检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:曹正文[1,2] 赵光[1] 张爽浩 冯晓毅[2] 彭进业[1]
机构地区:[1]西北大学信息科学与技术学院,西安710127 [2]西北工业大学电子信息学院,西安710072
出 处:《物理学报》2016年第23期37-43,共7页Acta Physica Sinica
基 金:陕西省自然科学基金(批准号:2013JM8036)资助的课题~~
摘 要:为了提高量子安全直接通信的效率,本文提出了一种基于Bell态粒子和单光子混合的量子安全直接通信方案.该方案中Alice将所有Bell态粒子划分为两个序列S_A和S_B,先将S_B发给Bob进行第一次窃听检测,检测结果表示量子信道安全后再将信息序列编码在序列S_A和单光子序列S_S混合的量子态序列上;然后将已编码序列经过顺序重排和添加单光子检测粒子后发给合法接收方Bob.该方案避免了复杂的U变换,简化了方案的实现过程.同时顺序重排和检测粒子的结合保证了方案的安全性.另外3 bits经典信息加载在一个态上的编码规则大大提高了编码容量,从而使信息传输效率也得到提高.By studying the properties of the mixture of Bell state particles and single photons, in the paper we design a quantum code scheme with high coding capacity, and propose a novel quantum secure direct communication protocol with high transmission efficiency. Alice prepares Bell state particles and single photons, and divides Bell state particles into two sequences SAand SB. SB is sent to Bob for the first security check through using quantum correlation properties of particles. When the check result shows that the quantum channel is safe, by using the designed quantum code scheme,Alice encodes her classical message on the mixed quantum state sequence of Bell sequence SAand single photon sequence SS. Then, some single photons that are used for security check are re-inserted randomly into the encoded sequence, and the order of particles is rearranged to ensure checking Eve's attack. Alice sends the new sequence to Bob. Bob delays and receives it. And then, the quantum channel conducts the second-time security check. The transmission error rate is calculated, and if the error rate is lower than the tolerance threshold, the channel is safe. Bob decodes and reads Alice's message. The first security check is to determine whether quantum channel is safe. The second security check is to test whether there are eavesdroppers during information transmission. Safety analysis is done by applying the quantum information theory for the proposed protocol. The error rate introduced by Eve and the amount of information by Eve are calculated. It is shown that this pro-tocol can effectively resist measurement-resend attack, intercept-resend attack,auxiliary particle attack, denial of service attack and Trojan attack. Among them, auxiliary particle attack is analyzed in detail. The transmission efficiency and coding capacity are also analyzed. The transmission efficiency is 2, the quantum bit rate is 1, and the coding capacity is that a quantum state can encode three bits of classical messages. We also compare the proposed protoco
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.145