节点文献

量子安全通信理论及方案研究

Research on Theories and Schemes of Quantum Secure Communication

【作者】 黄大足

【导师】 陈志刚;

【作者基本信息】 中南大学 , 计算机应用技术, 2010, 博士

【摘要】 以量子通信和量子计算为主要内容的量子信息学是近十多年来迅速发展起来的新兴交叉学科,随着量子信息技术的不断发展,传统的安全通信系统从原理上讲已不再安全。无条件安全的量子通信基于量子力学的客观物理规律,完全不受无限增加的计算能力的威胁,为信息的安全传输提供一种全新的思路及方法。自从第一个量子密码协议(BB84协议)被提出以来,无论是理论研究还是实验实现方面都取得大量研究成果。然而,量子安全通信系统标准尚未形成,并且许多通信方案也需要进一步改进。因此,本博士论文从实际应用和安全性的角度出发,以经典信息论和量子力学理论为基础,对通信协议分析策略、量子安全直接通信、量子秘密共享、量子网络通信和量子信道编码等方面进行研究,主要研究内容如下:(1)对以前的“乒乓”量子通信协议提出一种量子编码攻击策略。基于稳定子量子纠错码的纠错原理和构造技术,分别对基于纠缠态和非正交态的“乒乓”协议的安全性进行分析,并从信息论角度对Eve可以获得的信息量和可能被检测到的概率进行讨论,最后列举三类防御方案。(2)提出三种新的量子安全直接通信方案:第一种方案是基于密集编码和纠缠交换的量子安全双向直接通信方案,因为密集编码的局部幺正操作能传输高维Bell态,因此该方案的优点是能大容量地直接传输彼此的秘密消息,并且传输序列的秘密性以及纠缠变换确保该系统的安全;第二种方案是基于单光子极化角的量子安全双向通信方案,考虑到纠缠光子态在制备和检测方面的困难性,采用相对较容易制备和检测的单光子源作为信息载体,利用其秘密极化角交互秘密消息,很容易在通信方之间进行秘密消息的单向或双向直接传输,类似传统的通信方式,更符合实际通信需求;第三种方案是基于混沌理论和认证技术的量子安全直接通信方案,将身份认证和广义Arnold映射巧妙结合,在一步通信中同步完成身份认证和秘密消息的直接传输。直接消息传输依赖粒子的秘密传输顺序,秘密传输顺序依赖于具有密码意义安全性的混沌映射,而身份认证和混沌映射所需密钥来自于共享的EPR对,EPR对仅使用一次,类似于一次便签密码协议的安全性。而且,本方案与以前提出的一些量子安全直接通信方案相比,更便于实际应用。(3)提出一种基于量子傅里叶变换的(n,n)门限秘密共享方案,该方案实际上就是一种多方的密钥分发,秘密消息通过量子傅里叶变换和逆变换进行分割和恢复。同时,针对攻击者的窃听、不诚实的参与者以及信道中的噪声和丢失进行严谨的设计。该方案的优点除安全之外,就是它很容易在真实的量子分布式计算中实现,因为它完全兼容量子计算。又提出一种量子密钥分发方案,只需要一次通信过程就可以完成量子密钥分发。秘密密钥可以事先确定,通过傅立叶变换和反变换实现对秘密密钥的编码和解码,并且只需要在攻击检测中交换少量经典信息,该方案具有较高的通信效率。(4)提出一种小规模网络中实现多步量子远程传态的量子网络通信方案。该方案中,通信网络中的单量子比特信源节点使用多级远程传态的方式将未知量子态传输给网络中的其他节点,网络中的每一个中间节点能够将自己接收到的任何量子信息使用多步量子远程传态又传送给其他节点,通过未知的单量子比特态的远程传态和复合的未知两量子比特态的远程传态两个阶段实现量子网络通信。本方案最大的优势在于多点同步通信和它的线性特性,在实际的量子通信中较容易实现,而且量子远程传态过程是基于预先安全共享的Bell纠缠态作为量子信道,此方案是安全的。(5)基于矩阵的多级递归结构提出一种稳定子[[N,K,d]量子纠错编码方案,稳定子的生成子是由级联矩阵中随机选择的N-k行组成,较容易构造出码长N任意长的稳定子量子码,并且具有较好的参数和较高的编码和解码效率。此外,根据二元量子信道的特点,提出一种基于量子控制非门(CNOT)操作的量子信道极化编码方案,量子信道极化被用来构建量子信道极化码,能获取任何给定的离散无记忆量子信道的容量,并具有较低的编码和解码复杂度。

