Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

114 results about "Alice and Bob" patented technology

Alice and Bob are fictional characters commonly used as placeholder names in cryptology, as well as science and engineering literature. The Alice and Bob characters were invented by Ron Rivest, Adi Shamir, and Leonard Adleman in their 1978 paper "A method for obtaining digital signatures and public-key cryptosystems." Subsequently, they have become common archetypes in many scientific and engineering fields, such as quantum cryptography, game theory and physics. As the use of Alice and Bob became more widespread, additional characters were added, each with a particular meaning. These characters do not have to refer to humans; they refer to generic agents which might be different computers or even different programs running on a single computer.

Fair contract signing method based on block chain

The invention relates to a fair contract signing method based on a block chain. The fair contract signing method based on a block chain relates to two user entities Alice and Bob, and a block chain system. The fair contract signing method based on a block chain includes the steps: 1) Alice and Bob respectively generate the respective valid contract admitted clauses PAA and PAB; 2) Alice and Bob exchange the respective valid contract admitted clauses PAA and PAB, the respective signature for the valid contract admitted clauses, and the respective block height BHA and BHB read from the block chain system; and 3) Alice and Bob exchange the respective generated randomized number and digital signature, and verifies whether a valid contract is generated according to the block chain system and the valid contract admitted clauses of the opposite party, and if not valid, the steps from the step 2 need to be executed again, or the steps are completed. As the fair contract signing method based on a block chain does not need a trusted third party and does not need perform any expansion on the block chain system, thus being able to fairly complete contract signing for both parties, and solves the problem that the prior art needs a trusted third party for contract signing or cannot satisfy the fairness requirement or needs modifying the block chain system, in the background technology.
Owner:深圳市数峰科技有限公司

Information leakage-free bidirectional quantum secure direct communication protocol based on any two gigahertz (GHZ) state/entanglement exchange result collection codes

At present, information leakage is a serious security threat to bidirectional quantum secure direct communication (BQSDC). The invention provides an information leakage-free bidirectional quantum secure direct communication protocol based on any two gigahertz (GHZ) state / entanglement exchange result collection codes. In the information leakage-free bidirectional quantum secure direct communication protocol, two remote legitimate communication sides, namely, Alice and Bob can exchange their respective secret information without concern on information disclosure required. According to the protocol, a shared secret gigahertz (GHZ) state is utilized to overcome the problem of information disclosure. The shared secret gigahertz (GHZ) state has the following functions in a bidirectional communication process that: on the one hand, the shared secret gigahertz (GHZ) state makes Bob known a configured initial state, and on the other hand, the shared secret gigahertz (GHZ) state can be used by Bob so that Bob can encode secret information; and further, the protocol can transmit six-bit secret information per communication round. Compared with an existing BQSDC protocol, the protocol of the invention has the following advantages that: the protocol can overcome the problem of information disclosure; and on the other hand, the capacity of the protocol can achieve six bit per communication round.
Owner:浙江海宁经编产业园区开发有限公司

Quantum key distribution system and method based on continuous variable measurement equipment independence

InactiveCN106685658AObvious advantage of metropolitan area networkKey distribution for secure communicationAlice and BobKey generation
The invention provides a quantum key distribution system and method based on continuous variable measurement equipment independence. The quantum key distribution system comprises a sender Alice and a receiver Bob, and is characterized in that the receiver Bob is connected with a balance homodyne detector BHD through a wavelength division multiplexer WDM; the sender Alice is connected with the balance homodyne detector BHD at Alice and Bob ends; after a continuous wave laser device (LD) passes through an intensity modulator (IM), light pulse is formed by attenuation; Gaussian-modulation encoding of a coherent state is finished after the light pulse is processed by an amplitude modulator (AM) and a phase modulator (PM) under the control of a random number generated by a PC (Personal Computer) machine; then a result is sent to a third party Charlie; generated noises have relatively small influences on the system; influences on a safety key generation speed of the system, caused by forward transmission and backward transmission of a channel can be ignored; and advantages of a metropolitan area network based on a CV-MDIQKD quantum cryptography communication system are very obvious, and a foundation can be laid for commercialized and networked application in the future.
Owner:AIR FORCE UNIV PLA

Multi-hop lossless teleportation method based on non-maximum entangled chain channel

