantum key agreement method and system field based on the Bell state, can solve the problems of fair communication and other difficulties, achieve the effect of easy deployment and reduce hardware costs

Active Publication Date: 2020-04-07
南京科信量子科技有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] In addition, in the case of inconsistent functions of quantum nodes, how to achieve fair communication between nodes is another difficulty

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A two-party quantum key agreement method and system based on bell state
  • A two-party quantum key agreement method and system based on bell state
  • A two-party quantum key agreement method and system based on bell state

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] Such as figure 1 As shown, this embodiment includes two parties, Alice and Bob, negotiating a key.

[0052] Alice sends the sequence of particles to Bob, who randomly performs the measurement and reflection operations.

Embodiment 2

[0054] As shown in the protocol listening detection and key generation process of the present invention in table 1, it includes the following steps:

[0055] Detect particles for listening. Bob performs the reflection operation, and Alice discovers the eavesdropper by performing the Bell measurement combined with the prepared initial state.

[0056] For the particle used to generate the key, Bob performs the measurement operation, and Alice calculates K by performing the Bell measurement, combining the measurement result and the initial state of the prepared quantum B , and generate the final shared secret.

[0057] Table 1 shows the protocol monitoring detection and key generation process of the present invention.

[0058]

[0059]

[0060] The present invention will be further described in terms of security analysis of the protocol from two aspects of external attack and internal attack.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of quantum secure communication, and discloses a two-party quantum key negotiation method and system based on the Bell state. The two-party quantum key negotiation method based on the Bell state does not require the participation of a third party, and the users of both communication parties execute the agreement. Under the premise of ensuring the security of the key, the key is negotiated jointly and fairly by the two communication parties, and neither party of the agreement can independently decide or know the final key before the other party. The invention is realized by adopting semi-quantum technology, which reduces the hardware cost of users. The two parties participating in the key agreement only need to have two basic quantum functions and complete the key agreement without complex quantum operations; the invention is easy to deploy and easy to apply in promoting quantum communication protocols.

Description

technical field [0001] The invention belongs to the technical field of quantum secure communication, and in particular relates to a Bell state-based two-party quantum key agreement method and system. Background technique [0002] Currently, the closest prior art: [0003] Key management is an extremely important research field in cryptography, among which key establishment mainly studies how to securely and efficiently generate session keys between transmission entities. According to different ways of generating session keys, key establishment protocols can be divided into two categories: key distribution protocols and key agreement protocols. At present, the research on key establishment in quantum communication network mainly focuses on the key distribution problem, while the research on key agreement is seldom mentioned. This is mainly related to the working mechanism of quantum communication devices. In quantum communication networks, most nodes are deployed as receivi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0838H04L9/0852
Inventor 闫丽丽张仕斌昌燕盛志伟
Owner 南京科信量子科技有限公司