• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于平均多国王问题的量子密钥分发协议中的可区分性与干扰

Distinguishability and Disturbance in the Quantum Key Distribution Protocol Using the Mean Multi-Kings' Problem.

作者信息

Yoshida Masakazu, Nakayama Ayumu, Cheng Jun

机构信息

Faculty of Design Technology, Osaka Sangyo University, 3-1-1 Daito-shi, Osaka 574-8530, Japan.

Independent Researcher, Chiba 263-8522, Japan.

出版信息

Entropy (Basel). 2020 Nov 11;22(11):1275. doi: 10.3390/e22111275.

DOI:10.3390/e22111275
PMID:33287043
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7712272/
Abstract

We introduce a quantum key distribution protocol using mean multi-kings' problem. Using this protocol, a sender can share a bit sequence as a secret key with receivers. We consider a relation between information gain by an eavesdropper and disturbance contained in legitimate users' information. In BB84 protocol, such relation is known as the so-called information disturbance theorem. We focus on a setting that the sender and two receivers try to share bit sequences and the eavesdropper tries to extract information by interacting legitimate users' systems and an ancilla system. We derive trade-off inequalities between distinguishability of quantum states corresponding to the bit sequence for the eavesdropper and error probability of the bit sequence shared with the legitimate users. Our inequalities show that eavesdropper's extracting information regarding the secret keys inevitably induces disturbing the states and increasing the error probability.

摘要

我们介绍一种使用平均多王问题的量子密钥分发协议。通过该协议,发送方能够与接收方共享一个比特序列作为秘密密钥。我们考虑窃听者获得的信息增益与合法用户信息中所含干扰之间的关系。在BB84协议中,这种关系被称为所谓的信息干扰定理。我们关注的场景是,发送方和两个接收方试图共享比特序列,而窃听者试图通过与合法用户的系统以及一个辅助系统相互作用来提取信息。我们推导出了与窃听者对应的比特序列的量子态可区分性和与合法用户共享的比特序列的错误概率之间的权衡不等式。我们的不等式表明,窃听者提取关于秘密密钥的信息不可避免地会导致状态受到干扰并增加错误概率。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ebcb/7712272/3c598d6a9630/entropy-22-01275-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ebcb/7712272/720c31f62db2/entropy-22-01275-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ebcb/7712272/58f51393c497/entropy-22-01275-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ebcb/7712272/db4dbb249040/entropy-22-01275-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ebcb/7712272/3c598d6a9630/entropy-22-01275-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ebcb/7712272/720c31f62db2/entropy-22-01275-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ebcb/7712272/58f51393c497/entropy-22-01275-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ebcb/7712272/db4dbb249040/entropy-22-01275-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ebcb/7712272/3c598d6a9630/entropy-22-01275-g004.jpg

相似文献

1
Distinguishability and Disturbance in the Quantum Key Distribution Protocol Using the Mean Multi-Kings' Problem.基于平均多国王问题的量子密钥分发协议中的可区分性与干扰
Entropy (Basel). 2020 Nov 11;22(11):1275. doi: 10.3390/e22111275.
2
Practical quantum key distribution protocol without monitoring signal disturbance.实用的量子密钥分发协议,无需监控信号干扰。
Nature. 2014 May 22;509(7501):475-8. doi: 10.1038/nature13303.
3
Analysis of quantum key distribution based on unified model of sequential state discrimination strategy.基于序列状态判别策略统一模型的量子密钥分发分析
Sci Rep. 2024 May 4;14(1):10254. doi: 10.1038/s41598-024-60020-x.
4
Quantum-locked key distribution at nearly the classical capacity rate.接近经典容量速率的量子锁定密钥分发。
Phys Rev Lett. 2014 Oct 17;113(16):160502. doi: 10.1103/PhysRevLett.113.160502. Epub 2014 Oct 15.
5
Quantum man-in-the-middle attack on the calibration process of quantum key distribution.量子密钥分发校准过程中的量子中间人攻击。
Sci Rep. 2018 Mar 9;8(1):4283. doi: 10.1038/s41598-018-22700-3.
6
Entangled state quantum cryptography: eavesdropping on the ekert protocol.纠缠态量子密码学:对埃克特协议的窃听
Phys Rev Lett. 2000 May 15;84(20):4733-6. doi: 10.1103/PhysRevLett.84.4733.
7
Improving the Performance of Quantum Cryptography by Using the Encryption of the Error Correction Data.通过使用纠错数据加密来提高量子密码学的性能。
Entropy (Basel). 2023 Jun 20;25(6):956. doi: 10.3390/e25060956.
8
Experimental eavesdropping based on optimal quantum cloning.基于最优量子克隆的实验窃听。
Phys Rev Lett. 2013 Apr 26;110(17):173601. doi: 10.1103/PhysRevLett.110.173601. Epub 2013 Apr 24.
9
How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack?在中间人攻击下,双向乒乓协议和LM05量子密钥分发协议的安全性如何?
Entropy (Basel). 2021 Jan 29;23(2):163. doi: 10.3390/e23020163.
10
Disturbance-Disturbance uncertainty relation: The statistical distinguishability of quantum states determines disturbance.干扰-干扰不确定性关系:量子态的统计可区分性决定干扰。
Sci Rep. 2018 Mar 5;8(1):4010. doi: 10.1038/s41598-018-22336-3.

引用本文的文献

1
Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography.物理层安全、量子密钥分发与后量子密码学。
Entropy (Basel). 2022 Jul 6;24(7):935. doi: 10.3390/e24070935.

本文引用的文献

1
Quantum cryptography as a retrodiction problem.量子密码学作为回溯预测问题。
Phys Rev Lett. 2009 Nov 27;103(22):220504. doi: 10.1103/PhysRevLett.103.220504. Epub 2009 Nov 25.
2
Unconditional security of quantum key distribution over arbitrarily long distances.
Science. 1999 Mar 26;283(5410):2050-6. doi: 10.1126/science.283.5410.2050.
3
Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels.量子隐私放大与噪声信道上量子密码学的安全性
Phys Rev Lett. 1996 Sep 23;77(13):2818-2821. doi: 10.1103/PhysRevLett.77.2818.
4
Noncommuting mixed states cannot be broadcast.非对易混合态不能被广播。
Phys Rev Lett. 1996 Apr 8;76(15):2818-2821. doi: 10.1103/PhysRevLett.76.2818.
5
How to ascertain the values of sigmax, sigma y, and sigma z of a spin-1/2 particle.如何确定自旋为1/2的粒子的σx、σy和σz的值。
Phys Rev Lett. 1987 Apr 6;58(14):1385-1387. doi: 10.1103/PhysRevLett.58.1385.