簡易檢索 / 詳目顯示

研究生: 余怡青
I-Ching Yu
論文名稱: 多態系統量子秘密共享
Multilevel Quantum Secret Sharing
指導教授: 林豐利
Lin, Feng-Li
學位類別: 碩士
Master
系所名稱: 物理學系
Department of Physics
論文出版年: 2007
畢業學年度: 95
語文別: 中文
論文頁數: 92
中文關鍵詞: 量子秘密共享量子密碼量子資訊
英文關鍵詞: quantum secret sharing, quantum cryptography
論文種類: 學術論文
相關次數: 點閱:157下載:32
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 我們使用量子力學的性質來處理資訊,量子密碼便是利用測不準原理及粒子間的糾纏性質來達到保密及傳訊的效果。量子密碼目前可以分為兩種情況,第一種是量子金鑰共享,第二種則是秘密共享。第一種情況是Alice傳訊給Bob,並在傳遞的訊息上加密。第二種情況則是有三個人,共享一個包含三個粒子的糾纏態,每個人對自己擁有的粒子做測量,則只有在蒐集其中兩個人測量的結果後,才能推測第三個人測量到的狀態為何,所以第三個粒子的狀態為另兩個人所共享。
    此篇論文將Phys. Rev. A.59, 1829【18】的二態系統,推廣到多態、三粒子及多粒子系統。我們使用的是經富立葉轉換過後的基底,加以線性組合後,所構成d組基底。和Phys. Rev. A.59, 1829【18】一樣,讓參與秘密共享協定的人,任意的在上述d組基底中,隨意選取一組測量自己的粒子。經由計算我們發現在d=4的系統下,有最高的機率發現竊聽者,所以在多態系統下操作可增加協定的安全性。

    We use quantum mechanics to handle our information,such as Quantum Cryptography。Quantum Cryptography can send information and keep the transmission secret by using uncertainty principal and entanglement between particles。

    We can divide Quantum Cryptography into two parts。One of them is Quantum Key Distribution (QKD),the other is Quantum Secret Sharing (QSS)。QKD is the protocol between Alice and Bob,Alice is the person who sends messages to Bob and hopes to keep them in secret。QSS is the protocol between three people ,each of them holds a qubit from the initial three qubits entangled state。Every one measures his or her own particle。Only when we have information about the measuring results of two among them do we have ideas about the measuring result of the third person。
    As a result,we can say that the quantum state of the third particle is shared by others。

    This paper develops Phys. Rev. A.59, 1829【18】 which uses the two level 、three-partite system to multilevel、three-partite and multipartite system 。We measure in d sets of bases which are linearly combined by the Fourier Transform bases。The same as the Phys. Rev. A.59, 1829 【18】 QSS protocol ,people participating in the QSS protocol measure their own particle individually in one of the d sets bases。After calculation,we find it has the largest opportunities to detect the eavesdropper in d=4 system。

    Therefore,we can have safer QSS protocols through increasing the level of quantum states。

