Quantum authentication encryption method based on two-photon entanglement state suitable for quantum email

A technology for authenticating encryption and entangled states, applied in the field of quantum secure communication, to achieve the effect of high efficiency of information theory

Active Publication Date: 2017-12-01
杭州百城科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when an eavesdropper Eve launches an attack to modify a message qubit, she is able to evade detection with probability 1 / 2

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum authentication encryption method based on two-photon entanglement state suitable for quantum email
  • Quantum authentication encryption method based on two-photon entanglement state suitable for quantum email
  • Quantum authentication encryption method based on two-photon entanglement state suitable for quantum email

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0099] 1. Application example of quantum authentication encryption method

[0100] With the first two-photon entangled state (A 1 , B 1 ) as a concrete example to further explain the proposed method. suppose and (i 1 , j 1 )=01. Correspondingly, (A 1 , B 1 ) is prepared by Alice at |ψ + >. Thus, in Alice's unitary operation σ x After, (A 1 , B 1 ) is changed to |φ + >. Then, after receiving it from Alice, according to Bob chooses MB 1 Measure it. Thus, according to Table 1, he can read (i 1 , j 1 )=01, because he started from and Knowing that Alice prepared (A 1 , B 1 ) initial state is |ψ + >. After decoding M', Bob compares h(m' A ) and h′(m A ) can authenticate m′ A integrity.

[0101] 2. Discussion

[0102] (1) Information theory efficiency

[0103] The information theory efficiency defined by Cabello [4] is η=n s / (q t +b t ), where b s ,q t and b t are the number of secret bits expected to be received, the number of qubits used, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention proposes a quantum authentication and encryption method based on two-photon entanglement state suitable for quantum Email. The two communicators, Alice and Bob, share in advance two private keys used to determine the preparation of the two-photon entangled state. The sender Alice sends the sequence of two-photon entangled states encoding her classical bit to the receiver Bob by one-step quantum transmission. After receiving the encoded sequence of quantum states, Bob uses the joint two-photon measurement to decode Alice's classical bits and authenticate the integrity of Alice's secret with the help of a one-way hash function. The method of the present invention uses only one step of quantum transmission and requires neither a public discussion nor a trusted third party. Therefore, the method of the present invention is applicable to situations such as quantum E-mail that only require the receiver to be offline. The method of the present invention enables message authentication to be accurate to the 1-bit level with the help of a one-way hash function. Moreover, the information theory efficiency of the method of the present invention is as high as 100%.

Description

technical field [0001] The invention relates to the field of quantum security communication. The invention designs a quantum authentication and encryption method based on two-photon entanglement state suitable for quantum Email, and applies the quantum communication method to the situation where only the receiver is required to be offline. Background technique [0002] Quantum cryptography is one of the most important applications of quantum information processing, which can be divided into quantum key distribution (Quantum Key Distribution, QKD) [1-5], quantum secret sharing (Quantum Secret Sharing, QSS) [6-10 ], Quantum Secure Direct Communication (Quantum Secure Direct Communication, QSDC) [11-19], etc. Authentication is well known as an effective way of ensuring the integrity of transmitted information and can be absorbed into both classical and quantum cryptography. According to the use of authentication, quantum cryptography methods can be divided into two categories...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 叶天语
Owner 杭州百城科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products