Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

152 results about "Bell state" patented technology

The Bell states, a concept in quantum information science, are specific quantum states of two qubits that represent the simplest (and maximal) examples of quantum entanglement. The Bell states are a form of entangled and normalized basis vectors. This normalization implies that the overall probability of the particle being in one of the mentioned states is 1: 〈Φ|Φ〉=1. Entanglement is a basis-independent result of superposition.

System and method for measuring device-independent quantum key distribution (QKD)

The invention provides a system and method for measuring device-independent quantum key distribution (QKD). The system comprises a first-party device, a second-party device and a third-party device which are connected through a transmission channel, wherein both the first-party device and the second-party device comprise a controller, a processor and multiple lasers; the multiple lasers are used for respectively preparing the signal states and decoy states corresponding to two eigenstates of the signal measurement base and decoying the two decoy states of the measurement base; the controller selects one of the two groups of measurement bases, selects the signal states or the decoy states prepared by the corresponding lasers according to the selected measurement bases, and sends the signal states or the decoy states to the third-party device; the processor implements key post-processing on the received measurement results to obtain a secure key; and the third-party device implements Bell-state measurement on the received quantum state and releases the measurement results. By adopting the system and method provided by the invention, the number of the adopted lasers can be reduced without decreasing the performance of a QKD system, and thus the cost of the device can be lowered, the complexity of the device can be reduced, and more space of the client device can be saved.
Owner:TSINGHUA UNIV

The One-Qubit Pad (OQP) for entanglement encryption of quantum information

The One-Qubit Pad (OQP) protocol and its generic implementing device constitute a novel, maximally efficient scheme for encryption of quantum information with a quantum key of just a single qubit in an arbitrary unknown quantum state. The OQP enables encryption of the quantum information of n qubits register with a single qubit key upon provision of a multi-qubit entanglement between the single qubit key and the n qubits of the quantum message by the iterative application of the CNOT gate on the same key qubit (control input) and subsequent qubits of the message (target input). This results in an entanglement of all n+1 qubits, which locks original quantum information qubits and the single qubit of the key in a jointly entangled state that cannot be disentangled without the single qubit key. In order to decrypt the quantum message (by its disentanglement) one needs to have the qubit key and either reverse the protocol (applying CNOT operations in the reversed order) or simply measure the entangled key qubit and then depending on the outcome either straightforwardly obtain the decrypted quantum message or its quantum negation (dealt with by again applying quantum negation on all of the message qubits thus restoring their original states). The OQP protocol and its implementing device is proposed one hundred years after the classical One-Time Pad (Vernam cipher) was invented in 1917. The main differences between two schemes show how much quantum and clasical information differ. It is of course impossible to unconditionally securely encrypt classical sequence of n bits with just 1 bit of a key or guarantee that the random key that can be used for this purpose of n bits length (same as of the message) could not be copied. In contrast both these features are possible for the quantum information as described upon the proposed invention. The main characteristic of the OQP protocol to use only a single qubit as the key to enable information-theoretic security of n qubits quantum information encryption follows from the introduction in the invention of the multi-qubit entanglement, which is a non-local, topological and non-classical phenomenon giving quantum information significant edge over its classical counterpart. The main application of the OQP protocol and its implementing generic device is to lock quantum information with the single key qubit in order to prevent any unauthorized access to it (not only a classical access upon a measurement, but more importantly a quantum access by a quantum information processing device). This application can be also extended to communication scenario jointly with the Quantum Teleportation, which without OQP requires pre-sharing of n pairs of Bell states between Alice and Bob to securely communicate n qubits long quantum message, whereas in contrast with the OQP protocol just one pair of Bell state is required to securely teleport only the single qubit key for the OQP encrypted quantum message sent through an insecure quantum channel and still be access-protected from Eve (an adversary).
Owner:COMPSECUR SP ZOO

Three-party quantum secure direct communication method based on hyper-entangled Bell state

