首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到17条相似文献,搜索用时 93 毫秒
1.
QKD扩展BB84协议的Breidbart基窃听问题   总被引:7,自引:1,他引:6       下载免费PDF全文
杨理  吴令安  刘颂豪 《物理学报》2002,51(5):961-965
给出了六态扩展BB84协议的Breidbart基窃听方案,分析并计算了各种截取重发策略下的AliceEve平均交互信息量和施行QKD标准纠错手续后的有效平均交互信息量,结果显示Breidbart基窃听Breidbart基重发策略(BB策略)最为有效.考虑到Alice和Bob可以在公开讨论阶段利用废弃数据检验是否存在BB窃听以降低秘密性增强算法的强度,减少量子密钥的损失,提出了修改BB84协议的建议.给出了可能较QKD标准纠错手续更为安全的量子密钥二次生成纠错方法 关键词: 量子密码 BB84协议 Breidbart基窃听  相似文献   

2.
实际量子密钥分配扩展BB84协议窃听下的安全性分析   总被引:10,自引:10,他引:0  
考虑强衰减激光脉冲技术实现的准单光子源和量子信道损耗以及窃听者Eve窃听能力有限等实际情况, 提出了一种窃听装置;同时对扩展BB84协议的各种窃听做了全面分析,计算得出发送者Alice/窃听者Eve所获得的交互信息量和发送者Alice/接收者Bob所能容忍的误码率上限,以此作为检测量子信道安全性的标准,同时得出Breidbart基/分束攻击相结合的方法是比截取/重发更为有效的窃听方案.  相似文献   

3.
基于光子轨道角动量的密码通信方案研究   总被引:2,自引:0,他引:2       下载免费PDF全文
设计了一个基于两个正交的光子轨道角动量态的量子密码通信方案.在该方案中,Alice使用具有独特设计的激光器,随机发送有确定轨道角动量的光子;Bob采用由两个达夫棱镜组成的光束旋转器,对光子的轨道角动量态进行测量.对系统安全性的讨论表明,Eve采用截获重发、攻击单臂等攻击手段,其窃听行为都会被发现.理论证明,该方案不需要通信双方实时监测和调整参考系,同时避免了BB84,B92协议因发送基和测量基不一致而丢弃一半信息的问题,从而提高了密钥生成效率. 关键词: 量子保密通信 轨道角动量  相似文献   

4.
基于实际量子密钥分配系统中所使用的强衰减的激光脉冲不是单光子,量子密钥分配的信道不是无损耗的,光子计数器存在探测效率和暗计数以及窃听者的技术能力也不是无限的这些具体问题.采用了分束与Breidbart基相结合的窃听策略讨论了窃听问题并给出了合法用户在筛选后的密钥中所能容忍的误码率上限公式. 关键词: 量子密钥分配 六态协议 光子数统计分布 Breidbart基窃听  相似文献   

5.
给出了窃听者采用各种窃听策略,使用最先进的仪器(段-郭概率量子克隆机)的条件下BB84协议的非一般安全性分析,推导出Eve使用段-郭概率量子克隆机时,Alice和Bob间的码差错率下降为20.7%,这说明BB84协议的安全性仍然有效.最后用BB84协议对量子密钥生成与分发进行了程序模拟.  相似文献   

6.
控制的量子隐形传态和控制的量子安全直接通信   总被引:6,自引:0,他引:6       下载免费PDF全文
高亭  闫凤利  王志玺 《中国物理》2005,14(5):893-897
我们提出了一个控制的量子隐形传态方案。在这方案中,发送方Alice 在监督者Charlie的控制下以他们分享的三粒子纠缠态作为量子通道将二能级粒子未知态的量子信息忠实的传给了遥远的接受方Bob。我们还提出了借助此传态的控制的量子安全直接通信方案。在保证量子通道安全的情况下, Alice直接将秘密信息编码在粒子态序列上,并在Charlie控制下用此传态方法传给Bob。Bob可通过测量他的量子位读出编码信息。由于没有带秘密信息的量子位在Alice 和Bob之间传送,只要量子通道安全, 这种通信不会泄露给窃听者任何信息, 是绝对安全的。这个方案的的特征是双方通信需得到第三方的许可。  相似文献   

