A Quantum Key Distribution Protocol Based on the EPR Pairs and its Simulation

被引:6
作者
Li, Jian [1 ,2 ]
Li, Hengji [2 ]
Wang, Na [2 ]
Li, Chaoyang [2 ]
Hou, Yanyan [1 ]
Chen, Xiubo [3 ]
Yang, Yuguang [4 ]
机构
[1] ZaoZhuang Univ, Ctr Quantum Informat Res, Zaozhuang 277160, Shandong, Peoples R China
[2] Beijing Univ Posts Telecommun, Sch Comp Sci, Beijing 100876, Peoples R China
[3] Beijing Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[4] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Quantum key distribution; Entanglement; Quantum circuit simulation; SECURE DIRECT COMMUNICATION; ENTANGLED STATES; CRYPTOGRAPHY;
D O I
10.1007/s11036-019-01408-2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A novel quantum key distribution protocol based on the entanglement and dense coding is proposed, in which the memory of the quantum state is not needed. Every four particles are divided into a group, in which {(1,2),(3,4)} or {(1,3),(2,4)} are in entanglement. Some of the groups are used to transmit the message, and the others are used to check for the eavesdropping. In the message mode, the authorized party, who does not need to know the specific location information of the group, can make the unitary operation to the first and the fourth of the group. In addition, the trade-off between the information and the disturbance is calculated under the intercept-measure-resend attack and the entanglement-measure attack, which proves that the protocol is asymptotically secure. Moreover, the quantum circuit simulation of the protocol is shown.
引用
收藏
页码:620 / 628
页数:9
相关论文
共 53 条
[1]   Quantum Key Distribution in the Presence of the Intercept-Resend with Faked States Attack [J].
Adrian Lizama-Perez, Luis ;
Mauricio Lopez, Jose ;
De Carlos Lopez, Eduardo .
ENTROPY, 2017, 19 (01)
[2]  
高飞, 2009, [中国科学. G辑, 物理学,力学,天文学, Science in China. Series G, Physics, Mechanics & Astronomy], V39, P161
[3]  
[Anonymous], 2019, CER RES TREAT, DOI [10.1007/s10549-019-05472-w, DOI 10.1007/S10549-019-05472-W]
[4]  
[Anonymous], 2017, CHINESE PHYS B, DOI DOI 10.1088/1674-1056/26/3/030302
[5]   ELEMENTARY GATES FOR QUANTUM COMPUTATION [J].
BARENCO, A ;
BENNETT, CH ;
CLEVE, R ;
DIVINCENZO, DP ;
MARGOLUS, N ;
SHOR, P ;
SLEATOR, T ;
SMOLIN, JA ;
WEINFURTER, H .
PHYSICAL REVIEW A, 1995, 52 (05) :3457-3467
[6]  
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[7]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[8]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[9]   Deterministic secure direct communication using entanglement -: art. no. 187902 [J].
Boström, K ;
Felbinger, T .
PHYSICAL REVIEW LETTERS, 2002, 89 (18) :187902/1-187902/4
[10]   Optimal eavesdropping in quantum cryptography with six states [J].
Bruss, D .
PHYSICAL REVIEW LETTERS, 1998, 81 (14) :3018-3021