A secure crossing two qubits protocol based on quantum homomorphic encryption

Author:

Cheng Zhen-WenORCID,Chen Xiu-Bo,Xu Gang,Chang Yan,Yang Yu,Yang Yi-Xian

Abstract

Abstract In order to solve the information leakage caused by dishonest intermediate nodes in quantum network coding, we apply quantum homomorphic encryption to the butterfly network, and propose a secure protocol for crossing two qubits. Firstly, in the communication process between two senders and the first intermediate node, two senders encrypt their measured particles and send them to the first intermediate node for encoding. If two intermediate nodes are dishonest and know the encryption rules between two senders and two receivers, or there is an external eavesdropper, none of them can recover the transmitted qubits of two senders from the encrypted transmitted particles. In this way, our protocol can transmit two qubits safely and crossly in the butterfly network. Secondly, by analyzing the internal participant attack and the external eavesdropper attack launched by dishonest intermediate nodes and an external eavesdropper respectively, it is confirmed that our protocol is secure. Finally, the experimental simulation results based on the Qiskit framework prove that our protocol is feasible.

Funder

Huawei Technologies Co. Ltd

BUPT Excellent PhD Students Foundation

NSFC

the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province

Publisher

IOP Publishing

Subject

Electrical and Electronic Engineering,Physics and Astronomy (miscellaneous),Materials Science (miscellaneous),Atomic and Molecular Physics, and Optics

Reference40 articles.

1. Measurement of the Bell operator and quantum teleportation;Braunstein;Phys. Rev. A,1995

2. Quantum teleportation using three-particle entanglement;Karlsson;Phys. Rev. A,1998

3. Advances in quantum teleportation;Pirandola;Nat. Photon.,2015

4. Quantum cryptography: public key distribution and coin tossing;Bennett,1984

5. A proof of the security of quantum key distribution;Biham;J. Cryptol.,2006

Cited by 7 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3