CN110752926A - Multi-party layered quantum key sharing method - Google Patents

Multi-party layered quantum key sharing method Download PDF

Info

Publication number
CN110752926A
CN110752926A CN201911059371.6A CN201911059371A CN110752926A CN 110752926 A CN110752926 A CN 110752926A CN 201911059371 A CN201911059371 A CN 201911059371A CN 110752926 A CN110752926 A CN 110752926A
Authority
CN
China
Prior art keywords
particle
party
sender
quantum
particles
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911059371.6A
Other languages
Chinese (zh)
Inventor
宋曦
刘超
李文辉
刘豆
周进艳
王丽丹
王旭阳
詹文浩
侯玉婷
王克敏
黄峰
舒路
段庆
陈宇峰
杨清
黄丽燕
张龙鑫
郑忠龙
严安
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Information and Telecommunication Co Ltd
National Network Information and Communication Industry Group Co Ltd
Information and Telecommunication Branch of State Grid Gansu Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Information and Telecommunication Co Ltd
National Network Information and Communication Industry Group Co Ltd
Information and Telecommunication Branch of State Grid Gansu Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Information and Telecommunication Co Ltd, National Network Information and Communication Industry Group Co Ltd, Information and Telecommunication Branch of State Grid Gansu Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201911059371.6A priority Critical patent/CN110752926A/en
Publication of CN110752926A publication Critical patent/CN110752926A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Optical Communication System (AREA)
  • Optical Modulation, Optical Deflection, Nonlinear Optics, Optical Demodulation, Optical Logic Elements (AREA)

Abstract

The invention discloses a multiparty layered quantum key sharing method, which belongs to the field of multiparty quantum secret communication and comprises a sender and a plurality of receivers, wherein the sender takes two pairs of four-particle cluster states as quantum channels of the sender and the receivers; the sender asymmetrically splits any two qubit states with secret state information to each receiver based on the quantum channel; the receivers cooperate with each other, and the secret state of the sender is recovered by utilizing the two quantum bit states; the invention splits an arbitrary two-quantum bit state, which is twice as high as a single-quantum bit state in the carrying capacity of information transmission.