The invention discloses a three-party quantum secure direct communication method based on a hyper-entangled Bell state, including the following steps: a user 1 randomly prepares N hyper-entangled Bellstates and splits the Bell states into two sequences; the user 1 encodes a first sequence path and sends the path to a user 2; the user 2 encodes the path after confirming that no eavesdropping exists and sends the path to a user 3; the user 3 notifies the user 1 to send a second sequence after confirming that no eavesdropping exists; the user 1 performs polarization encoding on the second sequence and sends the second sequence to the user 3; the user 3 performs polarization encoding on the second sequence, performs joint hyper-entangled Bell state measurement on the two sequences, and publishes measurement results; the user 1 acquires encoding information of the user 2 and the user 3 respectively; the user 1 announces an initial state Ri and the encoding information R of the user 3 on XOR of the user 2; and the users 2 and 3 acquire the encoding information of the other two parties. According to the scheme of the invention, the transmission is only performed for three times, the probability of photon loss caused by channel loss can be greatly reduced, the security detection can be provided, and the security of transmission can be fully improved.
Owner:NANJING UNIV OF POSTS & TELECOMM

Quantum secret key distribution method with function of bidirectional identity authentication

The invention discloses a quantum secret key distribution method with a function of bidirectional identity authentication, and the method comprises the steps: carrying out the interception detection, identity authentication and secret key distribution based on Bell state entangle properties, and then completing the identity authentication and secret key distribution through primary quantum sequence transmission; firstly detecting the channel safety, secondly carrying out the identity authentication, and finally carrying out the secret key distribution. According to the invention, the method carries out the interception detection, identity authentication and secret key distribution based on Bell state entangle properties, and then completes the identity authentication and secret key distribution through primary quantum sequence transmission, thereby improving the utilization efficiency of particles and communication efficiency, and enabling a protocol to be more concise. The protocol has the characteristic of zero knowledgeability during identity authentication. Even if a user is simulated, a simulator still cannot obtain any valuable information in the communication, thereby further guaranteeing the information safety of the user. When two sides need to carry out the secret key distribution, the protocol firstly detects the channel safety, secondly carries out the identity authentication, and finally carries out the secret key distribution.
Owner:CHENGDU UNIV OF INFORMATION TECH

Disordered high capacity multiparty quantum key agreement method based on high energy level bell state

The invention relates to a disordered high capacity multiparty quantum key agreement method based on a high energy level bell state, which is designed for providing a more flexible and efficient quantum key sharing mode. The method provided by the invention comprises the following steps: dividing an initial bell state into two particle sequences Si, 1 and Si, 2, inserting a bait single photon sequence into the particle sequence Si, 2, forming a transmission sequence (represented as a formula in specification) and then sending the transmission sequence to the next user (represented as a formulain specification) to confirm security, and then performing d-dimension unitary operation for the particle sequence according to content of owned key sequence (represented as a formula in specification), inserting the bait single photon sequence in an operation result, sending the result to the next user (represented as a formula in specification), and repeating the steps above to perform security detection and message coding by the users (represented as a formula in specification). When the user Pi receives the particle sequence S1, 2 sent out by itself, after confirming security, the user Pi performs the d-dimension unitary operation for the particle sequence. The user Pi performs two qudit unitary operations for the finally recycled d-energy level bell state, and respectively performssingle particle measurement based on a base H and a base Z for a first particle and a second particle of the bell state.
Owner:SUZHOU UNIV

Quantum voting system and method based on quantum teleportation

The invention discloses a quantum voting system and method based on quantum teleportation. The quantum voting system comprises a voter Alice, a voting management organization CA, a supervisor Charlie,a teller Bob and four OADMs, wherein the voter Alice comprises a first a quantum key server, a voting terminal and a first quantum state measurement device; the voting management organization CA comprises a second quantum key server, an authentication terminal, an entanglement source and a first Bell state measurement device; the supervisor Charlie comprises a third quantum key server, a displayterminal and a second Bell state measurement device; and the teller Bob comprises a fourth quantum key server, a computer terminal, a unitary transformation device and a second quantum state measurement device. The quantum voting system disclosed by the invention ensures the security of the whole voting process by the coherence of entangled particles, a QKD protocol, a one-time-one-encryption encryption algorithm and quantum channel eavesdropping detection. In addition, the quantum voting system disclosed by the invention transmits the classical and quantum information through different wavelengths in the same optical fiber, so that the cost of an application can be greatly reduced, and the practicability is improved
Owner:GUANGDONG INCUBATOR TECH DEV CO LTD

Quantum key distribution method based on single photon multi-degree of freedom irrelevant to measurement device

