搜索

x

留言板

姓名
邮箱
手机号码
标题
留言内容
验证码

downloadPDF
引用本文:
Citation:

    周贤韬, 江英华, 郭晓军, 彭展

    Quantum secure direct communication scheme based on the mixture of single photon and Bell state with two way authentication

    Zhou Xian-Tao, Jiang Ying-Hua, Guo Xiao-Jun, Peng Zhan
    PDF
    HTML
    导出引用
    • 针对量子安全直接通信中身份认证的需要, 提出一种. 通信开始前通信双方共享一串秘密信息, 先利用单光子来验证接收方的合法性, 再利用Bell态粒子验证发送方的合法性, 之后将Bell态粒子与单光子混合作为载体发送. 每一次发送量子态时都加入窃听检测粒子, 而一旦窃听者截获发送粒子, 由于得到的是不完整的粒子, 窃听者无法恢复原始信息, 并且窃听行为会立刻被发现, 从而终止通信. 本方案中单光子和Bell态充得到分利用, 且混合之后的通信能有效提高传输效率和编码容量以及量子比特利用率. 安全性分析证明, 本方案能抵御常见的外部攻击和内部攻击.
      In response to the demand for identity authentication in quantum secure direct communication, this paper proposes a quantum secure direct communication scheme based on a mixture of single photon and Bell state, by combining the bidirectional identity authentication. Before communication begins, both parties share a series of secret information to prepare a series of single photon and Bell state particles. Encoding four single photons and four Bell states yields eight types of encoded information, followed by identity authentication. The first step in identity authentication is to use a single photon to verify the legitimacy of the receiver. If the error exceeds the given threshold, it indicates the presence of eavesdropping. Otherwise, the channel is safe. Then, Bell state particles are used to verify the legitimacy of the sender, and the threshold is also used to determine whether there is eavesdropping. The present method is the same as previous one. If the error rate is higher than the given threshold, it indicates the existence of third-party eavesdropping. Otherwise, it indicates that the channel is secure. As for the specific verification method, it will be explained in detail in the article. Afterwards, Bell state particles are mixed with a single photon as a transmission carrier, and eavesdropping detection particles are added whenever the quantum state is sent. However, once the eavesdropper intercepts the transmitted particles, owing to incomplete information obtained, the eavesdropper is unable to recover the original information, and the eavesdropping behavior will be immediately detected, thus terminating communication. In this scheme, single photon and Bell states are fully utilized, and hybrid communication can effectively improve transmission efficiency, encoding capability, and quantum bit utilization. Security analysis shows that this scheme can resist common external and internal attacks such as interception/measurement replay attacks, auxiliary particle attacks, and identity impersonation attacks. The analysis of efficiency and encoding capacity shows that the transmission efficiency of this scheme is 1, the encoding capacity is 3 bits per state, and the quantum bit utilization rate is 1. Compared with other schemes, this scheme has significant advantages because it uses different particles for bidirectional authentication, making it more difficult for attackers to crack, and thus it has higher security than traditional schemes.
          通信作者:江英华,250364629@qq.com
        • 基金项目:陕西省教育厅科研专项科学研究计划(批准号: 19JK0889)和西藏自治区自然科学基金(批准号: XZ2019ZRG-36(Z), XZ202101ZR0089G)资助的课题.
          Corresponding author:Jiang Ying-Hua,250364629@qq.com
        • Funds:Project supported by the Department of Education Research Special Scientific Research Plan of Shaanxi Province, China (Grant No. 19JK0889) and the Natural Science Foundation of Tibet Autonomous Region, China (Grant Nos. XZ2019ZRG-36(Z), XZ202101ZR0089G).
        [1]

        [2]

        [3]

        [4]

        [5]

        [6]

        [7]

        [8]

        [9]

        [10]

        [11]

        [12]

        [13]

        [14]

        [15]

        [16]

        [17]

        [18]

        [19]

        [20]

        [21]

        [22]

        [23]

        [24]

        [25]

        [26]

        [27]

        [28]

        [29]

        [30]

        [31]

      • 单光子 表示的经典信息 Bell态 表示的经典信息
        $ | 0 \rangle $ 000 $ | {{\psi ^ + }} \rangle $ 010
        $| 1 \rangle $ 111 $ | {{\psi ^ - }} \rangle $ 101
        $ | + \rangle $ 001 $| {{\varphi ^ + }} \rangle $ 011
        $ | - \rangle $ 110 $| {{\varphi ^ - }} \rangle $ 100
        下载: 导出CSV

