期刊文献+

基于腔QED的无信息泄露量子对话(英文) 被引量:1

Quantum Dialogue Without Information Leakage via Cavity QED
在线阅读 下载PDF
导出
摘要 良好的安全性对量子保密通信协议而言是不可或缺的,但信息泄露已成为量子对话的一个严重安全威胁.为了解决信息泄露问题,利用腔QED中原子的演化规律提出一个基于腔QED的无信息泄露量子对话协议,利用腔QED中两个Bell态纠缠交换后的测量相关性来克服信息泄露问题.研究表明:该协议能够通过安全检测探测到外部窃听者的主动攻击,如截获-重发攻击、测量-重发攻击和纠缠-测量攻击;在每轮通信可以安全交换4比特秘密信息;对信息泄露问题和外部窃听者的主动攻击,都具备良好的安全性. Good security is indispensable to any quantum secret communication protocol. However, information leakage has been a great security threat to quantum dialogue. In order to solve the problem, a quantum dialogue protocol without information leakage via cavity QED was proposed, which made full use of the evolution law of atoms in cavity QED. The proposed quantum dialogue protocol avoided the information leakage problem by using the measurement correlation property after entanglement swapping between two Bell states via cavity QED, and could securely exchange 4 bits secret messages per round communication. The results show that the proposed protocol is able to detect the active attacks from the outside eavesdropper through security checking, such as the intercept-resend attack, the measurement-resend attack and the entanglement-and-measurement attack. Therefore, it has good security towards both the information leakage problem and the active attacks from the outside eavesdropper.
作者 叶天语
出处 《光子学报》 EI CAS CSCD 北大核心 2014年第3期114-119,共6页 Acta Photonica Sinica
基金 The National Natural Science Foundation of China(No.11375152) the Natural Science Foundation of Zhejiang Province(No.LQ12F02012)
关键词 量子对话 信息泄露 纠缠交换 BELL态 腔QED Quantum dialogue Information leakage Entanglement swapping Bell state Cavity QED
  • 相关文献

参考文献9

二级参考文献150

共引文献57

同被引文献30

  • 1Bennett C H, Brassard G. Quantum cryptography; public- key distribution and coin tossing[A]. Proc. of the IEEE In- ternational Conference on Computers Systems and Signal Processing[C]. 1984,175-179.
  • 2Bennett C H, Brassard G, Mermin N D. Quantum cryptog- raphy without bell theorem[J]. Physical Review Letters, 1992,68:557-559.
  • 3Cabello A. Quantum key distribution in the Holevo limit [J]. Physical Review Letters, 2000,85 : 5635.
  • 4Bostrom K,Felbinger T. Deterministic secure direct com- munication using entanglement[J]. Physical Review Let- ters, 2002,89 : 187902.
  • 5Deng F G, Long G L, Liu X S. Two-step quantum direct communication protocol using the Einstein-Podolsky-Ros- en pair block[J]. Physical Review A, 2003,68 : 042317.
  • 6Cai Q Y,Li B W. Improving the capacity of the Bostrom- Felbinger protocol [J]. Physical Review A, 2004, 69: 054301.
  • 7Deng F G,Long G L. Secure direct communication with a quantum one-time pad[J]. Physical Review A, 2004,69 : 052319.
  • 8Hillery M, Buzek V, Berthiaume A. Quantum secret sharing [J]. Physical Review A, 1999,59 : 1829.
  • 9Guo G P,Guo G C. Quantum secret sharing without entan- glement[J]. Physics Letters A, 2003,3]0 : 247-251.
  • 10Gea-Banacloche J. Hiding messages in quantum data[J]. Journal of Mathematical Physics, 2002, 43 ( 9 ) : 4531- 4536.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部