The present invention provides a quantum key distribution method based on a single photon multi-degree of freedom irrelevant to a measurement device. The method employs spaces and polarization singlephotons to perform coding on a polarization freedom and a space path freedom and sends the spaces and polarization single photons after coding to a third-party measurement device. The third-party measurement device is employed to perform hyper-entangled Bell state analysis to achieve complete distinguishing of 16 Bell states. Compared to a quantum key distribution protocol scheme irrelevant to anoriginal measurement device, the information is encoded on two degrees of freedom, and a non-linear optical condition is employed to perform complete distinguishing of the 16 Bell states so as to effectively utilize the safe keys and improve the channel capacity. Besides, in order to respond to the safety hole of photon number separation attack, a decoy state technology is used. The quantum key distribution method based on a single photon multi-degree of freedom irrelevant to a measurement device can greatly improve the utilization of the code forming rate and the safe keys and can ensure thereliability and the safety of the transmission process.
Owner:NANJING UNIV OF POSTS & TELECOMM

Quantum key distribution method and system with bidirectional identity authentication function

ActiveCN109327308AThe certification process is simple and practicalIncrease profitKey distribution for secure communicationBell stateQuantum gate
The invention belongs to the technical field of network information and discloses a quantum key distribution method and system with a bidirectional identity authentication function. A communication participant uses a binary character string representing the user identity to carry out preparation of a Bell state; encoding and particle exchange are carried out according to a same convention; Bell-based measurement is finished so as to achieve entanglement exchange of the Bell-state particles; after a bitwise XOR operation is carried out, a Pauli gate operation is carried out on any side of bothsides of communication so that the particles in the hand are converted into the Bell-state particles the same as the particles on the opposite side; and both the sides of communication can obtain a same binary character string so as to finish the distribution of secret keys. The quantum key distribution method and system with a bidirectional identity authentication function in the invention improve the use ratio of resources produced during authentication of both the sides of communication; according to the agreement announced by both the sides of communication can identity authentication andkey distribution be realized without the intervention of a third side; the required quantum state is the Bell state of two particles; and the preparation is relatively easy.
Owner:CHENGDU UNIV OF INFORMATION TECH

Quantum dialogue method irrelevant to measurement equipment based on hyper-entanglement

The invention discloses a quantum dialogue method irrelevant to measuring equipment based on super-entanglement. The method comprises the following steps that two communication parties randomly prepare a super-entanglement state and a single photon respectively to form corresponding photon sequences; the third detection party performs hyper-entangled Bell state measurement on the photon sequence sent by the communication party and publishes a measurement result, and the communication party performs security detection according to the measurement result; two communication parties simultaneouslyencode information at different degrees of freedom and randomly perform security detection encoding, and the process is similar to quantum secure direct communication at different degrees of freedom;and the two communication parties send the coded photon sequence to the detection party, the detection party performs hyper-entangled Bell state measurement again and publishes a result, and the communication party decodes information according to the result to complete dialogue. According to the method, bidirectional quantum secure direct communication can be realized, communication efficiency is effectively improved, meanwhile, security holes related to measurement equipment and information leakage can be eliminated, and the method has relatively high flexibility, i.e., information codes ondifferent degrees of freedom do not influence each other.
Owner:NANJING UNIV OF POSTS & TELECOMM

Broadcasting communication technique of quantum network

The invention provides a novel quantum broadcasting communication scheme. Only one difference from the transmitting party in the traditional quantum broadcasting protocol is as follows: the scheme realizes that two transmitting parties simultaneously transmit the united confidential information of the two parties to multiple legal receiving parties. In the scheme, the transmitting parties respectively share the multiparticle GHZ state with all the receiving parties, and then the transmitting parties carry out the single particle measurement and publish the check bit; after carrying out inaccurate Bell measurement, each receiving party simultaneously acquires the united confidential information of the transmitting parties according to the result and the check bit; the quantum characteristic ensures the unconditional safety of the protocol; and the application of the induced quantum photon leads the protocol to have detectability on bugging. The communication model can be applied to the fields of the safe democratic decision in a quantum network, the united signal control and the like. In the implementing process of the scheme, the transmitting party only needs to carry out single particle measurement, the receiving party carries out Bell measurement, but only partial Bell state measuring result needs to be distinguished, all the measuring results needs to be inaccurately distinguished, thus the scheme is easy to implement in the quantum network.
Owner:BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products