Quantum secret sharing method and system without monitoring channel

A quantum secret and channel technology, applied in the field of quantum communication, can solve the problems of complex system and execution operations, large information acquisition value, and difficult quantum cryptography sharing scheme.

Active Publication Date: 2021-03-16
NANJING UNIV
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing quantum cryptography sharing schemes all obtain the information obtained by detecting and misestimating the attacker, that is to say, obtaining a safe coding rate by monitoring the channel. Therefore, it has the following defects: On the one hand, the requirement of channel monitoring Make the quantum secret sharing system and execution operation more complicated; Many lead to a high detection error rate itself, which will make the estimated information value obtained by the attacker too large to generate a secure code rate, making it difficult for the quantum cryptography sharing scheme to be widely implemented

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum secret sharing method and system without monitoring channel
  • Quantum secret sharing method and system without monitoring channel
  • Quantum secret sharing method and system without monitoring channel

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] In this embodiment, the specific structure of the quantum secret sharing system that does not need to monitor the channel is as follows figure 2 As shown, it includes: sender 1, sender 2, and receiver. In this embodiment, the channel symmetry is considered, that is, the channel from sender 1 to the receiver is symmetrical to the channel from sender 2 to the receiver.

[0059] Sending end 1 and sending end 2 have the same structure, both including: continuous laser, intensity modulator and signal attenuator; among them, the continuous laser generates a phase-stable and time-continuous optical signal; the phase modulator is used to phase-encode the passing optical signal (0 or π) to obtain a pulse sequence signal; the signal attenuator is used to perform weak light modulation on the pulse sequence optical signal output by the phase modulator, attenuate it to be lower than the single photon level, and then output it to the detection end.

[0060] The receiving end include...

Embodiment 2

[0093] This implementation is implemented in an asymmetric channel, that is, the length of the quantum channel from Alice to Charlie is different from the length of the quantum channel from Bob to Charlie, and the total light intensity of the pulse train sent by Alice to Charlie is different from the total light intensity of the pulse train sent by Bob to Charlie. The rest of the operations are the same as in the first embodiment, and the formula for calculating the coding rate is still the same as in the first embodiment.

Embodiment 3

[0095] In Embodiments 1 and 2, Alice and Bob use time patterns to encode quantum states. Under this scheme, only one of the L pulses in each round of experiments can be used to generate a security key, resulting in low channel transmission capacity. .

[0096] In this embodiment, the spatial light mode will be used to encode and decode the quantum state, and the encoding space of the secret information will be extended to the L-dimensional system, so as to improve the communication capacity and spectral efficiency of quantum secret sharing.

[0097] Alice and Bob prepare photon sequences by encoding bit strings of length L on the phases of different orbital angular momentum eigenstates of single photons, and then send the photon sequences to Charlie simultaneously through an insecure quantum channel.

[0098] At the receiving end, Charlie implements displacement-type interferometry by inserting a phase element on one arm of a balanced interferometer. Other operations are the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a quantum secret sharing method and system without a monitoring channel, and the method comprises the steps: two transmitting ends prepare a bit string with the length of L, enabling the generated bit string information to be coded on the phase of a quantum state with the dimension of L, and transmitting a quantum state sequence to a receiving end; the receiving end performsshift type interference measurement on the two paths of quantum state sequences, generates an original secret key according to a measurement result, and then publishes the positions of the quantum states which are responded under effective measurement to the two sending ends respectively; the two receiving ends find out corresponding bits from own bit strings as original keys according to the positions of the quantum states; and finally, classical error correction, error verification and privacy amplification are performed by the three parties, and finally extracting is performed to obtain akey for quantum secret sharing. According to the method, the requirement of channel monitoring is removed, and theoretically the highest 50% system bit error rate can be tolerated, so that the deviceand the implementation program of the quantum secret sharing scheme are simpler.

Description

technical field [0001] The invention relates to the field of quantum communication, in particular to a method and system for sharing quantum secrets without monitoring channels. Background technique [0002] Secret sharing is the most basic multi-party encryption method, which plays a fundamental role in the modern information society. It provides basic security guarantees for many applications, such as secure multi-party computing, blockchain, cloud storage, cloud computing, etc. . A secret sharing scheme divides one user's (called the dominant party) secret message into many parts and securely distributes them to other users in the group (called the receivers). No receiver can obtain the message alone, and only a few receivers can cooperate to obtain the message. With the development of quantum communication technology, secret sharing based on quantum key has also been widely developed in theory and experiment. [0003] In recent years, the secure coding rate of the qua...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04B10/70
CPCH04B10/70H04L9/085H04L9/0852
Inventor 尹华磊谢元梅陈增兵
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products