7.
为了改善BB84协议防窃听的能力,在BB84协议的基础上提出用M(M=3,4,5…)对量子态实现量子密钥分配。为了检测其安全性,用截获-重发的方式对量子密钥分配过程进行窃听,窃听者分别采用两种检测光子状态的方法:在M组基中随机选取一种基和用Breidbart基测量,并在这两种窃听方法下分别通过计算机仿真探究M值与安全性能的关系。仿真结果表明:用多对量子态实现量子密钥分配时,发现窃听者的能力与BB84协议相同,而窃听者可以获取的正确信息要比窃听BB84协议获取的正确信息少。从而提高了量子密钥分配的安全性。  相似文献   

8.
基于cluster态具有较强的纠缠顽固性,提出两个利用四粒子cluster态传送任意单粒子态的量子信息共享方案.第一个方案中发送者Alice、控制者Charlie和接收者Bob共享一个四粒子纠缠态,首先Alice对自己拥有的粒子执行一个三粒子Von-Neumann联合测量,然后Charlie对其拥有粒子执行Z基测量,最后Bob根据发送者和控制者的测量结果,对所拥有的粒子做适当的幺正变换,就能重建共享的单粒子任意态.第二个方案利用一个辅助粒子,发送者Alice、控制者Charlie只需做Bell基测量,Bob通过比特位翻转和幺正变换即可得到Alice传送的量子态.与已有方案相比,两方案信息共享的成功概率为100%,且只需四粒子cluster态为载体,可在目前实验室技术条件下实现.  相似文献   

9.
提出了一个利用五粒子团簇态实现的可控量子安全直接通信方案.在这一方案中,首先信息发送者Alice、信息接收者Bob和控制者Charlie共享由Alice制备的一有序序列团簇态作为量子信道;在确定量子信道的安全性以后,Alice制备编码量子态(Bell态)序列,然后通过对自己手中的粒子进行Bell基测量,接着Charlie对自己手中的粒子进行单粒子的测量,就能把信息传送给接收者Bob;最后,Bob测量自己手中的粒子,并通过分析三人的测量结果,从而获得Alice要传送的信息.在我们提出的方案中,携带信息的粒子不需要在公共信道上传输.该文中,我们给出了方案的安全性分析,证明了我们的方案是决定性的和安全的.在未来,我们的方案在以目前的实验技术为基础条件下很可能得到实现.  相似文献   

10.
本文设计了一个基于高维单粒子态的双向半量子安全直接通信协议,该协议包括量子方Alice和经典方Bob,每个参与方可以同时接收和发送秘密信息.协议中的经典方Bob无需具备量子态检测能力,因此该协议在现有技术条件下更易实现.安全性分析表明:在不被合法通信者发现的情况下,截获重发、测量重发、篡改攻击以及纠缠攻击等常见攻击手段均无法获取秘密信息.此外,该协议利用高维单粒子态作为信息传输的载体,这有效提高了秘密信息的传输效率.  相似文献   

11.
In this paper, we present a scheme for quantum dialogue by using a four-qubit cluster state as quantum channel.The scheme has two cases: Case 1, Sender Alice and receiver Bob share information using an orderly sequence of entangled state as quantum channel which was prepared by Alice. This case is achieved as follows: The two sides agreed to encode quantum state information, then Alice perform a bell state measurement for quantum information which has been encoded. This will convey the information to Bob, then Bob measuring his own qubits, through the analysis of the measurement results of Alice and Bob, Bob can obtain quantum information. For case 2, four-qubit cluster state and quantum state information is transmitted to form a total quantum system. In the Case 2 scenario, Alice and Bob perform bell state measurements for part of the qubits, and tell the measurement result to each other through the classical channel. Finally, according to the measurement result, Alice and Bob operate an appropriate unitary transformation, as a result, Alice’s qubit will be renewed upon Bob’s measurements, and also, Bob’s qubit will be renewed upon Alice’s measurements. Thus, a bidirectional quantum dialogue is achieved. After analysis, this scheme has high security by taking certain eavesdropping attacks into account. There is therefore a certain reference value to the realization of quantum dialogue.  相似文献   

