摘要
Three-particle W states are used as decoy photons,and the eavesdropping detection rate reaches63%.The positions of decoy photons in information sequence are encoded with identity string ID of the legitimate users.Authentication is implemented by using previously shared identity string.State/j i is used as the carrier.One photon of/j i is sent to Bob;and Bob obtains a random key by measuring photons with bases dominated by ID.The bases information is secret to others except Alice and Bob.Both the eavesdropping detection based on three-particle W state and the secret ID ensure the security of the protocol.Unitary operations are not used.
Three-particle W states are used as decoy photons, and the eavesdropping detection rate reaches 63 %. The positions of decoy photons in information sequence are encoded with identity string ID of the legitimate users. Authentication is implemented by using previously shared identity string. State 丨φ^- ) is used as the carrier. One photon of 丨φ^-) is sent to Bob; and Bob obtains a random key by measuring photons with bases dominated by ID. The bases information is secret to others except Alice and Bob. Both the eavesdropping detection based on three-particle W state and the secret ID ensure the security of the protocol. Unitary operations are not used.
基金
supported by Science and Technology Support Project of Sichuan Province of China (2013GZX0137)
Fund for Young Persons Project of Sichuan Province of China (12ZB017)
the National Natural Science Foundation of China (61100205)
Project of the Fundamental Research Funds for the Central Universities of China (2013RC0307)
the Cryptography Basic Development of the National ‘12th Five-Year-Plan’ of China on Cryptographic Theory (MMJJ201301004)