期刊文献+

Quantum Key Distribution Based on Entangled States and Non-Orthogonal States 被引量:3

Quantum Key Distribution Based on Entangled States and Non-Orthogonal States
原文传递
导出
摘要 In this paper two Quantum Key Distribution(QKD)protocols are proposed,which combined BB84 protocoland EPR protocol subtly.In our protocols,entangled particles and non-orthogonal particles are mixed together and trans-mitted in the quantum channel.They play different roles respectively,and their physical characters are fully exploited.As a result,the efficiency of QKD is improved and identity authentication is added to the QKD procedure. In this paper two Quantum Key Distribution(QKD)protocols are proposed,which combined BB84 protocoland EPR protocol subtly.In our protocols,entangled particles and non-orthogonal particles are mixed together and trans-mitted in the quantum channel.They play different roles respectively,and their physical characters are fully exploited.As a result,the efficiency of QKD is improved and identity authentication is added to the QKD procedure.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2004年第4期33-36,共4页 中国邮电高校学报(英文版)
基金 Foundationitem:ThisWorkisSupportedbytheNationalNaturalScienceFoundationofChina(No.60373059)TheNationalLaboratoryforModernCommunicationsScienceFoundationofChina(No.51436020103DZ4001)ISNOpenFoundationTheNationalResearchFoundationfortheDoctoralProgramofHigherEducationofChina(No.20040013007).
关键词 QKD quantum authentication quantum cryptography QKD quantum authentication quantum cryptography
  • 相关文献

参考文献16

  • 1[1]BENNETT C H, BRASSARD G. Quantum cryptography:public-key distribution and coin tossing [A]. Proceedings of the International Conference on Computers, Systems and Signal Processing [ C ]. Bangalore (IN): Bangalore Press,1984. 175- 179.
  • 2[2]EKERT A K. Quantum cryptography based on Bell's theorem [J]. Phys Rev Lett, 1991, 67(6): 661-663.
  • 3[3]BENNETT C H. Quantum cryptography using any two nonorthogonal states [J]. Phys Rev Lett, 1992, 68 (3):121 - 3124.
  • 4[4]Lutkenhaus N. Security against eavesdropping in quantum cryptography [J]. Phys Rev A, 1996, 54(1): 97- 111.
  • 5[5]Lu tkenhaus N. Estimates for practical quantum cryptography [J]. Phys Rev A, 1999, 59(3):301-3319.
  • 6[6]BRASSARD G, Lutkenhaus N, Mor T, et al. Security aspects of practical quantum cryptography [DB/OL]. http://arxiv. org/pdf/quant-ph/9911054, 1999.
  • 7[7]LJUNGGREN D, BOURENNAMNE M, KARLSSON A.Authority-based user authentication in quantum key distribution [J]. Phys Rev A, 2000, 62(2): 022305.
  • 8[8]CABELLO A. Quantum key distribution in the Holevo limit [J]. Phys Rev Lett, 2000, 85(26): 5635-5638.
  • 9[9]CABELLO A. Quantum key distribution without alternative measurements [J]. Phys Rev A, 2000, 61(5): 052312.
  • 10[10]LONG G L, LIU X S. Theoretically efficient high-capacity quantum-key-distribution scheme [J ]. Phys Rev A,2002, 65(3) :032302.

同被引文献26

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部