【Abstract】 Quantum information science, which mainly consists of quantum communications and quantum computing, has been developed quickly to be one of the newest cross-linked research fields. With the development of quantum computing, traditional crypto-systems for communications are no longer secure. However, quantum communication with unconditional security on basis of quantum mechanics, for which it is impossible to be attacked by the infinite increasingly computation ability, provides a new idea and approach for information security transmissions. In the meantime, it is also a method to ensure information security communication as soon as quantum computers appear successfully in the future. Since the first quantum key distribution (QKD) protocol-BB84 was proposed in 1984, much progress has been made in both of theoretical investigations and experimental implements. However, quantum secure communication standards haven’t been formed; and some schemes also need further improvement. Based on the classical information theory and quantum mechanics, this dissertation focuses on some theoretical issues and schemes of quantum secure communication for actual application and safety, in particular, mainly researches into communication protocol analysis, quantum secure direct communication, quantum secret sharing, quantum network communication, quantum channel coding and so on. Main contributions are summarized as follows:(1) A quantum coding attack strategy is proposed to attack the "ping-pong" communication protocol. Based on theories and techniques of the stabilizer quantum error correction code, attacking strategies of "Ping-Pong" scheme based on either entanglement state or no orthogonal state are proofed and demonstrated, respectively. Furthermore, information obtained by Eve and the possible probability detected by the legitimate communicators are analyzed by employing information theory. Finnally, three kinds of schemes are proposed to withstand the presented coding attacking strategies.(2) Three kinds of quantum secure direct communication schemes are presented. The first scheme is proposed to exchange directly the communicators’secret messages by making use of entanglement swapping of Bell states and super dense coding. It has great capacity to distribute the secret messages to each other since these messages have been imposed on high-dimensional Bell states via the local unitary operations with super dense coding. The security is ensured by the secure transmission of the travelling sequences and the application of entanglement swapping. Secondly, considering entanglement state is more difficult in preparing and detecting than single photons without correlation. Based on single photons with random polarization angel, a deterministic secure bidirectional or single diretional quantum communication scheme is presented. In this scheme, secret messages are encoded in the single photons rotated random polarization angle by performing a series of independent operations in three-way quantum channel. This scheme, which is similar to traditional communication mode, is more suitable for the practical communication. Thirdly, a quantum secure direct communication protocol based on chaos is proposed with authentication. Identity verification is flexibly combined with the general Arnold map in this scheme, and identity authentication and deterministic message transmission are completed simultaneously in a one-way channel. Direct message transmission is based on the secret order of transmission particles, and the secret order relies on a chaotic map with the essence of cryptographic security. Identity verification and the key of the general Arnold map depend on the correlation of the shared EPR pairs using Bell’s theorem. The shared EPR pairs and the key are used only once, as in the secure one-time pad protocol. Furthermore, our scheme also improves the practical applicability of quantum direct communication compared with the convensional QSDC schemes.(3) A (n,n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform (QFT). In fact, it is a multiparty quantum key distribution. In our proposed scheme, the secret messages, which are encoded by using the forward quantum Fourier transform and decoded by using the reverse, are split and shared in such a way that it can be reconstructed among them only if all the participants work in concert. Furthermore, we also discuss how this protocol must be carefully designed for correcting errors and checking eavesdropping or a dishonest participant. Security analysis shows that our scheme is secure. Also, this scheme has an advantage that it is completely compatible with quantum computation and easier to be realized in the distributed quantum secure computation. A deterministic one-step quantum key distribution scheme based on QFT is also proposed. In the proposed scheme, the secret key, which is encoded and decoded by using QFT, is deterministic. The whole process only needs a step communication. Moreover, it has an advantage of not exchanging any other classical information except for eavesdropping check.(4) A quantum network communication scheme via multi-step quantum teleportation is proposed in a small-scale network based on entanglement of Bell states. In this scheme, it contains certain number of single-qubit quantum source nodes that teleport unknown quantum states to other nodes on the network in the multi-teleport fashion where every intermediate node can pass on any of its received quantum information to others via multi-step quantum teleportation. This scheme is implemented for quantum network communication with two phases, i.e., the phase for executing teleportation of unknown single-qubit states and the phase for teleportation of combined unknown two-qubit states. Advantages of our scheme lie in Synchronous communications among multi-points and its linearity, which is easy to implement for quantum communications in practical applications. In addition, this scheme is secure since the process of quantum teleportation is based on entanglement of Bell states which has been securely set up in advance as quantum channels.(5) A kind of stabilizer quantum code is proposed based on multilevel constructed matrices. The N-k generators of the stabilizer of the designed codes [[N, k, d]]can be constructed via selecting randomly N-k rows from a concatenated matrix with the orthogonal rows. Thus, it is very easy to construct these kinds of codes with arbitrary larger N, and breakthroughs the present bound on the minimum distance for codeword length N up to 30 qubits. Furthermore, the resulting codes with better perimeters are more efficient than the previous quantum codes. A quantum polarization coding scheme with Quantum-CNOT Operations is also suggested to design quantum bit (qubit) sequences that achieve the symmetric capacity for any given binary-input discrete memoryless quantum channels. Quantum channel polarization is proposed as a quantum coding technique to construct a quantum polar code for quantum transmissions with much efficiency. We have boosted the symmetric capacity to near channel capacity. Moreover, its coding and decoding complexity is much lower with the recurisive decoding algorithms.

  • 【网络出版投稿人】 中南大学
  • 【网络出版年期】2012年 02期
  • 【分类号】O413.1;TN918.1
  • 【被引频次】4
  • 【下载频次】666
  • 攻读期成果
节点文献中: 

本文链接的文献网络图示:

本文的引文网络