Encryption algorithm based on quantum technology

An encryption algorithm and quantum technology technology, applied in the field of quantum encryption, can solve problems such as cumbersome process, large error rate, and low efficiency, and achieve the effects of improving security, reducing data processing volume, and improving information transmission efficiency

Active Publication Date: 2019-09-10
JIANGSU NANGONG TECH GRP CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the purpose of Eve's eavesdropping is to obtain information rather than keys, Eve must ensure that it cannot be discovered by Bob. However, Eve has made measurements in order to obtain photon polarization information, and it is impossible to completely clone the original intercepted photon, so Eve's intervention is inevitable. additional large error rate
However, in the BB84 scheme, Bob needs to compare the measurement bases of both Alice and Bob as a whole, which is cumbersome and inefficient.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] The present invention provides a technical solution: an encryption algorithm based on quantum technology, comprising the following steps:

[0023] Step 1: Set three sets of basis vectors, one set is the inclined basis of photon polarization and the horizontal plane at 22.5°, the second set is the horizontal and vertical basis of photon polarization, and the third set is the diagonal inclined basis of photon polarization and the horizontal plane at 45° ;

[0024] Step 2: Alice randomly generates a binary quantum sequence, and then generates a sequence composed of {0, 1, 2} random combination as the measurement base vector, generates the polarization state sequence corresponding to the three sets of base vectors, and uses three variables p1 , p2, and p3 are combined to represent the six polarization states corresponding to the measurement basis vector, among which: 0 corresponds to the polarization state 001,010; 1 corresponds to the polarization state 011,100; 2 correspo...

Embodiment 2

[0031] The present invention provides a technical solution: an encryption algorithm based on quantum technology, comprising the following steps:

[0032] Step 1: Set three sets of basis vectors, one set is the inclined basis of photon polarization and the horizontal plane at 30.0°, the second set is the horizontal and vertical basis of photon polarization, and the third set is the diagonal inclined basis of photon polarization and the horizontal plane at 45° ;

[0033] Step 2: Alice randomly generates a binary quantum sequence, and then generates a sequence composed of {0, 1, 2} random combination as the measurement base vector, generates the polarization state sequence corresponding to the three sets of base vectors, and uses three variables p1 , p2, and p3 are combined to represent the six polarization states corresponding to the measurement basis vector, among which: 0 corresponds to the polarization state 001,010; 1 corresponds to the polarization state 011,100; 2 correspo...

Embodiment 3

[0040] The present invention provides a technical solution: an encryption algorithm based on quantum technology, comprising the following steps:

[0041] Step 1: Set three sets of basis vectors, one set is the inclined basis of photon polarization and the horizontal plane at 60.0°, the second set is the horizontal and vertical basis of photon polarization, and the third set is the diagonal inclined basis of photon polarization and the horizontal plane at 45° ;

[0042] Step 2: Alice randomly generates a binary quantum sequence, and then generates a sequence composed of {0, 1, 2} random combination as the measurement base vector, generates the polarization state sequence corresponding to the three sets of base vectors, and uses three variables p1 , p2, and p3 are combined to represent the six polarization states corresponding to the measurement basis vector, among which: 0 corresponds to the polarization state 001,010; 1 corresponds to the polarization state 011,100; 2 correspo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of quantum encryption, in particular to a quantum technology-based encryption algorithm, which comprises the following steps of: step 1, setting three groups of base vectors, step 2, generating a binary quantum sequence and a measurement base vector, and respectively representing six polarization states corresponding to the measurement base vector by utilizing three variable combinations; step 3, encrypting the information M, converting the binary quantum sequence and recoding the binary quantum sequence; 4, detecting whether the first segment of the measurement base sequence is a random number or not; step 5, when the Eve does not exist, decrypting the data; and 6, when the Eve exists, reselecting other quantum channels. The encryption algorithm has the beneficial effects that the oblique basis of photon polarization and the horizontal plane is recoded into the first segment of the binary quantum sequence, so that Bob can quickly detect whether the confidence is eavesdropped or not, the data processing amount is reduced, corresponding information is encrypted through an encryption algorithm, the eavesdropping difficulty is increased, and the security of encrypted transmission is improved.

Description

technical field [0001] The invention relates to the technical field of quantum encryption, in particular to an encryption algorithm based on quantum technology. Background technique [0002] The quantum key distribution protocol encodes the key information in the quantum state, establishes a shared key, and uses the Heisenberg uncertainty principle and the quantum non-cloning principle to ensure communication security. Among the quantum key distribution protocols, the BB84 protocol is the earliest and only commercially implemented quantum key distribution protocol. This protocol uses two pairs of non-orthogonal base vectors, which are the horizontal and vertical bases "+" and diagonal bases of photon polarization respectively. Base "x". In the horizontal and vertical base "+", the horizontal polarization (0°) is marked as |→>, the vertical polarization (90°) is marked as |↑>; the 45° polarization in the diagonal base "x" is marked as |↗>, 135 °Polarization is deno...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0852H04L9/0858Y02D30/70
Inventor 吴雪峰陈俊桦夏鸣
Owner JIANGSU NANGONG TECH GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products