首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
An efficient two-step quantum key distribution (QKD) protocol with orthogonal product states in the n\otimes n(n\geq3)Hilbert space is presented. In this protocol, the particles in the orthogonal product states form two particle sequences. The sender, Alice, first sends one sequence to the receiver, Bob. After Bob receives the first particle sequence, Alice and Bob check eavesdropping by measuring a fraction of particles randomly chosen. After ensuring the security of the quantum channel, Alice sends the other particle sequence to Bob. By making an orthogonal measurement on the two particle sequences, Bob can obtain the information of the orthogonal product states sent by Alice. This protocol has many distinct features such as great capacity, high efficiency in that it uses all orthogonal product states in distributing the key except those chosen for checking eavesdroppers.  相似文献   

2.
杨宇光  温巧燕 《中国物理》2007,16(8):2215-2218
An efficient quantum key distribution (QKD) protocol with orthogonal product states in the 3 \otimes 3 Hilbert space is presented. The sender, Alice, disorders the orthogonal product state sequence and sends it to Bob. After Alice has published the matching information of the particle sequence, Bob recovers the correct correspondences and makes an orthogonal measurement on the orthogonal product states to obtain the information sent by Alice. Finally, security analysis is also made.  相似文献   

3.
控制的量子隐形传态和控制的量子安全直接通信   总被引:6,自引:0,他引:6       下载免费PDF全文
高亭  闫凤利  王志玺 《中国物理》2005,14(5):893-897
我们提出了一个控制的量子隐形传态方案。在这方案中,发送方Alice 在监督者Charlie的控制下以他们分享的三粒子纠缠态作为量子通道将二能级粒子未知态的量子信息忠实的传给了遥远的接受方Bob。我们还提出了借助此传态的控制的量子安全直接通信方案。在保证量子通道安全的情况下, Alice直接将秘密信息编码在粒子态序列上,并在Charlie控制下用此传态方法传给Bob。Bob可通过测量他的量子位读出编码信息。由于没有带秘密信息的量子位在Alice 和Bob之间传送,只要量子通道安全, 这种通信不会泄露给窃听者任何信息, 是绝对安全的。这个方案的的特征是双方通信需得到第三方的许可。  相似文献   

4.
吴承峰  杜亚男  王金东  魏正军  秦晓娟  赵峰  张智明 《物理学报》2016,65(10):100302-100302
测量设备无关量子密钥分发系统能够抵御任何针对单光子探测器边信道的攻击, 进一步结合诱惑态的方案, 可以同时规避准单光子源引起的实际安全漏洞. 测量设备无关量子密钥分发系统中, 非对称传输、分束器的不对称以及各个单光子探测器存在实际参数差异等光学系统的具体实现特征会对系统误码率和成码率等性能产生一定的影响. 本文针对采用弱相干光源的测量设备无关量子密钥分发系统, 引入单光子探测器品质因子的实验参数(暗计数与探测效率的比值), 通过量子化描述, 理论推导并模拟了误码率与单光子探测器品质因子、分束器反射率以及通信双方弱相干光源平均光子数之间的关系. 结果表明: 在X基偏振编码 和相位编码系统中, 当分束器的反射率趋近于0.5时, 误码率取最小值; 在偏振编码和相位编码系统中, 误码率随着单光子探测器品质因子的增大而增大; 在Z基偏振编码系统中, 误码率随分束器的反射率的变化会呈现较小的波动, 当分束器的反射率为0.5时, 若通信双方采用的平均光子数相差较大, 则误码率取最大值; 分束器的反射率和平均光子数对误码率的影响在Z基情况下不能等同, 但是对于X基编码和相位编码却能等同.  相似文献   

