Deterministic secure quantum communication and authentication protocol based on three-particle W state and quantum one-time pad  被引量:3

Deterministic secure quantum communication and authentication protocol based on three-particle W state and quantum one-time pad

在线阅读下载全文

作  者:Yan Chang Shibin Zhang Lili Yan Jian Li 

机构地区:[1]Department of Network Engineering,Chengdu University of Information Technology [2]School of Computer,Beijing University of Posts and Telecommunications

出  处:《Chinese Science Bulletin》2014年第23期2835-2840,共6页

基  金:supported by Science and Technology Support Project of Sichuan Province of China (2013GZX0137);Fund for Young Persons Project of Sichuan Province of China (12ZB017);the National Natural Science Foundation of China (61100205);Project of the Fundamental Research Funds for the Central Universities of China (2013RC0307);the Cryptography Basic Development of the National ‘12th Five-Year-Plan’ of China on Cryptographic Theory (MMJJ201301004)

摘  要:Three-particle W states are used as decoy photons,and the eavesdropping detection rate reaches63%.The positions of decoy photons in information sequence are encoded with identity string ID of the legitimate users.Authentication is implemented by using previously shared identity string.State/j i is used as the carrier.One photon of/j i is sent to Bob;and Bob obtains a random key by measuring photons with bases dominated by ID.The bases information is secret to others except Alice and Bob.Both the eavesdropping detection based on three-particle W state and the secret ID ensure the security of the protocol.Unitary operations are not used.Three-particle W states are used as decoy photons, and the eavesdropping detection rate reaches 63 %. The positions of decoy photons in information sequence are encoded with identity string ID of the legitimate users. Authentication is implemented by using previously shared identity string. State 丨φ^- ) is used as the carrier. One photon of 丨φ^-) is sent to Bob; and Bob obtains a random key by measuring photons with bases dominated by ID. The bases information is secret to others except Alice and Bob. Both the eavesdropping detection based on three-particle W state and the secret ID ensure the security of the protocol. Unitary operations are not used.

关 键 词:三粒子W态 认证协议 量子通信 安全性 一次一密 信息序列 身份验证 随机密钥 

分 类 号:O413[理学—理论物理]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象