Quantum authentication encryption protocol suitable for quantum Email and based on double-photon entanglement state

A technology for authenticating encryption protocols and entangled states, applied in the field of quantum secure communications

Active Publication Date: 2015-05-13
杭州百城科技有限公司
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when an eavesdropper Eve launches an attack to modify a message qubit, she is able to evade detection with probability 1 / 2

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum authentication encryption protocol suitable for quantum Email and based on double-photon entanglement state
  • Quantum authentication encryption protocol suitable for quantum Email and based on double-photon entanglement state
  • Quantum authentication encryption protocol suitable for quantum Email and based on double-photon entanglement state

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0099] 1. Application example of quantum authentication encryption protocol

[0100] With the first two-photon entangled state (A 1 , B 1 ) as a concrete example to further explain the proposed protocol. suppose and (i 1 , j 1 )=01. Correspondingly, (A 1 , B 1 ) is prepared by Alice at |ψ + >. Thus, in Alice's unitary operation σ x After, (A 1 , B 1 ) is changed to |φ + >. Then, after receiving it from Alice, according to Bob chooses MB 1 Measure it. Thus, according to Table 1, he can read (i 1 , j 1 )=01, because he started from and Knowing that Alice prepared (A 1 , B 1 ) initial state is |ψ + >. After decoding M', Bob compares h(m' A ) and h′(m A ) can authenticate m′ A integrity.

[0101] 2. Discussion

[0102] (1) Information theory efficiency

[0103] The information theory efficiency defined by Cabello [4] is η=b s / (q t +b t ), where b s ,q t and b t are the number of secret bits expected to be received, the number of qubits used...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a quantum authentication encryption protocol suitable for a quantum Email and based on a double-photon entanglement state. Two communicators Alice and Bob share two private keys for deciding double-photon entanglement state preparation in advance. The sender Alice sends a double-photon entanglement sequence encoded with classical bits of Alice to the receiver Bob in a one-step quantum transport manner. After receiving the encoded quantum state sequence, Bob decodes the classical bits of Alice by utilizing double-photon combined measurement and authenticates integrity of a secret of Alice with the help of a one-way hash function. The protocol disclosed by the invention only uses one-step quantum transport and not only does not need a public discussion, but also does not need a credible third party. Therefore, the protocol disclosed by the invention can be suitable for the situations, such as the quantum Email and the like, which only require the receiver to be positioned below the line. The protocol disclosed by the invention enables accuracy of massage authentication to be the level of 1 bit with the help of the one-way hash function. Moreover, the information theory efficiency of the protocol disclosed by the invention reaches 100 percent.

Description

technical field [0001] The invention relates to the field of quantum security communication. The invention designs a two-photon entanglement state-based quantum authentication encryption protocol suitable for quantum Email, and applies the quantum communication protocol to the situation where only the receiver is required to be offline. Background technique [0002] Quantum cryptography is one of the most important applications of quantum information processing, which can be divided into quantum key distribution (Quantum Key Distribution, QKD) [1-5], quantum secret sharing (Quantum Secret Sharing, QSS) [6-10 ], Quantum Secure Direct Communication (Quantum Secure Direct Communication, QSDC) [11-19], etc. Authentication is well known as an effective way of ensuring the integrity of transmitted information and can be absorbed into both classical and quantum cryptography. According to the use of authentication, quantum cryptography protocols can be divided into two categories,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 叶天语
Owner 杭州百城科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products