Advanced Search
Volume 30 Issue 11
Jan.  2011
Turn off MathJax
Article Contents
Tao Yuan, Pan Wei, Luo Bin, Li Feng. A Scheme for Quantum Key Distribution Between Any Two Users in a Network via W State[J]. Journal of Electronics & Information Technology, 2008, 30(11): 2588-2591. doi: 10.3724/SP.J.1146.2007.00631
Citation: Tao Yuan, Pan Wei, Luo Bin, Li Feng. A Scheme for Quantum Key Distribution Between Any Two Users in a Network via W State[J]. Journal of Electronics & Information Technology, 2008, 30(11): 2588-2591. doi: 10.3724/SP.J.1146.2007.00631

A Scheme for Quantum Key Distribution Between Any Two Users in a Network via W State

doi: 10.3724/SP.J.1146.2007.00631
  • Received Date: 2007-04-23
  • Rev Recd Date: 2008-01-04
  • Publish Date: 2008-11-19
  • Considering the problem of key distribute between any two users in a network, we transform the coefficients of W state to be uniform in symmetrical form. A scheme for quantum key distribution in a network via W state is proposed. Certificate Authority (CA) and the two users who want to communicate with each other share the three particles of W state. CA performs a measurement on his own particle and promulgates the result of his measurement, two users create their key in corresponding ways according to the measurement result of CA. Then the security of the situation that exists an eavesdropper (Eve) or CA is unauthentic is discussed respectively. It is proved that this scheme can withstand the attack effectively, and carry out the academic efficiency that three W states can be used to gain two bits key.
  • loading
  • [1] Bennett C H and Brassard G. Quantum cryptography:public-key distribution and coin tossing, Proceedings of theIEEE International Conference on Computers, Systems andSignal Processing[C], Bangalore, India, 1984: 175-179. [2] Bennett C H. Quantum cryptography using any twonon-orthogonal state [J].Phys. Rev. Lett.1992, 68(21):3121-3124 [3] Ekert A. Quantum cryptography based on Bells theorem [J].Phys. Rev. Lett.1991, 67(6):661-663 [4] Lo Hoi-Kwong, Ma Xiong-feng, and Chen Kai. Decoy statequantum key distribution [J].Phys. Rev. Lett.2005, 94(23):230504-1 [5] Ma Xiongfeng, Qi Bing, Zhao Yi, and Lo Hoi-Kwong.Practical decoy state for quantum key distribution [J].Phys.Rev. A.2005, 72(1):012326-1 [6] Townsend P D. Secure key distribution based on quantumcryptography [J].Electronics Letter.1994, 30(10):809-811 [7] Biham E, Huttner B, and Mor T. Quantum cryptographicnetwork based on quantum memories [J].Phys. Rev. A.1996,54(4):2651-2658 [8] 曾贵华. 量子密码学[M]. 北京: 科学出版社, 2006: 107-113.Zeng Guihua. Quantum Cryptography [M]. Beijing: Sciencep,2006: 107-113. [9] 杨宇光, 温巧燕, 朱甫臣. 基于W态的量子密钥分配和秘密共享[J]. 北京邮电大学学报, 2006, 29(3): 40-43.Yang Yu-guang, Wen Qiao-yan, and Zhu Fu-chen. Quantumkey distribution and secret sharing via W states [J]. Journalof Beijing University of Posts and Telecommunications, 2006,29(3): 40-43. [10] Clauser J F, Shimony M A, and Holt R A. Proposedexperiment to test local hidden-variable theories [J].Phys.Rav. Lett.1969, 23(15):880-884 [11] Cabello A. Bells theorem with and without inequalities forthe three-qubit Greenberger-Horne-Zeilinger and W states [J].Phy. Rev. A, 2002(65): 032108-032112. [12] Dr W, Vidal G, and Cirac J I. Three qubits can be entangledin two inequivalent ways [J].Phys. Rev. A.2000, 62(6):062314-1 [13] 郭奋卓, 高飞, 温巧燕, 朱甫臣. 一种高效的量子秘密共享方案[J]. 电子学报, 2006, 34(5): 883-886.Guo Fen-zhuo, Gao Fei, Wen Qiao-yan, and Zhu Fu-chen. Aquantum secret sharing scheme with high efficiency [J]. ActaElectronica Sinica, 2006, 34(5): 883-886. [14] Hardy L. Nonlocality of a single photon revisited [J]. Phys.Rev. A, 1994(73): 2279-2283. [15] Zeng Gui-hua and Zhang Wei-ping. Identity verification inquantum key distribution[J].Phys. Rev. A.2000, 61(2):022303-1
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3128) PDF downloads(806) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return