The invention relates to a multi-hop lossless teleportation method based on a non-maximum entangled chain channel. Alice and Bob, which do not directly share a quantum entanglement pair at the beginning, continuously carry out entanglement exchange through the help of p middle nodes; finally, a quantum entanglement channel is constructed; and the multi-hop teleportation process of the sender Alicetransmitting a single-particle multi-energy level unknown quantum state to the receiver Bob is completed. The method in the invention uses the non-maximum entangled chain channel; even the sender andthe receiver do not directly share the quantum entanglement pair, the quantum state information can be still transmitted between both the sides; and the requirement for constructing a complex quantumcommunication network can be satisfied; in the multi-hop lossless teleportation system in the invention, if the teleportation process is successfully executed, the information receiver Bob can obtainthe transmitted quantum state information; if the teleportation process fails, the information sender Alice can restore the transmitted unknown quantum state information; and the unknown quantum state information is not lost.
Owner:ZHANGJIAGANG INST OF IND TECH SOOCHOW UNIV +1

Quantum key agreement protocol based on GHZ state

The invention discloses a quantum key agreement protocol based on GHZ state, comprising the following steps that: step 1, Alice and Bob randomly generate respective classical keys; step 2, Alice prepares the GHZ state and divides all particles into sequences, inserts decoy photons into one of the sequences and then transmits the sequence to Bob; step 3, Bob measures the decoy photons, Alice calculates an error rate, if the error rate is low, a step 4 is executed, otherwise, the step 2 is executed again; step 4, Alice and Bob respectively perform measurement and obtain the measurement result of each other; step 5, Alice executes unitary transformation and obtains a new sequence, and Alice transits the sequence with the inserted decoy photons to Bob; step 6, Bob measures the decoy photons, and Alice calculates the error rate, if the error rate is low, a step 7 is executed, and otherwise, the step 2 is executed again; step 7, Alice calculates a shared key of both sides; step 8, Bob generates the shared key. The quantum key agreement protocol based on GHZ state can resist participant attack, outside attack and Trojan horse attack. The quantum key agreement protocol based on GHZ state is safe in both a noiseless quantum channel and a quantum noisy channel. Moreover, quantum bit efficiency of the quantum key agreement protocol based on GHZ state is higher than the existing protocols.
Owner:XIAN UNIV OF POSTS & TELECOMM

Controlled quantum security direct communication method based on four particle cluster states

The invention discloses a controlled quantum security direct communication method based on four particle cluster states. Alice and Bob respectively serve as a legal information sender and a legal information receiver during a quantum communication process, and Charlie serves as a credible scheme control party; information security is achieved by randomly inserting a single photon to perform measurement-based comparison detection, and communication starts after security detection; Alice uniformly divides the prepared four particle cluster states into two groups, after being subjected to an XOR operation with a pseudorandom sequence, the sent information is encoded on the two particles reserved by Alice via unitary transformation. Alice performs Bell-based measurement on reserved particles, and sends measurement information to Bob, and Bob recovers the original sequence via an initial state sent by Charlie after the measurement information is compared. The four particle cluster states used by the method has good entanglement, connectivity and damage resistance, only the receiver Bob in the method gets the permission of the controller Charlie, Bob can recover the original information, so that the information can be effectively prevented from being attacked during a transmission process, and an implementation process is simple.
Owner:NORTHWEST UNIV

Four-particle GHZ state-based two-party quantum key agreement protocol

The invention discloses a four-particle GHZ state-based two-party quantum key agreement protocol. The protocol includes the following steps that: step 1, Alice and Bob randomly generate respective classic keys and negotiate on functions; step 2, Alice selects n four-particle GHZ combination and separation sequences, and randomly inserts decoy photons into three sequences and transmits the new sequences to Bob; step 3, Bob measures the decoy photons, and Alice calculates an error rate; step 4, Alice executes CNOT operation on every three corresponding particles with the same serial numbers in the sequences by twice; step 5, Alice executes unitary transformation so as to obtain new sequences, and selects out the decoy photons and inserts the decoy photons into the sequences and transmits the sequences to Bob; step 6, Bob measures the decoy photons; Alice compares measurement results and calculates an error rate, and step 7 is executed if the error rate is low, otherwise, the method returns to step 2; step 7, Alice generates a shared key; and step 8, Bob generates a shared key. With the four-particle GHZ state two-party quantum key agreement protocol of the invention adopted, existing participant attacks and the external attacks can be resisted. The quantum bit efficiency of the protocol is much higher than that of an existing protocol.
Owner:XIAN UNIV OF POSTS & TELECOMM

Verifiable and secure privacy amplification method based on quantum key distribution

