Quantum public-key cryptosystem without exchanging qubits between any two users

被引:0
作者
Li X. [1 ]
Shang Y. [2 ,3 ]
机构
[1] School of Information Engineering, Zhengzhou University, Zhengzhou City
[2] Institute of Mathematics, Academy of Mathematics and System Science, CAS, Beijing City
[3] NCMIS, Academy of Mathematics and System Science, CAS, Beijing City
来源
| 1600年 / Computer Society of the Republic of China卷 / 28期
基金
中国国家自然科学基金;
关键词
Digital signature; Entangled states; Quantum cryptography; Quantum public-key cryptosystem;
D O I
10.3966/199115992017122806002
中图分类号
学科分类号
摘要
A quantum public-key cryptosystem using entangled states is present in this paper. Every user shares a set of entangled quantum systems with the key management center (KMC) as the (private key, public key) pair. When a user wants to send encrypted message to another user, he or she asks KMC for the latter’s public key and produces a string to encrypt his or her pain text. Then the latter can get the same string using the correlations between the subsystems of the entangled quantum systems and recover the plain text while no third one can make it. So users can achieve secret communication and digital signature by the help of KMC. The principles of quantum physics guarantee the unconditional security of the cryptosystem. Any two users needn’t performing exchanging quantum systems with each other. So it is easier to carry out and more robust in practice.
引用
收藏
页码:13 / 25
页数:12
相关论文
共 30 条
  • [1] Bennett C.H., Brassard G., Quantum cryptography: Public-key distribution and tossing, Proc. IEEE International Conference on Computers, Systems and Signal Processing, (1984)
  • [2] Ekert A.K., Quantum cryptography based on Bell’s theorem, Physical Review Letters, 67, 6, pp. 661-663, (1991)
  • [3] Bennett C.H., Brassard G., Mermin N.D., Quantum cryptography without Bell’s theorem, Physical Review Letters, 68, 5, pp. 557-559, (1992)
  • [4] Lo H.-K., Chau H.F., Unconditional security of quantum key distribution over arbitrarily long distances, Science, 283, pp. 2050-2056, (1999)
  • [5] Cabello A., Quantum key distribution in the holevo limit, Physical Review Letters, 85, 26, pp. 5635-5638, (2000)
  • [6] Nguyen T., Sfaxi M.A., Ghernaouti-Helie S., 802.11i encryption key distribution using quantum cryptography, Journal of Networks, 1, 5, pp. 9-20, (2006)
  • [7] Namiki R., Hirano T., Efficient-phase-encoding protocols for continuous-variable quantum key distribution using coherent states and postselection, Physical Review A, 74, 3, (2006)
  • [8] Qi B., Zhao Y., Ma X.F., Lo H.K., Qian L., Quantum key distribution with dual detectors, Physical Review A, 75, 5, (2007)
  • [9] MatsumotoH R., Quantum multiparty key distribution protocol without use of entanglement, Physical Review A, 76, 6, (2007)
  • [10] Zhao Y., Qi B., Lo H.K., Quantum key distribution with an unknown and untrusted source, Physical Review A, 77, 5, (2008)