量子电子学报

• 量子光学 • 上一篇    下一篇

基于诱骗态的BB84协议的量子秘密共享方案

于浩 ,贾玮2,3,昝继业1,卞宇翔2*,刘金锁2,3   

  1. 1.国网安徽省电力有限公司信息通信分公司,安徽合肥,230061; 2.南瑞集团有限公司(国网电力科学研究院有限公司),江苏南京,211000; 3.南京南瑞国盾量子技术有限公司,江苏南京,211000
  • 出版日期:2019-05-28 发布日期:2019-05-14
  • 作者简介:于浩(1973-),男,安徽临泉人,高级工程师,主要研究方向:量子保密通信技术、电力系统通信技术
  • 基金资助:
    upported by State Grid Anhui Electric Power Co., Ltd. 2018 Innovation Project "Research and Verification of Key Technologies for Quantum Secure Communication for Power Multi-Service Security Enhancement"(国网安徽省电力有限公司2018年创新项目《面向电力多业务安全提升的量子保密通信关键技术研究与验证》,基金号:B1120718003P)

A Novel BB84-based Quantum Secret Sharing with Decoy States

YU Hao1,JIA Wei2,3,ZAN Ji-ye1,BIAN Yu-xiang2,LIU Jin-suo2,3   

  1. 1. Information and Communication Branch of State Grid Anhui Electric Power Co., Ltd., Hefei, Anhui, 230061, China; 2. Nari Group Corporation/State Grid Electric Power Research Institute, Nanjing, Jiangsu, 211000, China; 3. NRGD Quantum CTEK, LTD., Nanjing, Jiangsu, 211000, China
  • Published:2019-05-28 Online:2019-05-14

摘要: 量子密码是量子理论和密钥学相结合的产物,是量子保密通信中重要组成部分。而量子秘密共享(Quantum secret sharing , QSS)是量子密码的核心内容之一,它可以在不完全信任的通信双方间传递密钥,目前引起了国内外研究人员的高度关注。本文提出一种基于诱骗态的BB84协议的量子秘密共享方案。Alice先产生一系列的弱相干脉冲串,并对该脉冲串进行偏振调制,然后通过一x:y的分束器BS分成两束,再分别对这两束脉冲通过诱骗态调制器进行强度调制后,分别发送给Bob和Charlie;Bob和Charlie分别对发送过的脉冲进行测量并公布结果,随后三方通过经典信道进行对基,最后通过协商和私密放大获得最终的安全的密钥。由于方案减少了量子比特产生器和测量器的数量,降低了量子通信的费用,这将为量子秘密共享实用化提供一种可参考的方法。

关键词: 量子光学, 量子秘密共享, 诱骗态, BB84

Abstract: Quantum cryptography is the product of the combination of quantum theory and key science, and is an important part of quantum secure communication. Quantum secret sharing (QSS) is one of the core contents of quantum cryptography. It can transfer keys between two parties that are not fully trusted. At present, it has attracted the attention of researchers at home and abroad. In this paper, a novel BB84-based quantum secret sharing with decoy states is proposed, which a series of weak coherent pulses generated by Alice are polarization modulated, and are separated as two series of weak coherent pulses by a Beam Splitter. The two series of weak coherent pulses are intensity modulated by a Decoy Modulator, and then are sent to Bob and Charlie. Bob and Charlie measure the weak coherent pulses and announce the results. Based on the results, Alice, Bob and Charlie can obtain the secure key after basis reconciliation, error correction and privacy amplification. As the numbers of qubit generating and measuring devices are reduced greatly, the scheme provides a practical way for QSS technique with less cost.

Key words: quantum optics, quantum secret sharing, decoy states, BB84