Deterministic Secure Quantum Communication and Authentication Protocol based on Extended GHZ-W State and Quantum One-time Pad

被引:13
作者
Li, Na [1 ,2 ]
Li, Jian [1 ,3 ]
Li, Lei-Lei [1 ]
Wang, Zheng [1 ]
Wang, Tao [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Comp Sci, Beijing 100876, Peoples R China
[2] JiLin Med Univ, Changchun 132013, Jilin, Peoples R China
[3] Univ Sci & Technol China, Hefei Natl Lab Phys Sci Microscale, Hefei 230026, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金; 中国博士后科学基金;
关键词
Deterministic secure quantum communication; Extended GHZ-W state; One-time pad; Authentication; KEY DISTRIBUTION; CRYPTOGRAPHY;
D O I
10.1007/s10773-016-2986-y
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
A deterministic secure quantum communication and authentication protocol based on extended GHZ-W state and quantum one-time pad is proposed. In the protocol, state |phi (-)> is used as the carrier. One photon of |phi (-)> state is sent to Alice, and Alice obtains a random key by measuring photons with bases determined by ID. The information of bases is secret to others except Alice and Bob. Extended GHZ-W states are used as decoy photons, the positions of which in information sequence are encoded with identity string ID of the legal user, and the eavesdropping detection rate reaches 81%. The eavesdropping detection based on extended GHZ-W state combines with authentication and the secret ID ensures the security of the protocol.
引用
收藏
页码:3579 / 3587
页数:9
相关论文
共 25 条
[1]   Using quantum key distribution for cryptographic purposes: A survey [J].
Alleaume, R. ;
Branciard, C. ;
Bouda, J. ;
Debuisschert, T. ;
Dianati, M. ;
Gisin, N. ;
Godfrey, M. ;
Grangier, P. ;
Laenger, T. ;
Luetkenhaus, N. ;
Monyk, C. ;
Painchault, P. ;
Peev, M. ;
Poppe, A. ;
Pornin, T. ;
Rarity, J. ;
Renner, R. ;
Ribordy, G. ;
Riguidel, M. ;
Salvail, L. ;
Shields, A. ;
Weinfurter, H. ;
Zeilinger, A. .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :62-81
[2]  
[Anonymous], 1926, J AIEE
[3]   Secure communication with single-photon two-qubit states [J].
Beige, A ;
Englert, BG ;
Kurtsiefer, C ;
Weinfurter, H .
JOURNAL OF PHYSICS A-MATHEMATICAL AND GENERAL, 2002, 35 (28) :L407-L413
[4]  
Bennett C.H., 1984, PROC IEEE INT C COMP, P175, DOI DOI 10.1016/J.TCS.2014.05.025
[5]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[6]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[7]   On the security of the ping-pong protocol [J].
Bostroem, Kim ;
Felbinger, Timo .
PHYSICS LETTERS A, 2008, 372 (22) :3953-3956
[8]   Superconducting nanowire single-photon detection system and demonstration in quantum key distribution [J].
Chen SiJing ;
Liu DengKuan ;
You LiXing ;
Wang YongLiang ;
Qiu LongQing ;
Xie XiaoMing ;
Jiang MianHeng ;
Chen TengYun ;
Liu Yang ;
Miki, Shigehito ;
Wang Zhen .
CHINESE SCIENCE BULLETIN, 2013, 58 (10) :1145-1149
[9]   An authentication scheme with high throughput based on FPGA for a practical QKD system [J].
Cui, Ke ;
Wang, Jian ;
Zhang, Hong-fei ;
Lin, Sheng-zhao ;
Yang, Dong-xu ;
Chen, Teng-yun .
OPTIK, 2015, 126 (23) :4747-4750
[10]   Entanglement assisted single-photon W state amplification [J].
Feng, Zhao-Feng ;
Yang Ou-Yang ;
Zhou, Lan ;
Sheng, Yu-Bo .
OPTICS COMMUNICATIONS, 2015, 340 :80-85