Font Size: a A A

Research On Single-photon Quantum Secure Communication Technliques

Posted on:2014-04-10Degree:DoctorType:Dissertation
Country:ChinaCandidate:Y H YiFull Text:PDF
GTID:1268330398497844Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Quantum communication and quantum information theory developed in recent nearly30years are new interdisciplinary subjects, which are the combination of quantum mechanism, telecommunication theory and computer science. Since quantum communication owns the two advantages, unconditional security and detection capability to evesdropping, it has been paying more attention on, becoming a new industry which is related to national security, and gotten fast development. There are several schemes of quantum communication, e.g. quantum key distribution (QKD), quantum secure direct communication (QSDC), quantum security sharing (QSS), quantum authentification (QA), quantum dense coding, quantum teleportation, and quantum multiple secure computing. In this dissertation, we focus on quantum direct communication, quantum key agreement, quantum private information retrieval and quantum communication networks. The main research results are shown as follows:In terms of quantum direct communication, we first studied the typical "Ping Pong" protocol based on entangled pairs and quantum secure direct communication protocol based on single photons, and analyzed eavesdropping methods and factors affecting the security of quantum secure direct communication. Then, based on these we proposed a single-photon quantum secure communication scheme by using random multiple bases. In this scheme, the correction of measurement bases is included, which consists of two steps:one is coarse correction, the other is fine correction by the use of single photons. In the quantum direct communication protocol, the sender encrypts the information bit sequence by a random bit sequence and inserts a check bit sequence, in which bit is encoded with random multiple bases. The receiver delays the received photons and measures them after the sender announces the encoding bases. By this way, the problem of low matching rate of the multi-state protocol is solved. The proposed scheme is higher in transmission efficiency and strong in confidentiality. Furthermore, the scheme is easy to implement since the received bits do not need to be stored and reordered.In the private information retrieval, we first analyzed the traditional PIR schemes and the Iordanis’ quantum PIR scheme based on the traditional PIR. The majority of these schemes are based on the semi-honest model, in which the parties involved are assumed to be honest and can strictly and correctly perform the agreement. After complete of the agreement, the participating parties may try to take additional messages from the intermediate results. In this dissertation, we present a model that the users may have malicious and non-honest co-operation model, Under which a polarization rotation-based experimental quantum private information retrieval scheme by using single photon was proposed according to the characteristics of the quantum private information the retrieval program is not easy to be implemented. This program does not require quantum memory and easy hardware implementation. The protocol which uses quantum state as an effective detection mechanism is unconditionally secure or secure in meaning of information theory. Both dishonest actions of the two can be detected effectively as well.By key agreement, the security and fairness of the two-party key agreement protocol based on the BB84protocol is analyzed. To solve the problem that basis synchronization is necessary in the protocol, a quantum key agreement protocol with blind polarization basis is proposed, in which complicated basis sync is not necessary. Simultaneously, safety precaution is raised to oppose the PNS attack, Trojan attack, and so on. The presented protocol can not only efficiently counteract intercept/resend attack, quantum Trojan attack, additional particle attack, and optimal incoherent attack, but also maintain the fairness. In addition, by utilizing entanglement swapping, two-party key agreement protocol with identity authentication is proposed, and unconditional security of the protocol is also proved.By quantum communication network, the existing typical quantum communication networks are analyzed. To solve the problem that the existing quantum communication networks have fewer network nodes, the topology model and simulation model of large-scale quantum network are studied. We proposed the optimal distance between network nodes, optimization rules of trunk link, access protocol and routing protocol applied to quantum communication network. Moreover, based on OPNET, we build a network simulation platform, and performance simulation concerning the proposed model is executed. The model and algorithm can provide basis for building future quantum communication network.
Keywords/Search Tags:quantum communication, quantum secure direct communicationquantum private information retrieval, quantum key agreementquantum communication network
PDF Full Text Request
Related items