Description

Multi-party layered quantum key sharing method
Technical Field
The invention relates to the technical field of multi-party quantum secret communication, in particular to a multi-party layered quantum key sharing method.
Background
After more than thirty years of development, quantum secure communication technology has been put into practical use from theoretical research, and is rapidly developing towards high speed, long distance and networking. Quantum secret communication is the quantum information technology which is closest to practical use at present, and the connotation of the quantum secret communication is very wide. In most of the current academic research, the quantum secure communication process generally uses quantum state as information carrier, and uses quantum channel to perform secure transmission of secret message between two or more parties.
As point-to-point quantum secure communication has gradually entered into the practical stage, people have more and more paid attention to how to construct multi-quantum communication through networking so as to effectively reduce communication cost among multiple users. Therefore, the current research focus of quantum secure communication is moving from "quantum secure communication between two parties" to "quantum secure communication between multiple nodes, multiple users and multiple task parties", which is becoming a necessary trend. Particularly, with the experimental breakthrough of the quantum relay technology, quantum secure communication characterized by multiple users has become a research hotspot in the current quantum communication field, and has gained more and more attention of researchers.
Hierarchical Quantum Key Sharing (HQKS), also called Hierarchical Quantum Information Splitting (HQIS), is a method for realizing secure transmission of quantum information among multiple parties according to the condition of authority hierarchy of communication users in practical application when the statuses of multiple information receivers are not equal. Information split in the existing layered quantum information splitting scheme is in a single quantum bit state, and carrying capacity of information transmission is not ideal enough.
Disclosure of Invention
The invention aims to: the invention provides a multiparty layered quantum key sharing method, which solves the technical problem that the carrying capacity of information transmission is insufficient by adopting a single quantum bit state in the field of layered quantum key sharing.
The technical scheme adopted by the invention is as follows:
a multi-party layered quantum key sharing method comprises a sender and a plurality of receivers, and the key sharing steps are as follows:
step 1: the sender takes two pairs of four-particle cluster states as quantum channels of the sender and the receiver;
step 2: the sender asymmetrically splits any two qubit states with secret state information to each receiver based on the quantum channel;
and step 3: the receivers cooperate with each other, and the secret state of the sender is recovered by utilizing the two quantum bit states.
Further, in the step 1, the two pairs of four particle cluster states include a particle group a and a particle group B, the particle group a includes particles 1, 2, 3 and 4, and the particle group B includes particles 5, 6, 7 and 8; the particles in the particle group a are entangled with each other, and the particles in the particle group B are entangled with each other.
Further, the sender comprises a secret-state particle pair (particle x, particle y), a particle pair (particle 1, particle 5), and an auxiliary particle pair, wherein the auxiliary particle pair is entangled with particles in two pairs of four-particle cluster states;
the particle pairs of the receiving party are different from each other and are any one of (particle 2, particle 6), (particle 3, particle 7), (particle 4, particle 8) and auxiliary particle pairs;
the sender and the receiver share two pairs of four-particle cluster state sums;
further, the step 2 specifically comprises:
step 21: the sender respectively carries out two bell-based joint measurements on the particle pairs (particle x, particle 1) and (particle y, particle 5) to obtain measurement results;
step 22: and the sender transmits the measurement result to receivers through a classical channel, and each receiver obtains any two qubit states with secret state information.
Further, in step 3, the receiving party has a high level recovery right and a low level recovery right.
Further, the recovery method with the advanced recovery authority comprises the following specific steps of:
step 301: the receiver with high-grade recovery authority except the recovery party measures the single quantum bit of the particles by utilizing the diagonal basis and publishes the measurement result;
step 302: the receiver with low-level recovery authority measures single quantum bit of the particles by using the linear basis and publishes the measurement result;
step 303: the recovering party performs local operation on the particles of the recovering party by using all the measurement results published in step 301 and any one of the measurement results published in step 302 to obtain the secret state of the sending party.
Further, the recovery method with low-level recovery authority comprises the following specific steps of:
step 311: the receiver with high-level recovery authority measures the single quantum bit of the particle by using the diagonal basis and publishes the measurement result;
step 312: the receiver with low-level recovery authority except the recovery party measures the single quantum bit of the particles by using the linear basis and publishes the measurement result;
step 313: the recovering party performs local operation on the particles of the recovering party by using all the measurement results published in step 301 and all the measurement results published in step 302 to obtain the secret state of the sending party.
In summary, due to the adoption of the technical scheme, the invention has the beneficial effects that:
the invention selects four particle cluster states as quantum resources, and is relatively easy to realize in actual preparation and operation.
The invention splits an arbitrary two-quantum bit state, which is twice as high as a single-quantum bit state in the carrying capacity of information transmission.
The receiver that needs to recover the secret state of the present invention only needs to perform a simple single-quantum bit measurement.
The qubit efficiency (qubit efficiency-the useful number of qubits/total qubit transferred) of the invention is 100%.
The invention can be widely used in some applications. For example, multiple receiver-controlled quantum invisible states can be achieved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention, and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
FIG. 1 is a procedure of recovering a secret state protocol by a receiver Bob with advanced recovery authority in embodiment 1;
