Font Size: a A A

Rearrangement Encryption Based On GHZ State For Quantum Key Distribution Protocal And The Security Of A Quantum Secret Sharing

Posted on:2010-11-22Degree:MasterType:Thesis
Country:ChinaCandidate:W H CheFull Text:PDF
GTID:2120360275955863Subject:Theoretical Physics
Abstract/Summary:PDF Full Text Request
With the rapid development of the information,quantum information science has been established.In this paper,we take quantum information science as the breakthrough point and describe the basic theoretical.Then we expatiate on several applications of quantum entanglementon which plays a key role in quantum information.And we do further work in some quantum entanglementon applications.A new key distribution scheme are proposed by us.Through the encryption of Alice in our scheme,all the particles of the entangled system can transmit in the quantum channel at the same time and the quantum signal transfer rate is enhanced.In addition,the protocol does not require storage of quantum states of photons,so it is easy to realize in the experiment. Each GHZ state can carry 3 bits of information,a maximum capacity of the encoding.Besides the security analysis,the two sides of commtmication did not need exchange the classical information,so the theoretic efficiency of the protocol nearly approches 100%.Quantum secret sharing is a technology of generalizing classical secret sharing to a quantum field and provides a new way for the secure transmission of information.People made the first quantum secret sharing scheme using the GHZ state.After that quantum secret sharing has attracted extensive attention.At quantum secret sharing,in the condition that only three unitary operations to encode,the security of the protocol is safe all the same,which can achieved to share secret information between of Alice and multiple members of Bob.when any unfaithful members use the fake-signal EPR to attack.The upper bounds of the average success probabilities are given for dishonest agent eavesdropping encryption using the fake-signal to attack with any two-particle entangled states.In other words,we give the upper bounds of the average success probabilities,which can be used to distinguish the six states.
Keywords/Search Tags:Encryption method, Quantum key distribution, Decryption method, Quantum secret sharing
PDF Full Text Request
Related items