Font Size: a A A

Research On Controlled Teleportation And Dialogue Protocol For N-dimensional Quantum Entanglement

Posted on:2022-12-27Degree:MasterType:Thesis
Country:ChinaCandidate:Y L ZhangFull Text:PDF
GTID:2480306761964389Subject:Telecom Technology
Abstract/Summary:PDF Full Text Request
Nowadays,people are in the network era of rapid development of science and technology.In this era,people's personal information leakage is becoming more and more serious,and people pay more and more attention to information security.Therefore,quantum communication protocol,which plays an important role in information security,has also attracted great attention.Because quantum entanglement has the characteristics of true randomness,nonlocality and strong correlation,it is often used in various quantum communication protocols.Quantum entanglement can carry real random numbers,so as to improve the security of the protocol.It can also be used to help reduce the complexity of classical communication and plays a vital role in quantum communication protocols.Based on this,this paper aims to expand the application of quantum entanglement and propose some quantum security protocols based on quantum entanglement,so as to realize the security authentication and communication of both(or multiple)communication parties,and improve the security requirements and transmission efficiency of information.To sum up,four quantum security protocols based on quantum entanglement are proposed,analyzed and studied in this paper.The main research results of this paper are as follows:Three particle entangled state authentication quantum dialogue protocol based on intersection subset combination.This protocol is the first time to use the method of intersection subset combination for quantum mutual authentication,so as to carry out key agreement protocol.This scheme makes the shared key a classic bit string between the trusted third party Charlie and the client(Alice or Bob),so that they can be retained and easily authenticated with each other.More importantly,by using the intersection subset combination method to help solve the three particle entangled state,Charlie and Alice / Bob can not only realize mutual authentication,but also no one else can obtain the session key between Alice and Bob or even Charlie.In our scheme,we can not only achieve complete security,but also be more efficient.An efficient quantum blind signature scheme based on quantum Fourier transform.According to the basic requirements of quantum blind signature protocol:1)Unforgeability.No one can forge a signature except the signer.2)Non repudiation,neither the message owner nor the signer can deny their manipulation of the information.3)The signer cannot associate his signature with the message.The scheme is divided into three stages: initialization stage,signature stage and verification stage.Finally,the blind signature is realized.The difference between the proposed protocol and the traditional signature protocol is that the scheme applies the quantum logic gate to calculate the quantum state,uses the block coding in the scheme,and uses the quantum Fourier transform in the encryption stage to improve the efficiency and security of the protocol.Anti flip dynamic quantum secret sharing scheme based on Bell state.The dynamic quantum secret sharing(DQSS)protocol proposed in this scheme is easier to operate than the traditional DQSS protocol.This protocol can add or delete multiple agents without the consent of dealers,and the efficiency of the protocol has become higher.So far,most DQSS protocols need to prepare multi particle quantum.After our improvement,this protocol takes advantage of the characteristics of Bell state and GHZ state,and only needs to generate the quantum entanglement of two particles,This is simpler than multi particle quantum entanglement and improves the efficiency of the protocol.In addition,we also analyzed in the security analysis.The protocol can not only resist the fraud attack of dishonest agents,but also resist the flip attack and collusion attack.Cross domain identity authentication controlled quantum teleportation protocol based on seven quantum entangled states.This scheme proposes a cross domain identity authentication quantum teleportation scheme based on seven quantum entangled states.The scheme constructs a quantum channel by selecting seven bit entangled states,and uses the high entangled states of seven quantum maximum entangled states to improve the efficiency of the protocol.The scheme performs cross domain authentication before transmission,and the sender and receiver need the consent of the controller to obtain the quantum information sent by the receiver.The security of the protocol is further improved.If the controller agrees,he needs to measure his particles and send the measurement results to the communication party.The sender and receiver use the results provided by the controller to perform appropriate unitary operation on their particles,so that the unknown quantum state can be reconstructed to realize asymmetric controlled two-way teleportation.The quantum channel of this scheme has high transmission efficiency in the experiment,and the corresponding measurement operation is also simple and convenient.Finally,this paper considers and summarizes the future of quantum entanglement.In the future,quantum entanglement will be deeply integrated with more and more quantum security protocols,which has a good development prospect.
Keywords/Search Tags:three particle entangled state, seven particle entangled state, coding method, quantum dialogue, quantum Fourier transform
PDF Full Text Request
Related items