Abstract
Abstract
In order to solve the information leakage caused by dishonest intermediate nodes in quantum network coding, we apply quantum homomorphic encryption to the butterfly network, and propose a secure protocol for crossing two qubits. Firstly, in the communication process between two senders and the first intermediate node, two senders encrypt their measured particles and send them to the first intermediate node for encoding. If two intermediate nodes are dishonest and know the encryption rules between two senders and two receivers, or there is an external eavesdropper, none of them can recover the transmitted qubits of two senders from the encrypted transmitted particles. In this way, our protocol can transmit two qubits safely and crossly in the butterfly network. Secondly, by analyzing the internal participant attack and the external eavesdropper attack launched by dishonest intermediate nodes and an external eavesdropper respectively, it is confirmed that our protocol is secure. Finally, the experimental simulation results based on the Qiskit framework prove that our protocol is feasible.
Funder
Huawei Technologies Co. Ltd
BUPT Excellent PhD Students Foundation
NSFC
the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province
Subject
Electrical and Electronic Engineering,Physics and Astronomy (miscellaneous),Materials Science (miscellaneous),Atomic and Molecular Physics, and Optics
Reference40 articles.
1. Measurement of the Bell operator and quantum teleportation;Braunstein;Phys. Rev. A,1995
2. Quantum teleportation using three-particle entanglement;Karlsson;Phys. Rev. A,1998
3. Advances in quantum teleportation;Pirandola;Nat. Photon.,2015
4. Quantum cryptography: public key distribution and coin tossing;Bennett,1984
5. A proof of the security of quantum key distribution;Biham;J. Cryptol.,2006
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献