FIG. 2 shows Charlie of a receiver having a low level of recovery authority in example 11Recovering the secret state protocol process;
FIG. 3 is a diagram of entangled state quantum wires generated by the CNOT operation in example 2;
FIG. 4 is a procedure of a recipient Bobl recovering secret state protocol with advanced recovery authority in embodiment 2;
FIG. 5 shows Charlie as a receiver with low level of recovery rights in example 21Recovering the secret state protocol process;
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It is to be understood that the specific embodiments described herein are for purposes of illustration only and are not to be construed as limiting the invention, i.e., the described embodiments are merely a subset of the embodiments of the invention and not all embodiments. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
It is noted that relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The features and properties of the present invention are described in further detail below with reference to examples.
Example 1
The embodiment provides a multiparty hierarchical quantum key sharing method under a three-party two-layer user scene, namely, the multiparty hierarchical quantum key sharing method comprises 1 sender and 3 receivers, a sender Alice and three receivers Bob, Charlie1And Charlie2
Step 1: the sender takes two pairs of four-particle cluster states as quantum channels of the sender and the receiver;
the two pairs of four-particle cluster states are specifically:
Figure RE-GDA0002323667160000041
wherein the content of the first and second substances,
Figure RE-GDA0002323667160000042
a sender Alice and three receivers Bob, Charlie1And Charlie2Two pairs of four-particle cluster state sums are securely shared. The two pairs of four-particle cluster states comprise a particle group A and a particle group B, wherein the particle group A comprises particles 1, 2, 3 and 4, and the particle group B comprises particles 5, 6, 7 and 8; the particles in the particle group a are entangled with each other, and the particles in the particle group B are entangled with each other. The sender Alice includes a secret-state particle pair (particle x, particle y), a particle pair (particle 1, particle 5), and an auxiliary particle pair, which is entangled with the particles in the two pairs of four-particle cluster states, and in this embodiment, the auxiliary particle pair is not needed; receiver Bob comprises (particle 2, particle 6), receiver Charlie1Comprising (particle 3, particle 7), receiver Charlie2Comprising (particles 4, particles 8);
alice wants to distribute one arbitrary two qubit states:
|ζ>xy=(α|00>+β|01>+γ|10>+δ|11>)xy(2),
|α|2+|β|2+|γ|2+|δ|2=1 (3),
step 2: the sender asymmetrically splits any two qubit states with secret state information to each receiver based on the quantum channel;
step 21: the sender executes the bell base { | Φ { | twice for the particle pair (particle x, particle 1) and (particle y, particle 5) respectively±>,|Ψ±>Combine the measurements to obtain the measurement results, i.e. 4 Bell states:
Figure RE-GDA0002323667160000044
as shown in table 1, the union state obtained for all possible measurement results and receivers of Alice;
TABLE 1 Alice measurement and receiver-derived joint states
Figure RE-GDA0002323667160000051
Step 22: the sender transmits the measurement result to receivers through a classical channel, and each receiver obtains any two quantum bit states with secret state information; i.e., Alice can obtain one of the 16 possible measurements with equal probability, and the joint states obtained by the remaining recipients collapse to any one of the states with a probability of 1/16.
According to quantum unclonable theorem, the quantum state of only one receiver can be finally collapsed into | ζ>xyThat is, there is and only one party that can recover Alice's secret state, and the asymmetric distribution results in different capabilities of the three recipients for recovering the secret state.
And step 3: the receivers cooperate with each other, and the secret state of the sender is recovered by utilizing the two quantum bit states.
Receiver Bob has advanced recovery authority, Charlie1And Charlie2With low level recovery rights.
The first situation is as follows: the receiver Bob recovers the secret state as shown in fig. 1, the solid line represents entanglement, the ellipse represents Bell-based measurements, and the square block represents single-quantum-bit measurements with the linear basis 0, 1.
Step 301: receiver Charlie with low level recovery authority1Using a linear basis { |0>,|1>-single-quantum-bit measurement of its particles (particle 3, particle 7);
receiver Charlie with low level recovery authority2Using a linear basis { |0>,|1>-single-qubit measurements on its particles (particle 4, particle 8);
step 302: due to Charlie1And Charlie2With the same recovery authority, the measurements on a straight line basis are always correlated. Bob can be selected from Charlie1(Charlie2) Deducing Charlie from the measurement results of2(Charlie1) So Bob only needs Charlie1Or any party in Charlie2 can recover the secret state | zeta sent by Alice>xy
According to Charlie1Or Charlie2Bob performs corresponding local operations on its particles (particle 2, particle 6) to recover the secret state sent by Alice. Bob performs local operations as shown in Table 2.
Table 2 local operations performed by the receiver Bob
Figure RE-GDA0002323667160000061
Wherein, I, σzAnd σxIs a Pauli operation.
Case two: due to Charlie1And Charlie2Have the same recovery authority, so the embodiment uses Charlie1Explanation is made for the recovery side.
As shown in FIG. 2, the solid line represents entanglement, the ellipse represents Bell-basis measurements, and the square represents a single qubit measurement with a diagonal basis.
Step 311: the receiver Bob uses the diagonal basis to measure the single quantum bit of the particles and publishes the measurement result;
step 312: receiver Charlie2Measuring single quantum bit of the particle by utilizing the diagonal basis, and publishing the measurement result;
step 313: recovery compound Charlie1According to Bob and Charlie2Performing local operation to recover the secret state | ζ sent by Alice>xy。Charlie1The local operations performed are shown in table 3:
TABLE 3 receiver Charlie1Performed local operations
Figure RE-GDA0002323667160000071
H is Hardamard transform, namely H | +>=|0>,H|->=|1>. In the table, the form is σxH denotes doing H first and then doing sigmaxThe operation is similar to the rest.
Example 2
The embodiment provides a multiparty hierarchical quantum key sharing method under a five-party and two-layer user scene, namely, the multiparty hierarchical quantum key sharing method comprises 1 sender, 5 receivers, a sender Alice and three receivers Bob1,Bob2Charlie1, Charlie2 and Charlie 3.
Step 1: the sender takes two pairs of four-particle cluster states as quantum channels of the sender and the receiver;
