在线阅读 --自然科学版 2014年4期《基于Bell态的高效量子秘密共享》
基于Bell态的高效量子秘密共享--[在线阅读]
邓晓冉1, 杨帅2
1. 天津职业技术师范大学 理学院, 天津 300222;
2. 天津理工大学 理学院, 天津 300384
起止页码: 352--355页
DOI: 10.11826/j.issn.1000-5854.2014.04.007
摘要
为提高协议在实验中的可操作性,提出了一个利用二粒子最大纠缠Bell态的量子秘密共享协议,其中发送方利用随机插入的正交单量子位,不仅可以有效地检测窃听行为,而且可以减少用于检测安全性的纠缠粒子,进而提高了纠缠粒子的利用率及产生密钥的效率;而接收方Bob和Charlie必须执行联合测量才能获得密钥,单独一方无法获得秘密信息.

Efficient Quantum Secret Sharing Base on the Bell States
DENG Xiaoran1, YANG Shuai2
1. Department of Mathematics and Physics, Tianjin University of Technology and Education, Tianjin 300222, China;
2. Department of Mathematics and Physics, Tianjin University of Technology, Tianjin 300384, China
Abstract:
In order to enhance maneuverability of the protocol in the experiment,a protocol of quantum secret sharing based on the four Bell states is proposed.In the protocol,using the orthonormal single qubits and randomly interting them to two sequences,the sender not only find the listener-in effectively,but also decrease the number of entangled particles,which improves the efficiency in use of entangled particles and the efficiency of producing the secret key;the receivers,both Bob and Charlie must perform the Bell basis measurement to obtain the secret,but either of them cannot.

收稿日期: 2014-3-10
基金项目: 国家自然科学基金(11047015)

参考文献:
[1]BENNETT C H,BRASSARD G.Quantum Cryptography:Public-key Distribution and Coin Tossing[C]//In Proceedings of IEEE International Conference on Computers,Systems and Signal Processing.India:Bangalore,1984:175-179.
[2]BENNETT C H.Quantum Cryptography Using Any Two Nonorthogonal States[J].Phys Rev Lett,1992,68:3121-3124.
[3]EKERT A K.Quantum Cryptography Based on Bell's Theorem[J].Phys Rev Lett,1991,67:661-663.
[4]BENNETT C H,BRASSARD G,MERMIN N D.Quantum Cryptography Without Bell's Theorem[J].Phys Rev Lett,1992,68:557-559.
[5]LI Xihan,DENG Fuguo,ZHOU Hongyu.Efficient Quantum Key Distribution over a Collective Noise Channel[J].Phys Rev,2008,(A)78:022321.
[6]CHEN Wei,HAN Zhengfu,MO Xiaofan,et al.Active Phase Compensation of Quantum Key Distribution System[J].Chin Sci Bull,2008,53(9):1310-1314.
[7]GAO Fei,GUO Fenzhuo,WEN Qiaoyan,et al.Comparing the Efficiencies of Different Detect Strategies in the Ping-pong Protocol[J].Sci China Ser G-phys Mech Astron,2008,51(12):1853-1860.
[8]HILLERY M,BUZEK V,BERTHIAUME A.Quantum Secret Sharing[J].Phys Rev,1999,(A)59:1829-1834.
[9]WEI Daxiu,YANG Xiaodong,LUO Jun,et al.NMR Experimental Implementation of Three-parties Quantum Superdense Coding[J].Chin Sci Bull,2004,49(5):423-426.
[10]YANG Yuguang,WEN Qiaoyan,ZHU Fuchen.Single N-dimensional Qunit Quantum Secret Sharing[J].Acta Phys Sin,2006,55(7):3255-3258.
[11]YAN Fengli,GAO Ting,LI Youcheng.Quantum Secret Sharing Between Multiparty and Multiparty with Four States[J].Sci China Ser G-phys Mech Astron,2007,50(5):572-580.
[12]XIAO Li,LONG Guilu,DENG Fuguo,et al.Efficient Multi-party Quantum Secret Sharing Shemes[J].Phys Rev,2004,(A)69:052307.
[13]QIN Sujuan,WEN Qiaoyan,ZHU Fuchen.A Ring Quantum Secret Sharing Protocol Based on Entanglement Swapping of Bell Ststes[J].Journal of Beijing University of Posts and Telecommunications,2006,29(2):34-37.
[14]DENG Xiaoran,YANG Shuai,YAN Fengli.Quantum Secret Sharing with N-particle Entangled State[J].Acta Photonica Sinca,2010,39(11):2083-2087.
[15]DING Dong,YAN Fengli.Implementation of the Scheme of a Quantum Information Signature Based on Weak Nonlinearity[J].Acta Phys Sin,2013,62(17):010302.
[16]YIN Xunru,MA Wenping,SHEN Dongsu,et al.Three-party Quantum Key Agreement with Bell States[J].Acta Phys Sinica,2013,62(17):170304.