Quantum conference key negotiation method and system

A key negotiation and conference technology, which is applied in transmission systems, digital transmission systems, and key distribution, can solve the problems of high difficulty in experiment implementation, low coding rate, and short transmission distance, so as to increase the transmission distance and coding rate , high efficiency effect

Active Publication Date: 2020-06-16
NANJING UNIV
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Mainly due to the low coding rate and short transmissio

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum conference key negotiation method and system
  • Quantum conference key negotiation method and system
  • Quantum conference key negotiation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0081] The three parties are Alice, Bob, and Charlie. Among them, Alice and Bob have the same equipment, which belongs to the symmetrical relationship in the system. Alice and Bob use CW lasers to generate all-phase stable light, and use intensity modulators, phase modulators, and signal attenuators for pulse preparation, decoy state modulation, phase randomization, phase encoding, and weak light modulation. In the decoy state protocol, Alice randomly prepares a variety of phase-randomized weakly coherent pulses with different light intensities, one of which is the signal state for key generation, and the rest are decoy states. Charlie uses detectors 1 and 2 to perform Z base down measurements, and detectors 3 and 4 to perform X base down measurements. Alice (Bob) sends the quantum state to Charlie, beam splitter one (two) splits the signal into two parts, one part is sent to detector one (two), and the other part is sent to beam splitter three (three). Alice (Bob) sends the...

Embodiment 2

[0112] This invention will also explore an ideal protocol.

[0113] In this embodiment, a single-photon source is used to replace the phase-randomized coherent light source corresponding to the logic bit value of the Z basis vector being 1, and the rest of the steps are the same as those in Embodiment 1.

[0114] The conference key encoding rate R can be calculated by the following formula:

[0115]

[0116] Compared with the previous protocol, the conference key encoding rate of the ideal protocol is faster and the transmission distance is longer. But an ideal single photon source is required.

[0117] No repeater constraints (repeaterless bound 1 and repeaterless bound 2) , . See references: arXiv:1912.03645, arXiv:1912.010658, and arXiv:1912.11355. In order to represent the linear attenuation of the rate with the distance in the original no-relay constraint and the linear attenuation of the system rate with the square root of the distance, let and , L is the t...

Embodiment 3

[0120] Compared with Embodiment 1, other parameters and operations remain unchanged, only the phase misalignment rate under the X base vector is changed .

[0121] Change the phase misalignment rate of 3.5% in Embodiment 1 to 7% and 13% respectively, and draw the relationship diagram of the conference key encoding rate and distance under the different misalignment rates of the X base vector. See Figure 4 . It can be found that the higher the phase misalignment rate, the shorter the transmission distance and the slower the rate. However, as long as the phase misalignment rate is lower than 7%, the transmission distance can exceed 500km, and if it is lower than 13%, the constraint of no relay can be broken. This system has extremely high practicability and operability.

[0122] To sum up, the present invention can obtain the relationship between the conference key coding rate and the distance through measurement and calculation. That is to change the situation that the ke...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a quantum conference key negotiation method and system. The system comprises a sending end and a detection end, the sending end comprises a continuous laser, an intensity modulator, a phase modulator and a signal attenuator. The detection end comprises a beam splitter and a detector; the method comprises the steps of preparation, measurement, coordination, parameter estimation and post-processing. The sending ends respectively select measurement basis vectors and generate phase random optical pulses; the detection end randomly selects a basis vector measurement pulse pair, judges a quantum state according to a pulse response received by the detector, obtains a corresponding logic bit value according to the quantum state, and under the condition that the three parties select a Z basis vector, corresponding data is used for extracting a secret key, and other conditions are used for estimating data leakage. According to the method, the limitation of the code forming rate and the transmission distance in a relay-free quantum conference key negotiation protocol is broken through, the key transmission code forming rate and the propagation distance are improved, and unconditional security three-party quantum conference key negotiation can be realized.

Description

technical field [0001] The invention relates to the technical field of multi-party quantum communication, in particular to a quantum conference key agreement method and system. Background technique [0002] At the moment when information is exploding, both enterprises conducting commercial activities and government agencies attach great importance to the unconditional security of information. In recent years, with the development of quantum information, the unconditional security of information has found a new way to realize it. Quantum communication is an emerging subject combining quantum mechanics and modern cryptography. There are many branches of quantum communication, including quantum key distribution, quantum secret sharing, quantum digital signature and quantum conference key agreement. [0003] Private communication is a basic requirement of the modern information society. Quantum cryptography is one of the fastest-growing fields in the branch of quantum informat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
CPCH04L9/0833H04L9/0838H04L9/0858
Inventor 尹华磊陈增兵
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products