A quantum secret sharing method based on d-level single particles

A quantum secret, single-particle technology, applied in the field of quantum information, can solve problems such as low efficiency and complex quantum operation capabilities, and achieve the effect of reducing the number of particles and high quantum efficiency

Active Publication Date: 2022-03-11
FUJIAN NORMAL UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Considering the difficulty of preparing multi-particle GHZ entangled states under the current technical conditions, people have tried to use two-particle Bell states, single-particle quantum states, etc. to achieve this security task, but these protocols have low efficiency, or require participants to have Disadvantages such as more complex quantum manipulation capabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A quantum secret sharing method based on d-level single particles
  • A quantum secret sharing method based on d-level single particles
  • A quantum secret sharing method based on d-level single particles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0039] Such as figure 1 As shown, the present embodiment provides a quantum secret sharing method based on a d-level single particle, comprising the following steps:

[0040] Step S1: Let the secret distributor be R 0 , N participants are R 1 ,...R j ... R N , where R j is the jth participant; the secret distributor R 0 Divide the secret into N equal-length sub-secrets, and randomly distribute the N sub-secrets to N participants, who can collaborate to recover the distributor's secret;

[0041] Step S2: The secret distributor R 0 Provide a series of d-level single-particle strings as information carriers, that is, carrier particles, and embed random messages into carrier particles through local unitary operations on particles, and transmit the coded particle strings to the first participant R j (j=1); after receiving the particle string, the fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an efficient and practical quantum secret sharing method based on a d-level single particle. A secret distributor prepares a d-level single particle and uses it as an information carrier for circular transmission between each participant. Each participant encodes its sub-secret into the signal particle through a local unitary operation without quantum storage, which improves the practicability of the scheme. The quantum Fourier transform is used to construct two mutually unbiased ground states on the d-level quantum system, and the quantum unclonability is combined to ensure the unconditional security of the scheme in theory. In the present invention, one d-level particle can share two classical bits, and the number of particles required for wiretapping detection is reduced through a combined wiretapping detection method, so as to ensure that the scheme obtains higher quantum efficiency.

Description

technical field [0001] The invention relates to the technical field of quantum information, in particular to a quantum secret sharing method based on a d-level single particle. Background technique [0002] Secret sharing is an important branch of modern cryptography. It is mainly created to strengthen the confidentiality of keys and reduce the risk of key leakage. It is currently widely used in key management protocols, multi-party secure computing, and electronic auctions. . In a simple three-party secret sharing protocol, a secret owner splits a secret message S into 2 sub-secrets and sends them to two participants respectively. Each participant only knows its own sub-secret and cannot deduce any information about S from it. The secret message S can only be recovered if the two participants collaborate using their sub-secrets. However, since the classical signal can be arbitrarily copied by an attacker without detection, the secret owner cannot ensure that each sub-sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0858H04L9/085
Inventor 刘晓芬王开军林崧
Owner FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products