12.
可控量子秘密共享协议窃听检测虚警概率分析   总被引:2,自引:2,他引:0  
叶天语  蒋丽珍 《光子学报》2012,41(9):1113-1117
对孙莹等提出的利用Greenberger-Horne-Zeilinger态实现的可控量子秘密共享协议Alice-Bob信道和Alice-Charlie信道窃听检测的虚警概率进行分析,指出该协议窃听检测虚警概率不为0的原因在于窃听检测测量基选择的随机性.然后,提出一种改进的利用Greenberger-HorneZeilinger态实现的可控量子秘密共享协议,以确定性的方式选择窃听检测的测量基.理论分析表明,改进的利用Greenberger-Horne-Zeilinger态实现的可控量子秘密共享协议不仅能够以原协议2倍的概率发现任何一个内部不可信方,从而具有更高的安全性,而且窃听检测虚警概率达到0.  相似文献   

13.
We present a continuous variable quantum communication protocol based on bright continuous-wave twin-beams generated by a type-II OPO. Intensity correlation between the beams is used in conjunction with a binary randomization of polarization to guarantee security and reveal eavesdropping actions. The scheme presented is asymmetric. Bob (the receiver) retains one of the beams and sends the other one to Alice after a random rotation of its polarization. The cryptographic key elements are encoded through amplitude modulation by Alice, who sends back her beam to Bob after a second rotation of the polarization. Eventually, the beams are detected by Bob after a further random polarization rotation. The security of the system and the possibility of revealing the eavesdropping action in the case of an individual attack are demonstrated by evaluating the bit error rates.  相似文献   

14.
A new application of the genuinely entangled five-qubit state is investigated for quantum information splitting of a particular type of two-qubit state. In this scheme, a genuinely entangled five-qubit state is shared by Alice (a sender), Charlie (a controller) and Bob (a receiver), and Alice only needs to perform two Bell-state measurements and Charlie performs a single-qubit measurement, Bob can reconstruct the two-qubit state by performing some appropriately unitary transformations on his qubits after he knows the measured results of both Alice and Charlie. This quantum information splitting scheme is deterministic, i.e. the probability of success is 100 %. The presented protocol is showed to be secure against certain eavesdropping attacks.  相似文献   

15.
An efficient two-step quantum key distribution (QKD) protocol with orthogonal product states in the (×)(n ≥3) Hilbert space is presented. In this protocol, the particles in the orthogonal product states form two particle sequences. The sender, Alice, first sends one sequence to the receiver, Bob. After Bob receives the first particle sequence, Alice and Bob check eavesdropping by measuring a fraction of particles randomly chosen. After ensuring the security of the quantum channel, Alice sends the other particle sequence to Bob. By making an orthogonal measurement on the two particle sequences, Bob can obtain the information of the orthogonal product states sent by Alice. This protocol has many distinct features such as great capacity, high efficiency in that it uses all orthogonal product states in distributing the key except those chosen for checking eavesdroppers.  相似文献   

16.
In this paper, we show that a(2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised by first placing the shares of smaller secret pieces into the shares of the largest secret piece, converting the shares of the largest secret piece into corresponding quantum state sequences, inserting nonorthogonal state particles into the quantum state sequences with the purpose of detecting eavesdropping, and finally sending the new quantum state sequences to the three participants respectively. Consequently, every particle can on average carry up to 1.5-bit messages due to the use of recurrence. The control codes are randomly prepared using the way to generate fountain codes with pre-shared source codes between Alice and Bob, making three participants can detect eavesdropping by themselves without sending classical messages to Alice. Due to the flexible encoding, our scheme is also dynamic, which means that it allows the participants to join and leave freely.  相似文献   

17.
We propose a scheme for bidirectional controlled quantum teleportation by using a genuine five-qubit entangled state. In our scheme, Alice may transmit an arbitrary single qubit state of qubit A to Bob and at the same time, Bob may transmit an arbitrary single qubit state of qubit B to Alice via the control of the supervisor Charlie.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号