the two pairs of four-particle cluster states are specifically:
Figure RE-GDA0002323667160000072
wherein the content of the first and second substances,
a sender Alice and three receivers Bob, Charlie1And Charlie2Two pairs of four-particle cluster state sums are securely shared. The two pairs of four-particle cluster states comprise a particle group A and a particle group B, wherein the particle group A comprises particles 1, 2, 3 and 4, and the particle group B comprises particles 5, 6, 7 and 8; the particles in the particle group a are entangled with each other, and the particles in the particle group B are entangled with each other. The sender Alice comprises a secret-state particle pair (particle x, particle y), a particle pair (particle 1, particle 5) and an auxiliary particle pair (a, c) and (b, d), the auxiliary particle pair being entangled with particles in two pairs of four-particle cluster states, the four-particle cluster state | ψ>1234 Particle 2 and particle 3 in (c) perform a CNOT operation with a and c, respectively, resulting in an entangled state | ψ>1234acThe generated entangled state | ψ>1234acThe quantum wires of (a) are shown in fig. 3. Similarly, entangled state | ψ>5678bdThe quantum wire diagram of (2) can also be obtained.
Through CNOT operation, state | ψ>1234acAnd | ψ>5678bdAre respectively represented as
Figure RE-GDA0002323667160000081
Figure RE-GDA0002323667160000083
Figure RE-GDA0002323667160000084
Sender Alice and five receivers securely share state | ψ>1234acAnd | ψ>5678bd
Alice possesses particles (particle 1, particle 5), Bob1,Bob2Charlie1, Charlie2 and Charlie3 possess particles (particle 2, particle 6), (particle a, particle b), (particle 3, particle 7), (particle 4, particle 8) and particle (c, particle d), respectively.
Alice wants to distribute one arbitrary two qubit states:
step 2: the sender asymmetrically splits any two qubit states with secret state information to each receiver based on the quantum channel;
step 21: the sender executes the bell base { | Φ { | twice for the particle pair (particle x, particle 1) and (particle y, particle 5) respectively±>,|Ψ±>Combine the measurements to obtain the measurement results, i.e. 4 Bell states:
Figure RE-GDA0002323667160000091
step 22: the sender transmits the measurement result to receivers through a classical channel, and each receiver obtains any two quantum bit states with secret state information; i.e., Alice can obtain one of the 16 possible measurements with equal probability, and the joint states obtained by the remaining recipients collapse to any one of the states with a probability of 1/16.
And step 3: the receivers cooperate with each other, and the secret state of the sender is recovered by utilizing the two quantum bit states.
Recipients Bob1 and Bob2 have advanced recovery rights, Charlie1、Charlie2、Charlie3With low level recovery rights.
The first situation is as follows: since Bobl and Bob2 have the same recovery rights, it is assumed here that only Bobl recovers the secret state, and when recovering the secret state, the protocol only needs the help of any one of the other high-level rights recipients and low-level rights recipients.
As shown in fig. 4, the solid line represents entanglement, the ellipse represents Bell-based measurements, the circle represents single-qubit measurements with diagonal bases { | + >, | - >, and the square represents single-qubit measurements with straight-line bases { |0>, |1> };
step 301: receiver Charlie with low level recovery authority1Using a linear basis { |0>,|1>-single-quantum-bit measurement of its particles (particle 3, particle 7);
receiver Charlie with low level recovery authority2Using a linear basis { |0>,|1>-single-qubit measurements on its particles (particle 4, particle 8);
receiver Charlie with low level recovery authority3Using a linear basis { |0>,|1>Making single-qubit measurements on its particles (particle c, particle d);
receiver Bob2 with advanced recovery authority, making single-quantum bit measurements on its particles (particle a, particle b);
since Bob1 needs to restore the secret state, the state is now ready
Figure RE-GDA0002323667160000093
Is rewritten into
Figure RE-RE-GDA0002323667160000094
Step 302: to help Bob1 recover the secret state, the other recipients need to make two single-quantum bit measurements on the particles they own, respectively. However, since Charlie1, Charlie2 and Charlie3 have the same recovery rights, measurements under the straight line base are always associated. Assume that Charlie1 helps Bob1 restore the secret state. Bob1 can infer the measurements of receivers Charlie2 and Charlie3 from the measurements published by Charlie 1. According to the measurement results published by Bob2 and Charlie1, the secret state sent by Alice can be restored by Bob1 performing local operations.
The local operations performed by Bob1 are shown in table 4.
Table 4 local operations performed by recipient Bob1
Figure RE-GDA0002323667160000102
Case two: due to Charlie1、Charlie2And Charlie3Have the same recovery authority, so the embodiment uses Charlie1Explanation is made for the recovery side.
As shown in FIG. 5, the solid line represents entanglement, the ellipse represents Bell-base measurements, and the circle represents single-quantum bit measurements with diagonal bases { | + >, | - >;
step 311: the receiving party Bob1 carries out single quantum bit measurement on the particles (2, 6) by utilizing the diagonal bases { | + >, | - >, and publishes the measurement result;
the receiving party Bob2 carries out single quantum bit measurement on the particles (a, b) by utilizing the diagonal bases { | + >, | - >, and publishes the measurement result;
step 312: receiver Charlie2Carrying out single-quantum-bit measurement on the particles (4, 8) by utilizing the diagonal basis, and publishing the measurement result;
receiver Charlie3Carrying out single quantum bit measurement on the particles (c, d) by utilizing the diagonal basis, and publishing the measurement result;
since Charlie1 needs to restore the secret state, the state is now ready
Figure RE-GDA0002323667160000111
Is rewritten into
Figure RE-GDA0002323667160000112
Figure RE-GDA0002323667160000121
Step 313: the receiver Charlie1 cannot recover the secret state sent by Alice from its measurements alone. To recover the secret state he must be realized with the help of all receivers, which requires Bob1, Bob2, Charlie2 and Charlie3 to make two single qubit measurements on their particles respectively under the corresponding diagonal basis. And then, according to the measurement results of the four receivers, Charlie executes corresponding local operation, and the secret state sent by Alice can be recovered. The local operations performed by charlie are shown in table 5.
TABLE 5 local operations performed by Charlie
Figure RE-GDA0002323667160000131
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principles of the present invention are intended to be included within the scope of the present invention.

