吉林大学学报(工学版) ›› 2013, Vol. 43 ›› Issue (02): 515-519.

• 论文 • 上一篇    下一篇

随机多元基量子安全直接通信

易运晖, 权东晓, 裴昌幸, 朱畅华   

  1. 西安电子科技大学 综合业务网理论与关键技术国家重点实验室, 西安710071
  • 收稿日期:2012-01-10 出版日期:2013-03-01 发布日期:2013-03-01
  • 作者简介:易运晖(1975-),男,副教授,博士研究生.研究方向:无线通信,量子信息处理,网络测量.E-mail:yhyi@mail.xidian.edu.cn
  • 基金资助:

    国家自然科学基金项目(61072067);国家重点实验室专项基金项目(ISN1001004);中央高校基本科研业务费专项项目(K50510010004);高等学校创新引智计划项目(B08038).

Random multiple-base quantum secure direct communication

YI Yun-hui, QUAN Dong-xiao, PEI Chang-xing, ZHU Chang-hua   

  1. State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an 710071, China
  • Received:2012-01-10 Online:2013-03-01 Published:2013-03-01

摘要: 根据量子通信系统安全性要求较高的特点,提出了单光子的随机多元基的偏振校正方案,可以完成各个偏振角度误差的补偿。与利用强光的补偿方案相比,窃听者更难获得基的信息,因此保密性更好。在测量基校正的基础上,针对传统多态量子通信系统筛选后有效信息少的缺点,设计了随机多元基的量子安全直接通信协议。该协议与窃听者Eve的互信息量很低;结合校验序列和一次一密,在信道不安全的情况下,窃听者不能得到有效信息,具有安全性好、易于实现、通信距离远等优点。

关键词: 通信技术, 量子安全直传, 随机多元基, 偏振补偿

Abstract: A means for measuring the polarization angle difference between the sender and the receiver to preprocess polarization states is required. A single photon base correction method to preprocess every base is presented to enhance system security. Based on the single photon, a multiple-base quantum secure direct communication protocol is proposed. The protocol can overcome the disadvantages of low sifted information in traditional multi-state system. The mutual information between the sender and eavesdropper is very low because that the random base is adopted to construct the multi-state system. Due to the use of checking sequence and One-Time-Pad, even if the eavesdropper gets the random sequence, the information sequence is still secure. This protocol possesses the advantages of higher security, easier implementation and longer communication distance.

Key words: communication, quantum secure direct communication, random multiple bases, polarization compensation

中图分类号: 

  • TN915
[1] Kim Bostrom, Timo Felbinger. Deterministic secure direct communication using entanglement[J]. Phys Rev Lett, 2002, 89: 187902.

[2] Deng Fu-guo, Long Gui-lu, Liu Xiao-shu. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block[J]. Phys Rev A, 2003, 68: 042317.

[3] Deng Fu-guo, Long Gui-lu. Secure direct communication with a quantum one-time pad[J]. Phys Rev A, 2004, 69: 052319.

[4] 权东晓,裴昌幸,刘丹,等. 基于单光子的单向量子安全通信协议[J].物理学报,2010,59(4): 2493-2497. Quan Dong-xiao, Pei Chang-xing, Liu Dan, et al. One-way quantum secure direct communication protocol based on single photons[J]. Chin Phy Sin, 2010, 59(4): 2493-2497.

[5] Liu Bin, Gao Fei, Wen Qiao-yan. Single-photon multiparty quantum cryptographic protocols with collective detection[J]. IEEE Journal of Quantum Electronics, 2011, 47(11): 1383-1390.

[6] Gu Bin, Huang Yu-gai, Fang Xia, et al. A two-step quantum secure direct communication protocol with hyperentanglement[J]. Chinese Physics B, 2011, 20(10): 100309.

[7] Chen Teng-yun, Liang Hao, Liu Yang, et al. Field test of a practical secure communication network with decoy-state quantum cryptography[J]. Optics Express, 2009, 17(8): 6540-6549.

[8] Tanaka Akihiro, Fujiwara Mikio, Yoshino Ken-Ichiro, et al. High-speed quantum key distribution system for 1-mbps real-time key generation[J]. IEEE Journal of Quantum Electronics, 2012, 48(4): 542-550.

[9] Brodsky M, Antonelli C, Shtaif M. Propagation of polarization-entangled photon pairs in optical fibers//2010 23rd Annual Meeting of the IEEE Photonics Society,Denver, CO, USA, 2010.

