期刊文献+

四维Hilbert空间上的量子密钥分配协议

A Novel Quantum Key Distribution Protocol on 4-dimensional Hilbert Space
在线阅读 下载PDF
导出
摘要 文中抽出了在4维Hibert空间上的量子密钥分配算法,构造了三种测量基来应对能在两个量子比特上出现的所有错误,保证了窃听检测过程的有效性,从而提供了无条件安全性的根本依据,该协议的最大优势在于显著节省上了量子和经典信息的通信量。 A novel quantum key distribution protocol is proposed in this paper, by constructing three different types of measurement bases. Such unusual construction guarantees that all possible errors occurred on two qubits can be detected, and provides the unconditional security proof. The most distinguishable advantage of the QKD protocol is saving a great amount of quantum and classical communications.
出处 《计算机科学》 CSCD 北大核心 2008年第1期75-76,86,共3页 Computer Science
基金 National Natural Science Foundation of China(No.60672119)。
关键词 量子密码学 错误检测 BELL基测量 无条件安全性 Quantum cryptology, Error detection, Bell-state measurement, Unconditional security
  • 相关文献

参考文献7

  • 1Bennett C H, Brassard G. Quantum cryptography: Public-key distribution and coin tossing. In: Proc. IEEE Int. Conf. on Computers, systems, and signal processing, Bangalore, IEEE, New York, 1984. 175-179.
  • 2Ekert A K. Quantum cryptography based on Belll' s theorem.Phys Rev Lett, 1991, 67:661-663.
  • 3Gao Fei, Guo Fenzhuo, Wen Qiaoyan, Zhu Fuehen. Quantum key distribution without alternative measurements and rotations, Physics Letters A, 2006, 349: 53-58.
  • 4Lo H, Chau H F. Unconditional security of quantum key distribution over arbitrary long distance. Science, 1999, 283, 2050- 2056; Also available at arXive eprint quant-ph/9803006.
  • 5Nielsen M, Chuang I. Quantum Computation and Quantum Information. Cambridge: Cambridge University Press, 2000. 587 -591.
  • 6Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. ,2000, 85:441 -444; Also available at arXive e-print quant-ph/0003004.
  • 7秦素娟,刘太琳,温巧燕.基于纠缠交换和局域操作的量子秘密共享[J].北京邮电大学学报,2005,28(4):74-77. 被引量:8

二级参考文献17

  • 1高飞,温巧燕.一种量子密钥分发和身份认证协议[J].北京邮电大学学报,2004,27(3):98-102. 被引量:10
  • 2温巧燕,高飞,朱甫臣.量子密钥分发中身份认证问题的研究现状及方向[J].北京邮电大学学报,2004,27(5):1-6. 被引量:11
  • 3GAOFei,WENQiao-yan,ZHUFu-chen.Quantum Key Distribution Based on Entangled States and Non-Orthogonal States[J].The Journal of China Universities of Posts and Telecommunications,2004,11(4):33-36. 被引量:3
  • 4Shamir A. How to share a secret[J]. Communications of theACM, 1979, 22(11): 612-613.
  • 5Blakley G R. Safeguarding cryptographic keys[A]. Proceedings of the National Computer Conference[C]. New York: AFIPS Press, 1979. 313-317.
  • 6Bennett C H, Brassard G. Quantum cryptography: public-key distribution and coin tossing[A]. Proceedings of the International Conference on Computers, Systems and Signal Processing [C]. India: Bangalore Press, 1984.175-179.
  • 7Bennett C H. Quantum cryptography using any two nonorthogonal states[J]. Physical Review Letters, 1992,68. 3121-3124.
  • 8Ekert A K. Quantum cryptography based on Bell' s theorem[J]. Physical Review Letters, 1991, 67. 661-663.
  • 9Hillery M, Buzek V, Berthiaume A. Quantum secret sharing[J]. Physical Review A, 1999, 59: 1829.
  • 10Karlsson A, Koashi M, Imoto N. Quantum entanglement for secret sharing and secret splitting[J]. Physical Review A, 1999, 59: 162.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部