Claims (7)

1. A multi-party layered quantum key sharing method is characterized in that: the method comprises a sender and a plurality of receivers, and the key sharing step comprises the following steps:
step 1: the sender takes two pairs of four-particle cluster states as quantum channels of the sender and the receiver;
step 2: the sender asymmetrically splits any two qubit states with secret state information to each receiver based on the quantum channel;
and step 3: the receivers cooperate with each other, and the secret state of the sender is recovered by utilizing the two quantum bit states.
2. The method of claim 1, wherein: in the step 1, the two pairs of four-particle cluster states comprise a particle group A and a particle group B, wherein the particle group A comprises particles 1, 2, 3 and 4, and the particle group B comprises particles 5, 6, 7 and 8; the particles in the particle group a are entangled with each other, and the particles in the particle group B are entangled with each other.
3. The multi-party hierarchical quantum key sharing method according to claim 2, wherein: the sender comprises a secret-state particle pair (particle x, particle y), a particle pair (particle 1, particle 5) and an auxiliary particle pair, wherein the auxiliary particle pair is mutually entangled with particles in two pairs of four-particle cluster states;
the particle pairs of the receiving party are different from each other and are any one of (particle 2, particle 6), (particle 3, particle 7), (particle 4, particle 8) and auxiliary particle pairs;
the sender and the receiver share two pairs of four-particle cluster state sums;
4. the multi-party hierarchical quantum key sharing method according to claim 3, wherein: the step 2 specifically comprises the following steps:
step 21: the sender respectively carries out two bell-based joint measurements on the particle pairs (particle x, particle 1) and (particle y, particle 5) to obtain measurement results;
step 22: and the sender transmits the measurement result to receivers through a classical channel, and each receiver obtains any two qubit states with secret state information.
5. The method of claim 1, wherein: in step 3, the receiver has a high level recovery right and a low level recovery right.
6. The multi-party hierarchical quantum key sharing method according to claim 5, wherein: the recovery method with the advanced recovery authority comprises the following specific steps of:
step 301: the receiver with high-grade recovery authority except the recovery party performs single quantum bit measurement on the particles by using the diagonal basis and publishes the measurement result;
step 302: the receiver with low-level recovery authority measures single quantum bit of the particles by using the linear basis and publishes the measurement result;
step 303: the recovering party performs local operation on the particles of the recovering party by using all the measurement results published in step 301 and any one of the measurement results published in step 302 to obtain the secret state of the sending party.
7. The multi-party hierarchical quantum key sharing method according to claim 5, wherein: the recovery method with low-level recovery authority comprises the following specific steps of:
step 311: the receiver with high-level recovery authority measures the single quantum bit of the particle by using the diagonal basis and publishes the measurement result;
step 312: the receiver with low-level recovery authority except the recovery party performs single quantum bit measurement on the particles by using the diagonal basis and publishes the measurement result;
step 313: the recovering party performs local operation on the particles of the recovering party by using all the measurement results published in step 301 and all the measurement results published in step 302 to obtain the secret state of the sending party.
CN201911059371.6A 2019-10-30 2019-10-30 Multi-party layered quantum key sharing method Pending CN110752926A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911059371.6A CN110752926A (en) 2019-10-30 2019-10-30 Multi-party layered quantum key sharing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911059371.6A CN110752926A (en) 2019-10-30 2019-10-30 Multi-party layered quantum key sharing method