    Chapter 1 量子密碼……………………………………………1 1.1量子資訊…………………………………………………….1 1.1.1量子性質……………………………………………2 1.1.2量子資訊應用………………………………………3 1.2量子密碼…………………………………………………….4 1.2.1如何使用量子態來傳訊…………………………..5 1.2.2利用不等式發現竊聽者……………………………7 1.2.3使用較少的量子態傳遞訊息……………………..10 Chapter 2 秘密共享……………………………………………16 2.1 量子秘密共享………………………………………………18 2.1.1 協定步驟……………………………………………18 2.1.2竊聽者分析………………………………………….22 2.2 量子秘密共享發展…………………………………………25 2.3 多體及多態QSS協定方案…………………………………26 2.3.1 多態量子秘密共享…………………………………27 2.3.1.1 Entanglement swapping of generalized cat state and secret sharing……………27 2.3.2 多體量子秘密共享…………………………………33 2.3.2.1 Efficient multiparty quantum-secret-sharing schemes…………………………………33 2.3.2.2 Multiparty quantum secret sharing…………………………………37 Chapter 3 多態系統量子秘密共享協定………………………………41 3.1 多態秘密共享所使用的基底………………………………..41 3.1.1 富立葉轉換的基底…………………………………..41 3.1.2 d=3其他組基底……………………………………..44 3.1.3 d=3→d=4 其他組基底……………………………….47 3.2 多態系統的量子秘密共享協定……………………………….53 3.3 multipartite、multilevel量子秘密共享協定………………55 Chapter 4 安全性分析…………………………………………….57 4.1 竊聽者………………………………………………………….57 4.2 發現竊聽者的機率…………………………………………….58 4.2.1 四態系統中發現竊聽者的機率………………………….58 4.2.2 多態系統中發現竊聽者的機率………………………….74 Chapter5 結論………………………………………………………..77 附錄A: 嘗試證明協定的安性………………………………………………….79 1. 如有竊聽者的共享態…………………………………………79 2.對應不同測量結果的共享態………………………………….83 參考資料……………………………………………………………….88 圖目錄 圖(1) B92 實驗圖…………………………………12 圖(2) 兩粒子互換…………………………………28 圖(3)Bell state的粒子與 cat state第M個粒子交換 Case1……………………………………………29 圖(4)Bell state的粒子與 cat state第M個粒子交換 Case2……………………………………………30 圖(5)利用ES做多態量子祕密共享示意圖…………31 圖(6) 錯誤率與能態系統關係圖……………………75 圖(7)效率、錯誤率與能態系統關係圖……………76 表目錄 表(1) BB84協定方案………………………………6 表(2) B92 Bob測量結果與Alice傳送狀態關係…11 表(3) B92 實驗結果與理論對照表………………14 表(4) HBB三人測量結果關係………………………20 表(5) Bob測量的基底與Alice測量結果的關係…23 表(6) d=4 使用富立葉轉換後的基底測量 三個粒子的關係……………………………………….42 表(7) d=3 三組基底下 三人測量結果關係………46 表(8) d=4 四組基底下 三人測量結果關係………51 表(9)共享態所對應的測量結果…………………..86

    【1】R. Feynman, “Simulating Physics with computers”, S. International Journal of Theoretical Physics 21, p.467-488 (1982).

    【2】P. W. Shor, “Algorithms for quantum computation: discrete logarithm and factoring”, Proceedings of the 35th Annual Symposium on the Foundations of Computer Science, p.124-134 (1994).

    【3】S. Wiesner, “Conjugate coding”, Sigact News 15, pp.78-88(1983).

    【4】Charles H. Bennett and Gilles Brassard, “Quantum cryptography: Public key and coin tossing” , Proceedings of IEEE International Conference on Computers, System and Signal Processing, Bangalore, India, p.175-179 (1984).

    【5】A. Ekert, “Quantum cryptography based on Bell’s theorem”, Phys. Rev. Lett. 67, pp.661-663 (1991).

    【6】C. H. Bennett, “Quantum cryptography using two nonorthogonal states”, Phys. Rev. Lett. 68,3121-3124 (1992).

    【7】J. S. Bell, Physics 1,195;J. F. Clauser, M. A. Horne,A. Shimony, and R. A. Holt, “Proposed Experiment to Test Local Hidden-Variable Theories”, Phys. Rev. Lett. 23, 880 (1969).

    【8】A. Einstein, B. Podolsky and N. Rosen, “Can Quantum-Mechanical Description of Physical Reality Be Considered Complete?” Phys. Rev. 47, 777(1935).

    【9】D. Bohm, “Quantum Theory”, Prentice Hall, Englewood Cliffs, NJ (1951).

    【10】C.H. Bennett, G. Brassard and N.D. Mermin, “Quantum cryptography without Bell’s theorem”, Phys. Rev. Lett. 68, 557 (1992).