5.
We suggest a method for transferring an unknown quantum state. In this method the sender Alice first applies a controlled-not operation on the particle in the unknown quantum state and an ancillary particle which she wants to send to the receiver Bob. Then she sends the ancillary particle to Bob. When Alice is informed by Bob that the ancillary particle is received, she performs a local measurement on her particle and sends Bob the outcome of the local measurement via a classical channel. Depending on the outcome Bob can restore the unknown quantum state, which Alice destroyed, on the ancillary particle successfully. As an application of this method we propose a quantum secure direct communication protocol. By introducing the decoy qubits the security of the scheme is guaranteed.  相似文献   

6.
可控量子秘密共享协议窃听检测虚警概率分析   总被引:2,自引:2,他引:0  
叶天语  蒋丽珍 《光子学报》2012,41(9):1113-1117
对孙莹等提出的利用Greenberger-Horne-Zeilinger态实现的可控量子秘密共享协议Alice-Bob信道和Alice-Charlie信道窃听检测的虚警概率进行分析,指出该协议窃听检测虚警概率不为0的原因在于窃听检测测量基选择的随机性.然后,提出一种改进的利用Greenberger-HorneZeilinger态实现的可控量子秘密共享协议,以确定性的方式选择窃听检测的测量基.理论分析表明,改进的利用Greenberger-Horne-Zeilinger态实现的可控量子秘密共享协议不仅能够以原协议2倍的概率发现任何一个内部不可信方,从而具有更高的安全性,而且窃听检测虚警概率达到0.  相似文献   

7.
杜亚男  解文钟  金璇  王金东  魏正军  秦晓娟  赵峰  张智明 《物理学报》2015,64(11):110301-110301
测量设备无关量子密钥分发系统可以免疫任何针对探测器边信道的攻击, 并进一步结合诱惑态方法规避了准单光子源引入的实际安全性问题. 目前实验中一般采用弱相干光源, 但是该光源含有一定比例的空脉冲和多光子脉冲. 本文针对弱相干光源的具体特性, 采用量子力学的描述, 将各个器件进行量子化处理, 并同时考虑探测器的具体性能参数的影响, 分别给出了通信双方各自发送的脉冲含有特定光子数时产生的成功贝尔态和错误贝尔态的概率公式, 从理论上对相位编码和偏振编码测量设备无关量子密钥分发系统的误码率进行了定量分析, 分别推导并模拟了通信双方采用的平均光子数对称和不对称时误码率随传输距离的变化情况, 结果表明在偏振编码Z基中, 多光子脉冲不会引起误码; 在偏振编码X基和相位编码中, 受多光子影响, 产生的误码率较大. 对于不同的编码方式, 误码率均随传输距离的增加有不同程度的升高, 长距离传输时, 平均光子数越小, 产生的误码率越大; 在偏振编码X基和相位编码的短距离传输中, 相对于对称, 通信双方采用的平均光子数不对称时产生的误码率较大.  相似文献   

8.
郑晓毅  龙银香 《物理学报》2017,66(18):180303-180303
提出了一种基于五粒子cluster态的信道容量可控的可控量子安全直接通信方案.通信三方利用五粒子cluster态自身的粒子分布情况,结合诱骗光子,对粒子分别做Z基单粒子测量和Bell基测量,便可完成信道的第一次安全性检测.通信控制方Cindy通过对手中的粒子序列随机选用测量基(Z基或者X基)测量来决定信道容量,并通过经典信道公布结果.发送方Alice将要发送的信息以及校检信息用于对手中的粒子序列进行幺正操作编码,并插入诱骗光子后将编码后的粒子序列发给接收方Bob并通过经典信道告知其诱骗光子的位置信息.Bob接收到粒子序列后,按照经典信道Alice发送的信息,结合Cindy公布的信息,剔除诱骗光子后按照一定的规则对手中的两组粒子序列进行Bell基测量,便可解码完成第二次安全性检测以及得到Alice发送的信息.通过对五粒子cluster态的纠缠结构性质进行分析,阐明了五粒子cluster态在该方案中所表现出的特点的物理缘由.结果表明,只需变化测量基的规则和用于编码的粒子,可以将该方案推广成可控双向量子安全直接通信.  相似文献   

