Authenticable multi-user quantum key distribution method based on single particles
A quantum key distribution and single particle technology, applied in the field of quantum information, can solve problems such as the difficulty of finding a third party
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] The present invention will be further described below in conjunction with the drawings and embodiments.
[0036] This embodiment is applied to the most common star network structure. Such as figure 1 As shown, the entire network is composed of a central node and m user nodes. The central node and each user node are connected through an insecure quantum channel to provide users with communication services. In addition, there is a classic open channel between any two users, which can be tapped but cannot be tampered with.
[0037] Suppose two users, Alice (A) and Bob (B) want to generate a secure session key with the help of the center Trent (T). The three participants have their own identity information, which is ID A , ID B , And ID T . A and B each share a secure master key k with T TA And k TB . Here ID A , ID B , And ID T Is public, and k TA And k TB It's private. Such as figure 2 As shown, this embodiment provides a single-particle-based certifiable multi-user q...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com