    【11】H . Bechmann -Pasquinucci and W. Tittel, “Quantum cryptography using larger alphabets”, Phys. Rev. A 61, 062308 (2000).

    【12】H. Bechmann-Pasquinucci and Asher Peres,“Quantum Cryptography with 3-State Systems”, Phys. Rev. Lett. 85, 3313 (2000).

    【13】Nicolas J. Cerf , Mohamed Bourennane , Anders Karlsson and Nicolas Gisin,“Security of Quantum Key Distribution Using d-Level Systems”, Phys. Rev. Lett. 88, 127902 (2002).

    【14】Samuel L. Braunstein and Peter Van Loock, “Quantum information with continuous variables”, quant-ph/0410100 (2004).

    【15】T. C. Ralph,“Continuous variable quantum cryptography”, Phys. Rev. A 61, 010303 (2000).

    【16】M. D. Reid,“Quantum cryptography with a predetermined key, using continuous-variable Einstein-Podolsky-Rosen correlations”, Phys. Rev. A 62, 062308 (2000).

    【17】D. Bruss,“Optimal Eavesdropping in Quantum Cryptography with Six States”, Phys. Rev. Lett. 81, 3018-3021 (1998).

    【18】M. Hillery, Vladimír Bužek and André Berthiaume,“Quantum secret sharing”, Phys. Rev. A 59, 1829 (1999).

    【19】R. Cleve, D. Gottesman and Hoi-Kwong Lo,“How to Share a Quantum Secret”, Phys. Rev. Lett. 83, 648 (1999).

    【20】Saber Bagherinezhand and Vahid Karimipour, “Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers”, Phys. Rev. A 67, 044302 (2003).

    【21】Vahid Karimipour, Alireza Bahraminasab and Saber Bagherinezhand, “Entanglement swapping of generalized cat states and secret sharing”, Phys. Rev. A 65, 042320 (2002).

    【22】Li-Yi Hsu and Che-Ming Li,“Quantum secret sharing using product states”, Phys. Rev. A 71, 022321 (2005).

    【23】Guo-Ping Guo and Guang-Can, “Quantum secret sharing without entanglement” Phy. Lett. A 310 (2003).

    【24】Yu-Ao Chen, An-Ning Zhang, Zhi Zhao, Xiao-Qi Zhou, Chao-Yang Lu, Cheng-Zhi Peng, Tao Yang, and Jian-Wei Pan, “Experimental Quantum Secret Sharing and Third-Man Quantum Cryptography”,Phys. Rev. Lett. 95, 200502 (2005).

    【25】Hideomi Nihira and C. R. Stroud, Jr.,“Robust multipartite multilevel quantum protocols”, Phys. Rev. A 72, 022337 (2005).

    【26】Zhang-yin Wang and Zhan-jun Zhang, “Three-party qutrit- state sharing”, quant-ph/0607187 (2006).

    【27】Adan Cabello,“N-Particle N-Level Singlet States: Some Properties and Applications”, Phys. Rev. Lett. 89, 100402 (2002).

    【28】Zhan-jun Zhang, Yong Li, and Zhong-xiao Man,“Multiparty quantum secret sharing”, Phys. Rev. A 71, 044301 (2005).

    【29】Li Xiao, Gui Lu Long, Fu-Guo Deng, and Jian-Wei Pan,“Efficient multiparty quantum-secret-sharing schemes”, Phys. Rev. A 69, 052307 (2004).

    【30】Tomas Tyc and Barry C. Sanders,“How to share a continuous-variable quantum secret by optical interferometry”, quant-ph/0107074 (2001).

    【31】Wang-Jung Kim and Seung-Hyun Cha, Journal of the Korean Physical Society, Vol. 48, No. 6 (2006).

    【32】A. Karlsson、M. Koashi and N. Imoto,“Quantum entanglement for secret sharing and secret splitting”, Phys. Rev. A 59, 162 (1999).

    QR CODE