        1 2 3 4
        秘钥K 1 0 0 1
        序列$ {S_n} $量子态 $ | + \rangle $ $ | 0 \rangle $ $ | 0 \rangle $ $ | + \rangle $
        合法Alice根据K
        选测量基
        X Z Z X
        合法Alice测量结果 $ | + \rangle $ $ | 0 \rangle $ $ | 0 \rangle $ $ | + \rangle $
        冒充Alice测量结果
        (随机选择测量基)
        50%$ | + \rangle $
        25%$ | 0 \rangle $
        25%$ | 1 \rangle $
        50%$ | 0 \rangle $
        25%$ | + \rangle $
        25%$ | - \rangle $
        50%$ | 0 \rangle $
        25%$ | + \rangle $
        25%$ | - \rangle $
        50%$ | + \rangle $
        25%$ | 0 \rangle $
        25%$ | 1 \rangle $
        下载: 导出CSV

        ${\varphi }^{+}或{\varphi }^{-}$在$ {S}_{1} $中位置 1 4 5 9 11 12 15 17 18 $ \cdots $
        量子态 $ |0 \rangle $ $ | + \rangle $ $ |0 \rangle $ $ | + \rangle $ $ |- \rangle $ $ |1 \rangle $ $ |0 \rangle $ $ |- \rangle $ $ | + \rangle $ $ \cdots $
        共享秘钥K 1 0 0 1
        Alice公布位置L 4 5 15 18
        根据K选择测量基 X Z Z X
        合法Bob测量结果 $ | + \rangle $ $ |0 \rangle $ $ |0 \rangle $ $ | + \rangle $
        冒充Bob 测量结果 $50{\text{%}} | + \rangle $

        $25{\text{%}} |0 \rangle $

        $25{\text{%}} |1 \rangle $
        $ 50{\text{%}}|0 \rangle $

        $25{\text{%}} | + \rangle $

        $25{\text{%}} |- \rangle $
        $ 50{\text{%}}|0 \rangle $

        $ 25{\text{%}} | + \rangle $

        $25{\text{%}} |- \rangle $
        $50{\text{%}} | + \rangle $

        $25{\text{%}} |0 \rangle $

        $25{\text{%}} |1 \rangle $
        下载: 导出CSV

        1 2 3 4 5 6 7 8
        秘密信息M 010 111 011 110 011 110 000 100
        混合态序列${S}_{1-S}$量子态 $ \left| {{\psi ^ + }} \right\rangle $ $ \left| 1 \right\rangle $ $\left| {{\varphi ^ + }} \right\rangle $ $ \left| - \right\rangle $ $\left| {{\varphi ^ + }} \right\rangle $ $ \left| - \right\rangle $ $ \left| 0 \right\rangle $ $\left| {{\varphi ^ - }} \right\rangle $
        Alice公布的测量基 Bell基 Z Bell基 X Bell基 X Z Bell基
        Bob测量结果 $ \left| {{\psi ^ + }} \right\rangle $ $ \left| 1 \right\rangle $ $\left| {{\varphi ^ + }} \right\rangle $ $ \left| - \right\rangle $ $\left| {{\varphi ^ + }} \right\rangle $ $ \left| - \right\rangle $ $ \left| 0 \right\rangle $ $\left| {{\varphi ^ - }} \right\rangle $
        解码得信息M 010 111 011 110 011 110 000 100
        下载: 导出CSV

        协议 传输
        效率ξ
        量子比特
        利用率η
        编码容量
        QSDC协议[10] 1 1 一个态: 1.0 bit
        One-Pad-Time-QSDC
        协议[11]
        1 1 一个态: 1.0 bit
        基于纠缠交换的
        QSDC协议[12]
        1 1 一个态: 1.0 bit
        Bell态和单光子
        混合QSDC协议[22]
        1 1 一个态: 1.5 bits
        本协议 1 1 一个态: 3.0 bits
        下载: 导出CSV
      • [1]

        [2]

        [3]

        [4]

        [5]

        [6]

        [7]

        [8]

        [9]

        [10]

        [11]

        [12]

        [13]

        [14]

        [15]

        [16]

        [17]

        [18]

        [19]

        [20]

        [21]

        [22]

        [23]

        [24]

        [25]

        [26]

        [27]

        [28]

        [29]

        [30]

        [31]

