Authenticable multi-user quantum key distribution method based on single particles

A quantum key distribution and single particle technology, applied in the field of quantum information, can solve problems such as the difficulty of finding a third party

Inactive Publication Date: 2019-09-20
FUJIAN NORMAL UNIV
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in real life, it is more difficu...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authenticable multi-user quantum key distribution method based on single particles
  • Authenticable multi-user quantum key distribution method based on single particles
  • Authenticable multi-user quantum key distribution method based on single particles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be further described below in conjunction with the drawings and embodiments.

[0036] This embodiment is applied to the most common star network structure. Such as figure 1 As shown, the entire network is composed of a central node and m user nodes. The central node and each user node are connected through an insecure quantum channel to provide users with communication services. In addition, there is a classic open channel between any two users, which can be tapped but cannot be tampered with.

[0037] Suppose two users, Alice (A) and Bob (B) want to generate a secure session key with the help of the center Trent (T). The three participants have their own identity information, which is ID A , ID B , And ID T . A and B each share a secure master key k with T TA And k TB . Here ID A , ID B , And ID T Is public, and k TA And k TB It's private. Such as figure 2 As shown, this embodiment provides a single-particle-based certifiable multi-user q...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an authenticable multi-user quantum key distribution method based on a single particle, and the method takes the single particle as a quantum carrier of information, and completes the distribution of session keys between any two users in a network under the assistance of a semi-trusted third party. Through two eavesdropping detection processes, identity authentication of the two participants is realized. And finally, the security of the master key of the user is ensured by distilling the master key of the user, so that the purpose of reusing the master key is achieved. The quantum mechanics principle ensures the unconditional safety of the method in theory. Meanwhile, each user only needs to store the respective master key, and does not need to store the transmission particles, so that the method is high in practicability.

Description

Technical field [0001] The invention relates to the field of quantum information technology, in particular to a single-particle-based certifiable multi-user quantum key distribution method. Background technique [0002] Quantum cryptography is a new type of cryptography based on classical cryptography and quantum mechanics. Its security is guaranteed by the basic laws of quantum mechanics and can achieve theoretical unconditional security. Quantum key distribution is the earliest and most mature main branch of quantum cryptography, and it has gradually become practical. With the development of quantum information technology, some large-scale quantum communication networks have been established. In these networks, it is necessary to implement key distribution among multiple users of the network. In other words, any two users in the quantum network can distribute a secure session key on an insecure channel. In order to achieve this goal, Multi-User Quantum Key Distribution (MQKD...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0852H04L9/3236H04L9/3273
Inventor 刘晓芬陈爱民林崧
Owner FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products