Unlock instant, AI-driven research and patent intelligence for your innovation.

Multi-party quantum key agreement method based on non-maximally entangled bell states with known parameters

A quantum key agreement and secret key technology, which is applied in the field of quantum secure communication, can solve the problems of increasing operational complexity and achieve the effects of reducing measurement difficulty and equipment requirements, improving security, and being easy to implement

Active Publication Date: 2021-08-24
SUZHOU UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But this operation inevitably increases the operational complexity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-party quantum key agreement method based on non-maximally entangled bell states with known parameters
  • Multi-party quantum key agreement method based on non-maximally entangled bell states with known parameters
  • Multi-party quantum key agreement method based on non-maximally entangled bell states with known parameters

Examples

Experimental program
Comparison scheme
Effect test

Embodiment example

[0082] Implementation case: A multi-party quantum key agreement method based on a non-maximally entangled Bell state with known parameters, taking three parties as an example to realize a three-party quantum key agreement based on a non-maximally entangled Bell state with known parameters, including :

[0083] Step 1: Assume that there are three users Alice, Bob and Charlie participating in the key negotiation, they have all passed the identity authentication of the network center server in advance, and the three participating users want to negotiate 2-bit information. It is assumed in advance that the final POVM measurement success probability of each participating user is 0.6, 0.7, and 0.8 respectively. Then each participating user needs to provide a length of key sequence. The key sequences of the three participating users Alice, Bob and Charlie are: K A =001011,K B =010110, K C =101011. Then each user needs to prepare three non-maximally entangled Bell states with k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-party quantum key agreement method based on a non-maximally entangled Bell state with known parameters. The present invention is a multi-party quantum key agreement method based on a non-maximally entangled Bell state with known parameters, including: m participants are included in the whole scheme, and the network center server must ensure that each participant has passed quantum identity security authentication . Beneficial effects of the present invention: 1. The present invention is the first multi-party key agreement method using a non-maximally entangled Bell state with known parameters, which greatly improves the security of key agreement and improves the utilization efficiency of particles. 2. The present invention only involves single-event measurement, and the users participating in the negotiation do not need to implement complex multi-bit state measurement, which reduces the measurement difficulty and equipment requirements of the user end, making the method easier to implement.

Description

technical field [0001] The invention relates to the field of quantum secure communication, in particular to a multi-party quantum key agreement method based on a non-maximally entangled Bell state with known parameters. Background technique [0002] As a new interdisciplinary subject, quantum cryptography mainly uses the basic principles of quantum mechanics to establish a new cryptographic system, which theoretically guarantees unconditional security. At present, quantum cryptography usually uses the quantum state as the information carrier between the two parties in communication, uses the principle of quantum mechanics, and transmits through quantum channels to establish a shared key between the two parties in secure communication, which is called quantum key distribution. Its security is guaranteed by the uncertainty relation in quantum mechanics and the quantum cloning theorem. At present, quantum key distribution is one of the most promising technologies in quantum in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04B10/70H04B10/85
CPCH04B10/70H04B10/85H04L9/0838H04L9/0852H04L9/0858
Inventor 李太超姜敏李华阳周刘蕾陈虹
Owner SUZHOU UNIV