      • [1] 周贤韬, 江英华.带身份认证的量子安全直接通信方案. 必威体育下载 , 2023, 72(2): 020302.doi:10.7498/aps.72.20221684
        [2] 赵良超.SESRI 300 MeV同步加速器注入线的传输效率与接受效率. 必威体育下载 , 2022, 71(11): 112901.doi:10.7498/aps.71.20212112
        [3] 王明宇, 王馨德, 阮东, 龙桂鲁.量子直接传态. 必威体育下载 , 2021, 70(19): 190301.doi:10.7498/aps.70.20210837
        [4] 何江涛, 何文奇, 廖美华, 卢大江, 彭翔.一种基于双光束干涉和非线性相关的身份认证方法. 必威体育下载 , 2017, 66(4): 044202.doi:10.7498/aps.66.044202
        [5] 杨璐, 马鸿洋, 郑超, 丁晓兰, 高健存, 龙桂鲁.基于量子隐形传态的量子保密通信方案. 必威体育下载 , 2017, 66(23): 230303.doi:10.7498/aps.66.230303
        [6] 刘志昊, 陈汉武.基于Bell态粒子和单光子混合的量子安全直接通信方案的信息泄露问题. 必威体育下载 , 2017, 66(13): 130304.doi:10.7498/aps.66.130304
        [7] 曹正文, 赵光, 张爽浩, 冯晓毅, 彭进业.基于Bell态粒子和单光子混合的量子安全直接通信方案. 必威体育下载 , 2016, 65(23): 230301.doi:10.7498/aps.65.230301
        [8] 马鸿洋, 秦国卿, 范兴奎, 初鹏程.噪声情况下的量子网络直接通信. 必威体育下载 , 2015, 64(16): 160306.doi:10.7498/aps.64.160306
        [9] 吴贵铜, 周南润, 龚黎华, 刘三秋.集体噪声信道上带身份认证的无信息泄露的量子对话协议. 必威体育下载 , 2014, 63(6): 060302.doi:10.7498/aps.63.060302
        [10] 张沛, 周小清, 李智伟.基于量子隐形传态的无线通信网络身份认证方案. 必威体育下载 , 2014, 63(13): 130301.doi:10.7498/aps.63.130301
        [11] 何文奇, 彭翔, 孟祥锋, 刘晓利.一种基于双光束干涉的分级身份认证方法. 必威体育下载 , 2013, 62(6): 064205.doi:10.7498/aps.62.064205
        [12] 饶黄云, 刘义保, 江燕燕, 郭立平, 王资生.三能级混合态的量子几何相位. 必威体育下载 , 2012, 61(2): 020302.doi:10.7498/aps.61.020302
        [13] 王天银, 秦素娟, 温巧燕, 朱甫臣.多方控制的量子安全直接通信协议的分析及改进. 必威体育下载 , 2008, 57(12): 7452-7456.doi:10.7498/aps.57.7452
        [14] 王 剑, 陈皇卿, 张 权, 唐朝京.多方控制的量子安全直接通信协议. 必威体育下载 , 2007, 56(2): 673-677.doi:10.7498/aps.56.673
        [15] 狄尧民, 胡宝林, 刘冬冬, 颜士明.二非正交纯态相混合的concurrence. 必威体育下载 , 2006, 55(8): 3869-3874.doi:10.7498/aps.55.3869
        [16] 李照鑫, 邹 健, 蔡金芳, 邵 彬.电荷量子比特与量子化光场之间的纠缠. 必威体育下载 , 2006, 55(4): 1580-1584.doi:10.7498/aps.55.1580
        [17] 邬鹏举, 李玉德, 林晓燕, 刘安东, 孙天希.x射线在毛细导管中传输的模拟计算. 必威体育下载 , 2005, 54(10): 4478-4482.doi:10.7498/aps.54.4478
        [18] 邓文基, 刘 平, 徐 晓.混合态的不确定关系与压缩效应. 必威体育下载 , 2004, 53(11): 3668-3672.doi:10.7498/aps.53.3668
        [19] 杨东升, 吴柏枚, 李 波, 郑卫华, 李世燕, 陈仙辉, 曹烈兆.MgB2混合态热导率的反常增强. 必威体育下载 , 2003, 52(8): 2015-2019.doi:10.7498/aps.52.2015
        [20] 匡锦瑜, 邓昆, 黄荣怀.利用时空混沌同步进行数字加密通信. 必威体育下载 , 2001, 50(10): 1856-1861.doi:10.7498/aps.50.1856
      计量
      • 文章访问数:2319
      • PDF下载量:71
      • 被引次数:0
      出版历程
      • 收稿日期:2022-10-15
      • 修回日期:2023-04-10
      • 上网日期:2023-05-08
      • 刊出日期:2023-07-05

        返回文章
        返回
          Baidu
          map