9.
In this paper we introduce a controlled teleportation protocol for transferring arbitrary two-qubit states bilaterally between Alice and Bob. The bidirectional teleportation protocol is supervised by a controller Charlie. A ten-qubit entangled quantum channel shared between Alice, Bob and Charlie is utilized. The protocol depends on Bell state measurements by Alice and Bob and single-qubit measurements by Charlie.  相似文献   

10.
Hua Lu 《Optics Communications》2011,284(8):2254-2256
We present an asymptotic security proof of deterministic quantum key distribution (DQKD) with a two-way quantum channel. The security proof of DQKD with a two-way quantum channel is different from that of BB84, because Eve can attack the travel qubits twice, both in line Bob to Alice and in line Alice to Bob. With the no-signaling principle and the property of mutual information, we obtain an upper bound of the final key generation of entanglement-based DQKD and hence single-photon four-state DQKD. Our results can be applied to the protocol of QKD with two-step quantum channels.  相似文献   

11.
量子隐形传态的杰出安全特性使其在未来的通讯领域充满潜力.量子力学的不确定性原理和不可克隆定理禁止对量子态进行直接复制,因此,量子隐形传态将量子态划分为经典和量子两部分,信息分别经由经典和量子通道从发送者Alice传递给远方的接收者Bob,根据这两种信息,Bob实行相应操作就可以以一定的几率重建初始传送态.利用一般意义的隐形传态方案,提出一种简便的新方法实现了一个N粒子任意态的概率传态.方法采用N个非最大纠缠的三粒子GHZ态作为量子通道,避免了引入额外的辅助粒子.为了实现传态,Alice将所有粒子分成N份,对第i份的粒子对(i,xi)实行Bell测量并将结果通过经典通道通知Bob,Bob对粒子(yi,zi)进行相应的操作就可以完成第i个粒子信息的传送.当完成N次相似的重复操作后,Bob就可以准确地重建初始传送态.文中以Bell态测量为基本手段,重复的操作同时也降低了实验难度,作为一个特例,文中给出了一个两粒子任意态的传态方案.  相似文献   

12.
We show that non-maximally entangled states can be used to build a quantum key distribution (QKD) scheme where the key is probabilistically teleported from Alice to Bob. This probabilistic aspect of the protocol ensures the security of the key without the need of non-orthogonal states to encode it, in contrast to other QKD schemes. Also, the security and key transmission rate of the present protocol is nearly equivalent to those of standard QKD schemes and these aspects can be controlled by properly harnessing the new free parameter in the present proposal, namely, the degree of partial entanglement. Furthermore, we discuss how to build a controlled QKD scheme, also based on partially entangled states, where a third party can decide whether or not Alice and Bob are allowed to share a key.  相似文献   

13.
A protocol for remotely preparing a four-particle entangled cluster-type state by a set of new four-particle orthogonal basis projective measurement. It is secure that the entangled four-particle cluster-type state can be successfully realized at Bob place. Moreover we have also investigated that quantum channel shared by Alice and Bob is composed of four non-maximally entangled states. It is shown that Bob can also reestablish the original state (to be prepared remotely) with certain probability by means of appropriate unitary transformation.  相似文献   

14.
基于光子轨道角动量的密码通信方案研究   总被引:2,自引:0,他引:2       下载免费PDF全文
设计了一个基于两个正交的光子轨道角动量态的量子密码通信方案.在该方案中,Alice使用具有独特设计的激光器,随机发送有确定轨道角动量的光子;Bob采用由两个达夫棱镜组成的光束旋转器,对光子的轨道角动量态进行测量.对系统安全性的讨论表明,Eve采用截获重发、攻击单臂等攻击手段,其窃听行为都会被发现.理论证明,该方案不需要通信双方实时监测和调整参考系,同时避免了BB84,B92协议因发送基和测量基不一致而丢弃一半信息的问题,从而提高了密钥生成效率. 关键词: 量子保密通信 轨道角动量  相似文献   

15.

