Font Size: a A A

The Theoretical Research On Quantum Secure Communication Protocol

Posted on:2017-02-15Degree:DoctorType:Dissertation
Country:ChinaCandidate:Y ChaFull Text:PDF
GTID:1310330512988091Subject:Information security
Abstract/Summary:PDF Full Text Request
Information security is the precondition to promote the informationization.Cryptography is the foundation of information security.With the rapid development of quantum technology,especially the appearance of quantum computing,the classicial cryptography system is difficult to meet the security requirements in the next stage of informatization.Therefore,researchers working at information security pay more and more attention to quantum cryptography protocol which provides absolutely safe(unconditional security)information exchanging theoretically.As one of the hotspot of quantum cryptography,quantum secure communication is gradually going into the application stage from the theoretical design research.To promote the practicability of quantum secure communication,the security of quantum secure communication has higher requirements.Based on the research of quantum secure communication,the paper mainly focuses on quantum secure communication under the ideal environment,quantum secure communication under noise environment and other quantum cryptographic protocols based on quantum secure communication.The main research content is divided into four parts.1.Quantum secure communication in an ideal environment(1)This paper introduces a quantum secure direct communication and authenticat-ion protocol based on single photons and analyzes its security.Compared with the existed protocols,the protocol completes the secret information transmission,authentication and eavesdropping detection by transferring particle only one time.The protocol improves the efficiency without loss of security.(2)This paper introduces a quantum broadcast communication and authentication protocol based on quantum one-time pad and analyzes its security.The protocol uses the entangled GHZ state as quantum carrier.Compared with the existed protocols,this protocol realizes identity authentication by using reusable identity string which is encoded with single photon sequence.In addition,local unitary operations and hash function are not used in the protocol.So this research is more easily achieved,with high efficiency,and no loss of security.(3)This paper introduces a controlled quantum secure direct communication and authentication protocol based on the five particle cluster state and analyzes the securityof the protocol.For each of the five particle cluster state,one particle is used as the permission of the controller,and two particles are used for transmitting two classical bits of information,which develops a new idea for the realization of controlled quantum communication protocol,finds a new application of the five particle cluster state and improves the efficiency of the protocol.(4)This paper presents a bidirectional quantum secure direct communication protocol based on the five particle cluster state,all particles in each five particle cluster state are used as lures and inserted into quantum information sequence for eavesdropping detection and secret information transmission.The eavesdropping detection rate in per qubit reachs 88%,which is higher than similar protocols.(5)This paper presents a multi-party controlled bidirectional quantum secure direct communication and authentication protocol based on EPR pairs.EPR pairs are used as quantum carriors.The protocol implements two-way communications by using the characteristic of quantum entanglement swapping of EPR pairs.The identity of legitimate correspondent is encoded with Bell states.The encoded identity is used as lures to mixed in the transmitted sequence randomly for attack detection.Compared with the existied controlled protocols,the protocol realizes communication with multi-user controls.(6)This paper uses the three particle W states as the honeypot particles in the existed controlled quantum secure direct communication protocol to improve the detection rate and prevent double-CNOT attacks.Each particle of three particle W state is randomly inserted into the transmitted sequence to detect eavesdropping,detection rate of quantum hacking reaches 64%.(7)This paper introduces a controlled deterministic secure quantum communica-tion and authentication protocol based on three-particle GHZ state in X basis.Only X basis and Z1Z2X3 basis measurement are used,which makes the protocol easier to realize.Three-particle GHZ state in X basis as lure particles reaches a detection rate of 75% per qubit.2.Quantum secure communication in noise environments(1)This paper studies on the dephasing noise and rotation noise,then constructs logic quantum states which are not subject to noise.The superposition of logic quantum states can constitute a decoherent free subspace of dephasing noise or rotation noise.If the information transmitted through quantum channel is expressed in logic quantumstate,then logic quantum state carring information is transmitted.When the receiver received the logic quantum state,they can get the original quantum state through proper transformation,which guarantees the transmission of the photons without being affected by dephasing noise or rotation noise.On this basis,this paper studies the changes of EPR pairs and hyperentangled state in the dephasing noise and rotation noise environment respectively.Then high fidelity quantum secure communication and super dense coding deterministic secure quantum communication are designed by using EPR pairs and hyperentangled state respectively.Compared with the existed protocols,the two protocols realize the secure communication and identity authentication in collective noise environment and secure communication with high channel capacity in collective noise environment.(2)This paper studies decoherent noise and six qubit decoherence free states.Then a quantum secure direct communication and authentication protocol is proposed based on the six qubit decoherence free states.The six qubit decoherence free states remain constant in the collective decoherent noise enrivonment,no matter how strong the noise is.One of the six qubit decoherence free state is also used as temptation particles for eavesdropping detection,and we get the detection rate of each qubit(81.3%)by calculating the Von Neumann entropy.Six single photon measurement basis Z1Z2X3X4Z5Z6 and X1Z2Z3X4Z5Z6 are used in protocol,which reduces the difficulty of implementation.Through the density matrix analysis the protocol is found resisting coherent attacks.3.Quantum privacy comparison(1)The paper studies on the characteristics of the five particle cluster state,and presents a quantum privacy comparison protocol based on five particle cluster state.Compared with the existed two-user quantum privacy comparison protocols,this protocol is more flexible and more efficient.This protocol can not only compare the privacy of two pairs of users,but also compare only two users' privacy.Compared with the existed multi-user privacy comparison protocol,this protocol is safer in fewer constraints and more reasonable semi-honest third party conditions.The semi-honest third party can not get the private information of users.(2)The multi-user quantum privacy comparison protocol is studied.A semi-honest third party attack vulnerability is found in the existed multi-user quantum privacy comparison protocol,and the improved method is proposed.4.Quantum privacy queryThis paper introduces a quantum privacy query protocol based on two non orthogonal states and USD measurement.The security and performance of the protoocl are analyzed from the perspective of photon loss tolerance,third party two-points attack,quantum efficiency comparison,database security and user privacy.The analysis is not only from the angle of the above single factors,but also from a comprehensive angle for specific or optimal parameter set of the protocol.Finally the results show that the protocol is easier to implement,and the comprehensive performance of the safety and efficiency is higher.
Keywords/Search Tags:quantum information, quantum secure communication, quantum cryptogra-phy, quantum state, security
PDF Full Text Request
Related items