The invention discloses a verifiable and secure privacy amplification method based on quantum key distribution. The method comprises the steps of S1, generating an initial random number string W, respectively generating random number strings K<mis,A> and K<mis,B> by two communication parties (Alice and Bob) in a base comparison process of quantum key distribution, and combining the two random number strings into a random number string W=[<Kmis,A>, K<mis,B>] by the Alice; S2, verifying randomness, after an error correction phase of the quantum key distribution is finished, estimating the minimum entropy lower limit of the W relative to an attacker Eve, wherein H<min>(W|E) is greater than or equal to 1-H<2>(e); S3, calculating a final secure key length N<f>; S4, extracting a perfect random string W*, through adoption of a partial pre-shared secure key of the two communication parties, constructing a Toeplitz matrix H<R>, and extracting the perfect random number string W* from the W according to the H<R>; S5, negotiating a universal hash function H<PA> through a public channel according to the W*; and S6, respectively carrying out hash operation on error corrected key strings by the two communication parties according to the H<PA>, and generating a final secure key. The method has the advantages of verifiability, security, easy realization and simplification of quantum key distribution system design and realization.
Owner:NAT UNIV OF DEFENSE TECH

Remote teleportation method based on four-bit Cluster state

InactiveCN108900254AImprove transmission efficiencySolving the problem of long-distance long-distance quantum communicationPhotonic quantum communicationAlice and BobNetwork termination
The invention discloses a remote teleportation method based on a four-bit Cluster state. For network terminal users Alice and Bob, through help of an intermediate node, communication between a networkterminal Alice and the other terminal user Bob is completed. The method comprises the four steps that 1, the four-bit most entangled Cluster state is shared by the terminal users Alice, Bob and the intermediate node Li (i=1, 2, 3, ..., p), and a quantum entanglement channel of the terminal users Alice and Bob and the intermediate node Li (i=1, 2, 3, ..., p) is built; 2, modulation and measurementare conducted, wherein CZ operation is conducted on corresponding particles by the terminal user Alice and the intermediate node Li, moreover, Bell measurement is conducted on the particles in handsby the intermediate node, and measurement results are announced; 3, a direct quantum channel between the terminal user Alice/Bob and the other terminal user Bob/Alice is built according to the Bell measurement results of the intermediate node through unitary operation; 4, according to difference of information transferring modes, the terminal users Alice and Bob choose corresponding restoring operation according to the Bell measurement results of each other to achieve intercommunication.
Owner:SUZHOU UNIV

Four-particle cluster state multi-hop stealth transfer method based on non-maximum entanglement cluster state

ActiveCN110572219AImprove transmission efficiencySolving the problem of long-distance long-distance quantum communicationPhotonic quantum communicationAlice and BobInformation transmission
The invention discloses a four-particle cluster state multi-hop stealth transfer method based on a non-maximum entanglement cluster state. A source node Alice and a target node Bob realize long-distance quantum communication between Alice and Bob through the help of an intermediate node. The method mainly comprises four steps that (1) a source node Alice, a target node Bob and an intermediate nodeshare a non-maximum entanglement cluster state, and a quantum entanglement channel is established; (2) Alice and an intermediate node carry out CZ operation on particle pairs in hands of the Alice and the intermediate node, and modulate a channel; (3) the Alice and the intermediate node perform Bell measurement on the particle pairs in their hands and inform the measurement result, and the Aliceestablishes a direct quantum channel with the Bob through unitary operation; and (4) the Alice performs Bell-based measurement on the particle pairs in the hand, and Bob performs a series of unitary operations according to the measurement result of the Alice to obtain a transmitted unknown quantum state. The information transmission efficiency is high, the long-distance remote quantum communication problem can be solved through the help of the intermediate nodes, and the requirement for constructing a complex quantum communication network can be met.
Owner:SUZHOU UNIV

Cross-medium equipment-independent and discrete modulation continuous variable quantum key distribution system

The invention discloses a cross-medium equipment-independent and discrete modulation continuous variable quantum key distribution system. An eight-state quantum state is prepared by a trusted intermediate party through discrete modulation, the eight-state quantum state is sent to Alice and Bob after photon subtraction, Alice and Bob perform demodulation and homodyne detection on the received quantum state respectively, and a security key is established within an effective distance. According to the invention, a continuous variable quantum key distribution technology in a free space is improved, and the quantum state is prepared and sent by the trusted intermediate party, so that the system has equipment independence, and the communication security is ensured; the photon subtraction operation can improve the entanglement degree between the quanta so as to improve the transmission distance; the homodyne detection can effectively filter the interference of the outside on the optical signal, and the detection result can be well obtained even if the optical signal is influenced to a certain extent. The scheme is oriented to equipment independence under an air-water channel, discrete modulation continuous variable quantum key distribution is utilized, and more practicability is brought to free space communication of quanta.
Owner:WUXI TAIHU UNIV +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products