A new quantum bi-signature scheme based on GHZ states and W states is proposed. In the proposed scheme, Alice and Bob sign one same message and send their signatures to Charlie. Different from some typical quantum signature schemes, the new quantum bi-signature scheme firstly sets up a secure channel and the three parties verify each other with the correlation of GHZ states. Then Alice, Bob and Charlie utilize the measurement outcomes of W states to implement signature and verification. The proposed scheme without any key converts the message with quantum one-way function to improve the security. The new quantum bi-signature scheme can solve the most issues of two-way choice in real life, and analysis results show that the proposed scheme is secure and efficient. Furthermore, the proposed scheme can be implemented with the existing physical technologies.

  相似文献   

16.
We propose a novel quantum key distribution scheme by using the SAM-OAM hybrid entangled state as the physical resource.To obtain this state,the polarization entangled photon pairs are created by the spontaneous parametric down conversion process,and then,the q-plate acts as a SAM-to-OAM transverter to transform the polarization entangled pairs into the hybrid entangled pattern,which opens the possibility to exploit the features of the higher-dimensional space of OAM state to encode information.In the manipulation and encoding process,Alice performs the SAM measurement by modulating the polarization stateπ lθx on one photon,whereas Bob modulates the OAM sector state lx' on the other photon to encode his key elements using the designed holograms which is implemented by the computer-controlled SLM.With coincidence measurement,Alice could extract the key information.It is showed that N-based keys can be encoded with each pair of entangled photon,and this scheme is robust against Eve’s individual attack.Also,the MUBs are not used.Alice and Bob do not need the classical communication for the key recovery.  相似文献   

17.
给出了窃听者采用各种窃听策略,使用最先进的仪器(段-郭概率量子克隆机)的条件下BB84协议的非一般安全性分析,推导出Eve使用段-郭概率量子克隆机时,Alice和Bob间的码差错率下降为20.7%,这说明BB84协议的安全性仍然有效.最后用BB84协议对量子密钥生成与分发进行了程序模拟.  相似文献   

18.
In this paper, we propose a protocol where one can realize reestablishment of an unknown state and its orthogonal complement state with a certain probability. In the first stage of the protocol, teleportation is performed between Alice (a sender) and Bob (a receiver) through a nonmaximally entangled quantum channel. In the process of teleportation, Alice performs nonmaximally entangled state measurement. In the second stage of the protocol, Victor(a state preparer) disentangles leftover nonmaximally entangled states by a single-particle measurement. With the assistance of Victor Alice can reestablish the original state or produce its orthogonal state.  相似文献   

19.
We present an efficient scheme for sharing an arbitrary m-qubitstate with n agents. In our scheme, the sender Alice first shares mBell states with the agent Bob, who is designated to recover the originalm-qubit state. Furthermore, Alice introduces n-1 auxiliary particlesin the initial state |0>, applies Hadamard (H) gate and Controlled-Not (CNOT) gate operations on the particles, which make them entangled with one of m particle pairs in Bell states, and then sends them to the controllers (i.e., other n-1 agents), where each controller only holds one particle in hand. After Alice performing m Bell-basis measurements and each controller a single-particle measurement, the recover Bob can obtain the original unknown quantum state by applying the corresponding local unitary operations on his particles.Its intrinsic efficiency for qubits approaches 100%, and the total efficiency really approaches the maximal value.  相似文献   

20.
杨杰 《中国物理》2005,14(11):2149-2152
Utilizing both the general quantum teleportation and the two-step protocol, a new method is presented by which multi-qubit quantum information can be teleported in a much easier way from a sender Alice to a receiver Bob via the control of many agents in a network than by Yang et al's method. In this method, only all the agents collaborate with Bob can the unknown states in Alice's qubits be fully reconstructed in Bob's qubits. Comparisons between the method and Yang et al's method are made. Results show that, in this method, the preparation difficulty of initial states and the identification difficulty of entangled states are considerably reduced, new method is more feasible in technique, and Hadamard operations are not needed at all.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号