删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

量子密钥分发与量子安全直接通信

清华大学 辅仁网/2017-07-08

量子密钥分发与量子安全直接通信
QUANTUM KEY DISTRIBUTION AND QUANTUM SECURE DIRECT COMMUNICATION 龙桂鲁;秦国卿; 1:低维量子物理国家重点实验室清华大学物理系 2:清华信息科学与技术国家实验室(筹) 3:青岛大学物理科学学院 摘要(Abstract):

量子通信具有高安全性等优点,是当前的国际研究前沿,量子安全直接通信和量子密钥分发是两种重要的量子信息方式.量子密钥分发通过量子信道产生随机的密钥,而量子安全直接通信直接在量子信道中传输秘密信息.本文力图利用浅显易懂的语言介绍量子安全直接通信和量子密钥分发的基本原理;重点描述几个典型的量子安全直接通信方案,介绍目前的发展状态并展望未来.

关键词(KeyWords): 量子安全直接通信;;量子通信;;两步方案;;量子一次便笺方案;;网络通信;;量子密钥分发

Abstract:

Keywords:

基金项目(Foundation): 国家自然科学基金(批准号:11175094,91221205);;国家973计划(批准号:2011CB9216002)资助项目

作者(Author): 龙桂鲁;秦国卿;

Email:


参考文献(References): [1]龙桂鲁,肖丽.核磁共振量子计算机与并行量子计算[J].物理与工程,2003,13(3):12-20.
[2]龙桂鲁,肖丽.核磁共振量子计算机与并行量子计算(续1)[J].物理与工程,2003,13(4):7-22.
[3]龙桂鲁,肖丽.核磁共振量子计算机与并行量子计算(续2)[J].物理与工程,2003,13(5):2-9.
[4]Bennett C H,Brassard G.Quantum cryptography:Public key distribution and coin tossing[C].Proceedings of IEEE International Conference on Computers,System and Signal Processing.Bangalore,1984,India:X 175-179.
[5]Bennett C H.Quantum cryptography using any two nonorthogonal states[J].Phys.Rev.Lett.1992,68:3121-3124.
[6]Ekert A K.Quantum cryptography based on Bell's theorem[J].Phys Rev Lett 1991,67:661-663.
[7]Bennett C H,Brassard G,Mermin N D.Quantum cryptography without Bell's theorem[J].Phys Rev Lett 1992,68:557-669.
[8]Long G L,Liu X S.Theoretically efficient high-capacity quantum-key-distribution scheme[J].Phys Rev A,2002,65:032302.
[9]龙桂鲁,王川,李岩松,等.量子安全直接通信[J].中国科学:物理学力学天文学:2011,41:332-342.
[10]Long G L,Deng F G,Wang C,et al.Quantum secure direct communication and deterministic secure quantum communication[J].Front Phys China,2007,2(3):251-272.
[11]Deng F G,Li X H,Li C Y,et al.Quantum secure direct communication network with Einstein-Podolsky-Rosen pairs[J].Phys Lett A,2006,359:359-365s.
[12]Deng F G,Long G L,Liu X S.Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block[J].Phys Rev A 2003,68(4):042317.
[13]Deng F G,Long G L.Secure direct communication with a quantum one-time pad[J].Phys Rev A,2004,69(5):052319.
[14]Long G L,Wang C,Deng F G,et al.Quantum Direct Communication,Advances in Lasers and Electro Optics[M].Nelson Costa and Adolfo Cartaxo(Ed.),ISBN:978-953-307-088-9,INTECH.2010.
[15]龙桂鲁,王川.量子直接通信[J].科学(上海),2009(9):17-22.
[16]Horodecki R,Horodecki P,Horodecki M,et al.Quantum entanglement[J].Rev Mod Phys,2009,81:865-942.
[17]Bovino F A,Degiovanni I P.Quantum correlation bounds for optimization of quantum-information experiments:The Wigner inequality case[J].Phys.Rev.A,2008,77:052110.
[18]Deng F G,Long G L.Controlled order rearrangement encryption for quantum key distribution[J].Phys Rev A,2003,68:042315.
[19]邓富国,周萍,李熙涵,等.量子安全直接通信研究进展[J].原子核物理评论,2005,22(4):382-386.
[20]Lucamarini M,Mancini S.Secure deterministic communication without entanglement[J].Phys Rev Lett,2005,94(14):140501.
[21]Deng F G,Long G L.Quantum privacy amplification for a sequence of single qubits,Commun Theor Phys,2006,46(3):443-446.
[22]Hao L,Wang C,Long G L.Realization of quantum state privacy amplification in a nuclear magnetic resonance quantum system[J].J Phys B:At Mol Opt Phys,2010,43:125502.
[23]Wang C,Deng F G,Li Y S,et al.Quantum secure direct communication with high-dimension quantum superdense coding[J].Phys Rev A,2005,71:044305.
[24]Wang C,Deng F G,Long G L.Multi-step quantum secure direct communication using multi-particle Green-HorneZeilinger state[J].Opt Comm,2005,253:15-20.
[25]Beige A,Englert B G,Kurtsiefer C,et al.Secure communication with a publicly known key[J].Acta Phys Pol.A2002,101(6):357.
[26]Beige A,Englert B G,Kurtsiefer C,et al.Secure communication with single-photon two-qubit states[J].J Phys A:Math Gen 2002,35:L407-L413.
[27]Bostrm K,Felbinger T.Deterministic secure direct communication using entanglement[J].Phys Rev Lett,2002,89(18):187902.
[28]Cai Q Y,Li B W.Deterministic secure communication without using entanglement,Chin Phys Lett,2004,21(4):601-603.
[29]Yan F L,Zhang X Q.A scheme for secure direct communication using EPR pairs and teleportation[J].The European Physical Journal B,2004,41:75-78.
[30]Man Z X,Zhang Z J,Li Y.Deterministic secure direct communication by using swapping quantum entanglement and local unitary operations[J].Chin Phys Lett,2005,22(1):18-21.
[31]Zhu A D,Xia Y,Fang Q B,et al.Secure direct communication based on secret transmitting order of particles[J].Phys Rev A,2006,73(2):022338.
[32]Li X H,Li C Y,Deng F G,et al.Quantum secure direct communication with quantum encryption based on pure entangled states[J].Chin Phys,2007,16(8):2149-2153.
[33]Li X H,Deng F G.Li C Y,et al.Deterministic secure quantum communication without maximally entangled states[J].Journal of the Korean Physical Society,2006,49(4):1354-1359.
[34]Cao H J,Song H S.Quantum secure direct communication with W state[J].Chin Phys Lett,2006,23(2):290-292.
[35]Wang J,Zhang Q,Tang C J.Multiparty controlled quantum secure direct communication using Greenberger-HorneZeilinger state[J].Opt Comm,2006,266(2):732-737.
[36]Cai Q Y.Eavesdropping on the two-way quantum communication protocols with invisible photons[J].Phys Lett A,2006,351(1-2):23-25.
[37]Deng F G,Li X H,Li C Y,et al.Eavesdropping on the‘ping-pong’quantum communication protocol freely in a noise channel[J].Chin Phys,2007,16(2):277-281.
[38]Li X H,Deng F G,Zhou H Y.Improving the security of secure direct communication based on the secret transmitting order of particles[J].Phys Rev A,2006,74(5):054302.
[39]Yang Y G,Wen Q Y,Zhu F C.An efficient quantum secure direct communication scheme with authentication[J].Chin Phys,2007,16(7):1838-1842.
[40]Gao F,Wen Q Y,Zhu F C.Teleportation attack on the QSDC protocol with a random basis and order[J].Chin Phys B,2008.17(9):3189-3193.
[41]Gu B,Pei S X,Song B,Zhong K.Deterministic secure quantum communication over a collective-noise channel[C].Science in China Series G-Physics Mechanics Astron,2009,52(12):1913-1918.
[42]Li X H,Zhou P,Liang Y J,et al.Quantum secure direct communication network with two-step protocol[J].Chin Phys Lett,2006,23:1080-1083.
[43]Li C Y,Zhou H Y,Wang Y,et al.Secure quantum key distribution network with Bell states and local unitary operations[J].Chin Phys Lett,2005,22(5):1049-1052.
[44]Li C Y,Li X H,Deng F G,et al.Efficient quantum cryptography network without entanglement and quantum memory[J].2006,23(11):2896-2899.
[45]Deng F G,Li X H,Li C Y,et al.Quantum secure direct communication network with superdense coding and decoy photons[J].Phys Scr,2007,76:25-30.
[46]Mattle K.et al.Dense coding in experimental quantum communication[J].Phys.Rev.Lett.1996,76,4656-4659.
[47]Barreiro J T,et al.Beating the channel capacity limit for linear photonic superdense coding[J].Nat.Phys.2008,4,284-286.
[48]Wei,D.X.et al.NMR experimental implementation of threeparties quantum superdense coding.Chin.Sci.Bull.2004,49,423.
[49]Cere,A.et al.Experimental test of two-way quantum key distribution in presence of controlled noise[J].Phys.Rev.Lett.2006,96,200501.
[50]Abdul Khir M.F.et al.Implementation of two way quantum key distribution protocol with decoy state[J].Optics Commun.2012,285,842-845.
[51]Xavier,G.B.et al.Two0way quantum communication in a single optical fiber with active polarization compensation.Quantum communication and quantum networking[J].Lecture Notes of the Institute for Computer Sciences,Social Informatics and telecommunications engineering.2010,Vol.36,125-131.
[52]Sun S H,et al.Quantum key distribution based on phase encoding in long-distance communication fiber[J].Optics Letters,2010,35,1203-1205.
[53]Wei K J,et al.Experimental circular quantum secret sharing over telecom fiber network.Optics Express,2013,21:16663-16669.
[54]Lu,H.et al,Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel[J].Phys.Rev.A 84,2011,042344.
[55]Wang W Y,Wang C,Zhang G Y,et al.Arbitrarily long distance quantum communication using inspection and power insertion[J].Chinese Science Bulletin,2009,54(1):158-162.
[56]Wen K,Long G L.One-party quantum error correcting codes or unbalanced errors:principles and application to quantum dense coding and quantum secure direct communication[J].International Journal of Quantum Information,2010,8(4):697-19.


摘要:
扩展功能
本文信息
PDF全文请访问中国知网下载(615K)
相关话题/通信 物理 信息 计算 工程