期刊文献+

Multiparty Quantum Secret Report

Multiparty Quantum Secret Report
下载PDF
导出
摘要 A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her M agents first share a sequence of (M + 1)-particle Greenberger-Horne-Zeilinger (GHZ) states that only Alice knows which state each (M + 1)-particle quantum system is in. Each agent exploits a controlled-not (CNot) gate to encrypt the travelling particle by using the particle in the GHZ state as the control qubit. The boss Alice decrypts the travelling particle with a CNot gate after performing a aσ∞ operation on her particle in the GHZ state or not. After the GHZ states (the quantum key) are used up, the parties check whether there is a vicious eavesdropper, say Eve, monitoring the quantum line, by picking out some samples from the GHZ states shared and measuring them with two measuring bases. After confirming the security of the quantum key, they use the remaining GHZ states repeatedly for the next round of quantum communication. This scheme has the advantage of high intrinsic efficiency for the qubits and total efficiency. A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her M agents first share a sequence of (M + 1)-particle Greenberger-Horne-Zeilinger (GHZ) states that only Alice knows which state each (M + 1)-particle quantum system is in. Each agent exploits a controlled-not (CNot) gate to encrypt the travelling particle by using the particle in the GHZ state as the control qubit. The boss Alice decrypts the travelling particle with a CNot gate after performing a aσ∞ operation on her particle in the GHZ state or not. After the GHZ states (the quantum key) are used up, the parties check whether there is a vicious eavesdropper, say Eve, monitoring the quantum line, by picking out some samples from the GHZ states shared and measuring them with two measuring bases. After confirming the security of the quantum key, they use the remaining GHZ states repeatedly for the next round of quantum communication. This scheme has the advantage of high intrinsic efficiency for the qubits and total efficiency.
出处 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第7期1676-1679,共4页 中国物理快报(英文版)
基金 Supported by the National Natural Science Foundation of China under Grant No 10447106, and Beijing Education Committee under Grant No XK100270454.
关键词 SECURE DIRECT COMMUNICATION LOCAL UNITARY OPERATIONS KEY DISTRIBUTION BELLTHEOREM GHZ STATES ENTANGLEMENT CRYPTOGRAPHY SCHEME PROTOCOL NETWORK SECURE DIRECT COMMUNICATION LOCAL UNITARY OPERATIONS KEY DISTRIBUTION BELLTHEOREM GHZ STATES ENTANGLEMENT CRYPTOGRAPHY SCHEME PROTOCOL NETWORK
  • 相关文献

参考文献47

  • 1Nielsen M A and Chuang I L 2000 Quantum computation and quantum information (Cambridge: Cambridge University Press)
  • 2Gisin N, Ribordy G, Tittel W and Zbinden H 2002 Rev.Mod. Phys. 74 145
  • 3Bennett C H and Brassad G 1984 Proc. IEEE Int. Conf.on Computers, Systems and Signal Processing (Bangalore,India (New York: IEEE) pp 175-179
  • 4Ekert A K 1991 Phys. Rev. Lett. 67 661
  • 5Bennett C H, Brassard G and Mermin N D 1992 Phys. Rev.Lett. 68 557
  • 6Long G L and Liu X S 2002 Phys. Rev. A 65 032302
  • 7Deng F G and Long G L 2004 Phys. Rev. A 70 012311
  • 8Deng F G and Long G L 2003 Phys. Rev. A 68 042315
  • 9Hillery M, Buzek V and Berthiaume A 1999 Phys. Rev. A59 1829
  • 10Karlsson A, Koashi M and Imoto N 1999 Phys. Rev. A 59 162

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部