Publications (1)

Publication Number Publication Date
CN110752926A true CN110752926A (en) 2020-02-04

Family

ID=69281750

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911059371.6A Pending CN110752926A (en) 2019-10-30 2019-10-30 Multi-party layered quantum key sharing method

Country Status (1)

Country Link
CN (1) CN110752926A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107222307A (en) * 2017-06-06 2017-09-29 西北大学 A kind of controlled quantum safety direct communication method based on four Particle Cluster states
CN108923914A (en) * 2018-06-21 2018-11-30 西北大学 A kind of quantum key delivering method based on 4 Particle Cluster states

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107222307A (en) * 2017-06-06 2017-09-29 西北大学 A kind of controlled quantum safety direct communication method based on four Particle Cluster states
CN108923914A (en) * 2018-06-21 2018-11-30 西北大学 A kind of quantum key delivering method based on 4 Particle Cluster states

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
KANG, SHUANG-YON等: "Multi-party quantum state sharing of an arbitrary multi-qubit state via chi-type entangled states", 《QUANTUM INFORMATION PROCESSING》 *
XIN-WEN WANG等: "Hierarchical quantum-information splitting", 《OPTICS COMMUNICATIONS》 *
彭家寅等: "Hierarchical and probabilistic quantum state sharing via a non-maximally entangled |χ〉 state", 《CHINESE PHYSICS B》 *
郭文明等: "Hierarchical and probabilistic quantum information splitting of an arbitrary two-qubit state via two cluster states", 《CHINESE PHYSICS B》 *

Similar Documents

Publication Publication Date Title
Pirker et al. Modular architectures for quantum networks
Leung et al. Quantum network communication—the butterfly and beyond
Bruß et al. Distributed quantum dense coding
Muralidharan et al. Perfect teleportation, quantum-state sharing, and superdense coding through a genuinely entangled five-qubit state
Tan et al. Classical correlation in quantum dialogue
Dutta et al. On the complexity of information spreading in dynamic networks
CN109379144B (en) Quantum network coding method based on quantum detuning
Zhou et al. Quantum deterministic key distribution protocols based on teleportation and entanglement swapping
Primaatmaja et al. Security of device-independent quantum key distribution protocols: a review
CN107124275B (en) Dynamic serial key distribution method based on GHZ state
Prabhu et al. Exclusion principle for quantum dense coding
Gao et al. Multi-hop teleportation in a quantum network based on mesh topology
Baldesi et al. On the use of eigenvector centrality for cooperative streaming
Huang et al. Distillation of multipartite entanglement by local filtering operations
Ling et al. Server-aided revocable predicate encryption: formalization and lattice-based instantiation
Jain et al. On quantum network coding
CN112953648B (en) Butterfly network coding method based on bidirectional mixed quantum information communication
CN110752926A (en) Multi-party layered quantum key sharing method
JP4654371B2 (en) Communication method and communication system using decentralized key management system
Ma et al. High-dimensional bidirectional controlled teleportation based on network coding
WO2023049002A1 (en) Dynamic groups key generation with communication history
CN113642738B (en) Multi-party safety cooperation machine learning method and system based on hierarchical network structure
CN111431703B (en) Hybrid QKD network system based on QKD protocol classification
Bruß et al. Dense coding with multipartite quantum states
Sen Quantum entanglement and its applications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200204

RJ01 Rejection of invention patent application after publication