[10] Xavier G B, Da Silva T R, Temporo G P, et al. Polarisation drift compensation in 8km-long Mach-Zehnder fibre-optical interferometer for quantum communication[J]. Electronics Letters, 2011, 47(10): 608-609.

[11] Noé Reinhold, Pfau Timo, El-Darawy Mohamed. et al. Electronic polarization control algorithms for coherent optical transmission[J]. IEEE Journal on Selected Topics in Quantum Electronics, 2010, 16(5): 1193-1200.

[12] 刘丹,裴昌幸,权东晓.测量基对BB84协议安全性影响[J].电子与信息学报,2011,33(1):228-230. Liu Dan, Pei Chang-xing, Quan Dong-xiao. Measurement bases impact on the security of BB84 protocol[J]. Journal of Elec and Info Tech, 2011, 33(1):228-230.

[13] Bruss D. Optimal eavesdropping in quantum cryptography with six states[J]. Phys Rev Lett, 1998, 31: 3018-3021.

[14] Bechmann-Pasquinucci H, Gisin N. Incoherent and coherent eavesdropping in the 6-state protocol of quantum cryptography[J]. Phys Rev A, 1999, 59: 4238-4254.
[1] 周彦果,张海林,陈瑞瑞,周韬. 协作网络中采用双层博弈的资源分配方案[J]. 吉林大学学报(工学版), 2018, 48(6): 1879-1886.
[2] 孙晓颖, 扈泽正, 杨锦鹏. 基于分层贝叶斯网络的车辆发动机系统电磁脉冲敏感度评估[J]. 吉林大学学报(工学版), 2018, 48(4): 1254-1264.
[3] 董颖, 崔梦瑶, 吴昊, 王雨后. 基于能量预测的分簇可充电无线传感器网络充电调度[J]. 吉林大学学报(工学版), 2018, 48(4): 1265-1273.
[4] 牟宗磊, 宋萍, 翟亚宇, 陈晓笑. 分布式测试系统同步触发脉冲传输时延的高精度测量方法[J]. 吉林大学学报(工学版), 2018, 48(4): 1274-1281.
[5] 丁宁, 常玉春, 赵健博, 王超, 杨小天. 基于USB 3.0的高速CMOS图像传感器数据采集系统[J]. 吉林大学学报(工学版), 2018, 48(4): 1298-1304.
[6] 陈瑞瑞, 张海林. 三维毫米波通信系统的性能分析[J]. 吉林大学学报(工学版), 2018, 48(2): 605-609.
[7] 张超逸, 李金海, 阎跃鹏. 双门限唐检测改进算法[J]. 吉林大学学报(工学版), 2018, 48(2): 610-617.
[8] 关济实, 石要武, 邱建文, 单泽彪, 史红伟. α稳定分布特征指数估计算法[J]. 吉林大学学报(工学版), 2018, 48(2): 618-624.
[9] 李炜, 李亚洁. 基于离散事件触发通信机制的非均匀传输网络化控制系统故障调节与通信满意协同设计[J]. 吉林大学学报(工学版), 2018, 48(1): 245-258.
[10] 孙晓颖, 王震, 杨锦鹏, 扈泽正, 陈建. 基于贝叶斯网络的电子节气门电磁敏感度评估[J]. 吉林大学学报(工学版), 2018, 48(1): 281-289.
[11] 武伟, 王世刚, 赵岩, 韦健, 钟诚. 蜂窝式立体元图像阵列的生成[J]. 吉林大学学报(工学版), 2018, 48(1): 290-294.
[12] 袁建国, 张锡若, 邱飘玉, 王永, 庞宇, 林金朝. OFDM系统中利用循环前缀的非迭代相位噪声抑制算法[J]. 吉林大学学报(工学版), 2018, 48(1): 295-300.
[13] 王金鹏, 曹帆, 贺晓阳, 邹念育. 基于多址干扰和蜂窝间互扰分布的多载波系统联合接收方法[J]. 吉林大学学报(工学版), 2018, 48(1): 301-305.
[14] 石文孝, 孙浩然, 王少博. 无线Mesh网络信道分配与路由度量联合优化算法[J]. 吉林大学学报(工学版), 2017, 47(6): 1918-1925.
[15] 姜来为, 沙学军, 吴宣利, 张乃通. LTE-A异构网络中新的用户选择接入和资源分配联合方法[J]. 吉林大学学报(工学版), 2017, 47(6): 1926-1932.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!