Quantum two-party cryptographic protocol construction method irrelevant to measurement equipment
A technology of two-party ciphers and measurement equipment, applied to countermeasures against encryption mechanisms and key distribution, can solve problems such as side channel attacks, hidden dangers of information security, and insecure underlying principles, and achieve the effect of easy implementation and wide applicability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] The present invention provides a method for constructing a measurement-device-independent quantum two-party cryptographic protocol, and specifically designs two measurement-device-independent protocols based on misestimation, including: 2-out-1 random inadvertent transmission ( ROT) protocol and quantum identification (PID) protocol based on ROT protocol. The following will introduce the flow of the two protocols and specific security proofs.
[0046] The specific design process of the 2 out of 1 arbitrary and inadvertent transmission protocol is as follows:
[0047] Preparation phase: Alice chooses string x n ∈ {0, 1} n and measurement basis Bob also chooses the string y n ∈ {0, 1} n and measurement basis The two parties will encode the quantum state and Sent to third party Charlie.
[0048] Measurement phase: Charlie vs. and For joint Bell state measurements, four photon detectors are used to display the relevant results, as defined by Indicates the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


