期刊文献+

基于高维纠缠态的量子密钥分发协议

Quantum key distribution protocol based on high-dimensional entangled states
下载PDF
导出
摘要 为了提高量子密钥分发的效率和安全性,利用高维Hilbert空间中的Bell态和Hadamard门设计了一种量子密钥分发协议。首先通过量子态的动态演变验证了三维Bell纠缠态在Z基和X基下具有不同的表示特性,然后以此为基础进行协议设计,其中利用Z基测量来检测窃听,利用X基测量来产生密钥。安全性分析表明,该协议可以抵抗截获重发、纠缠附加粒子和特洛伊木马三种常见的攻击。最后将协议与其他方案进行了比较,该协议在保证量子比特效率50%的基础上,安全性也有所提升。 In order to improve the efficiency and security of quantum key distribution,this paper proposed a quantum key distribution protocol based on Bell states and Hadamard gates in high-dimensional Hilbert space.Firstly,this protocol used the dynamic evolution of the quantum state to verify that the three-dimensional Bell entangled states had different representation characteristics under Z basis and X basis.Then it used Z basis measurement to detect eavesdropper and X basis measurement to generate key.Security analysis shows that the proposed protocol can resist common intercept-resend,entangled additional particle and Trojan horse attacks.Finally,compared with other schemes,the security of this protocol has improved on the basis of 50%qubit efficiency.
作者 蒋社想 方磊 方贤进 周华平 Jiang Shexiang;Fang Lei;Fang Xianjin;Zhou Huaping(School of Computer Science&Engineering,Anhui University of Science&Technology,Huainan Anhui 232001,China)
出处 《计算机应用研究》 CSCD 北大核心 2023年第1期268-271,277,共5页 Application Research of Computers
基金 安徽理工大学引进人才基金资助项目(2021yjrc34) 安徽省教育厅高校自然科学研究项目(KJ2020A0301) 安徽省重点研发计划资助项目(202004b11020029)。
关键词 量子密钥分发 效率和安全 高维纠缠态 Z基 X基 攻击 quantum key distribution efficiency and security high-dimensional entangled states Z basis X basis attack
  • 相关文献

参考文献5

二级参考文献34

  • 1李超,聂敏.基于特洛伊木马攻击的多用户树型量子信令损伤模型及修复策略[J].光子学报,2012,41(10):1256-1260. 被引量:1
  • 2曾贵华.特洛依木马攻击下的量子密码安全性(英文)[J].软件学报,2004,15(8):1259-1264. 被引量:2
  • 3ZHOU N R,CHENG H L,et al.Three-party quantum network com-munication protocols based on quantum teleportation[J].International Journal of Theoretical Physics,2014,53(4):1387-1403.
  • 4GONG L H,LILT Y,ZHOU N R.Novel quantum virtual private net-work scheme for PON via quantum secure direct communication[J].International Journal of Theoretical Physics,2013,52(9):3260-3268.
  • 5MA H Y,CHEN B Q,et al.Development of quantum network based on multiparty quantum secret sharing[J].Canadian Journal of Physics,2008,86(9):1097-1101.
  • 6CHEN Y S,L1N Y W.Mobicast routing protocol for underwater sen-sor networks[J].IEEE Sensors Journal,2013,13(2):737-1403.
  • 7JONATHAN D,PLENIO M B,VEDRAL V,et al.Quantum hacking on quantum key distribution using homodyne detection[J].Physical Review A,2014,89(3):032304.
  • 8GHIU I.Asymmetric quantum telecloning of d-level systems and broadcasting of entanglement to different locations using the "many-to-many" communication protocol[J].Physical Review A,2003,67(1):012323.
  • 9YUAN Z S,BAO X H,LUA C Y,et al.Entangled photons and quan-tum communication[J].Physics Reports,2010,497(1):1-40.
  • 10EKERT A K.Quantum cryptography based on Bell's theorem[J].Physical Review Letters,1991,67(6):661-663.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部