簡易檢索 / 詳目顯示

研究生: 張智閎
Chang, Chih-Hung
論文名稱: 基於GHZ量子態之可抗集合雜訊之量子安全協定
Collective Noise Resistant Quantum Security Protocols Using GHZ States
指導教授: 黃宗立
Hwang, Tzonelih
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Department of Computer Science and Information Engineering
論文出版年: 2014
畢業學年度: 102
語文別: 英文
論文頁數: 102
中文關鍵詞: 量子密碼學集合雜訊隨機量子金鑰分配量子私密比較量子對話GHZ量子態GHZ-like量子態
外文關鍵詞: Quantum Cryptography, Collective noise, Probabilistic Quantum Key Distribution, Quantum Private Comparison, Quantum Dialogue, GHZ state, GHZ-like state
相關次數: 點閱:182下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近年來,基於量子力學的研究發展,量子電腦與量子演算法的研究也日益興起。 然而,許多安全性植基於因數分解或離散對數難題之密碼學系統,皆已被證明可被量子演算法在多項式時間內破解。因此,隨著量子電腦的成熟,近代密碼學所提供的安全技術將面臨重大威脅。有鑑於此,一門結合量子力學與密碼學之研究-量子密碼學因應而生,不同於以複雜的計算過程或數學難題為基礎的設計方式,量子密碼學植基於量子物理的特性來設計安全的協定,故可免於量子電腦所帶來的危害。
    在這幾年來,量子密碼學主要著重於量子金鑰分配和量子通訊相關之研究,其應用可分為:量子金鑰分配、量子金鑰協商、隨機量子金鑰分配、量子直接通訊、確定式量子通訊、量子對話、量子秘密分享、量子私密比較以及量子簽章等協定。然而,大多數這些現存的量子協定必須假設量子通道是理想通道,也就是假設量子傳輸在這些量子通道中,不會受到雜訊的干擾影響。然而,實際上,合法的通訊雙方執行量子通訊時,必須透過光纖來傳輸光子。但在光子傳輸的過程中,光纖的雙折射波動會導致集合雜訊產生。倘若不假設量子通道為理想通道,則這些量子協定在進行竊聽者檢查時,將無法分辨其錯誤率是由此集合雜訊干擾所造成,抑或是竊聽者攻擊所造成的。基於此弱點,竊聽者就可以藉由雜訊來隱蔽其攻擊所造成的錯誤率,讓合法的通訊者在公開討論中誤以為其錯誤率是通道上的雜訊干擾所造成的。因此,如何在量子通道受到集合雜訊干擾下,設計出安全的量子協定成為量子密碼學中近年來熱門的議題。
    基於此,本論文利用可抗集合雜訊之GHZ量子態與GHZ-like量子態,結合量子物理的特性來設計編碼方法並建置量子協定,以確保當量子通道受到雜訊干擾時,仍能保持量子協定的安全性。其中,這些量子協定包含隨機量子金鑰分配、量子私密比較和量子對話。

    Recently, the research in quantum computer and quantum algorithm is prospering due to the development of quantum mechanics. With quantum algorithm, the cryptosystems whose security is based on the problems of factorization and discrete logarithm can be bro-ken with polynomial time. As development on quantum computer area keeps maturing, se-curity technique based on modern cryptography will face a sever threat. In this regard, Quantum cryptography is a novel area coming after quantum physics and cryptography. Different from the modern cryptography that is designed on the basis of intricate calcula-tion and intractable mathematical problems, quantum cryptography can be utilized to de-sign security protocols according to the property of quantum physics.
    In recent years, research about quantum key distribution, quantum communication has been the focus in the area of quantum cryptography, and the research is applied to many areas including quantum key distribution, quantum key agreement, probabilistic quantum key distribution, quantum secure direct communication, deterministic secure quantum communication, quantum dialogue, quantum secret sharing, quantum private comparision and quantum signature are widely studied.
    Nevertheless, most of existing quantum protocols are arranged under the assumption that quantum channel is an ideal channel. In other words, a quantum channel is not affected by any noise while the photons are transmitted through the quantum channel. However, in realilty, two legitimate communicants need to transmit photons through optical fiber. But during the transmission process, the collective noise is generated because of the fluctuation of the birefringence in optical fiber. If the quantum channel is not assumed to be ideal, it is difficult to discern between mistakes caused by the collective noise and mistakes caused by malicious eavesdropper when the eavesdropper checking process are performed in the quantum protocols. Aiming to exploit this weak point, an eavesdropper is able to cover its attack by this kind of noise, which misleads legitimate communicants into believing that mistakes are caused by the noise during their public discussion procedure. As a result, how to design a secure quantum protocol under the condition that quantum channel is disturbed by the collective noise is being the most widely discussed issue in quantum cryptography.
    This thesis focuses on designing secure quantum protocols based on the proposed coding methods by using the GHZ states and the GHZ-like states in order to repel the col-lective noise. The purpose of this thesis is providing a way to improve security of quantum protocols under the condition that the quantum channel suffers from the collective noise. Here, the quantum protocols include probabilistic quantum key distribution, quantum pri-vate comparision and quantum dialogue.

    中文摘要 III Abstract V 誌謝 VII Content VIII List of Tables XI List of Figures XII Chapter 1 Introduction 1 1.1 Probabilistic Quantum Key Distribution Protocol 1 1.2 Quantum Private Comparison Protocols 2 1.3 Quantum Qialogue Protocols 3 1.4 Motivation and Contributions 3 1.5 Thesis Structure 7 Chapter 2 Quantum Background 8 2.1 Quantum Properties 8 2.1.1 The Qubit and Its Properties 8 2.1.2 Unitary Operations 10 2.1.3 Entangled States and Their Properties 12 2.1.4 Efficiency Evaluation Function 16 2.2 Quantum Properties resistant to Collective Noises 16 2.2.1 The Properties of Collective Noises 16 2.2.2 The Quantum States resistant to Collective Noises 17 2.2.2.1 The Logical Qubit resistant to Collective-dephasing Noise 17 2.2.2.2 The Logical Qubit resistant to Collective-rotation Noise 19 Chapter 3 Encoding and Decoding for Collective Noises 23 3.1 The Properties of four-particle Entangled States 23 3.1.1 The the measurement result of four-particle GHZ state 23 3.1.2 The the measurement result of four-particle GHZ-like state 25 3.2 Entanglement Swapping via two three-particle Entangled States 26 3.3 Entanglement Swapping via three three-particle Entangled States 28 3.4 Coding Functions for three-particle Entangled States 33 3.4.1 Coding Function for a GHZ State 33 3.4.2 Coding Function for a GHZ-like State 37 Chapter 4 PQKD with Third Parties immune to Collective Noises 42 4.1 The Proposed PQKD Protocol via four-particle Entangled States 42 4.1.1 PQKD immune to Collective-dephasing Noise 42 4.1.1.1 PQKD protocol using four-particle GHZ state with one TP 43 4.1.1.2 PQKD protocol using four-particle GHZ state with two TPs 47 4.1.2 PQKD immune to Collective-rotation Noise 48 4.1.2.1 PQKD protocol using four-particle GHZ-like state with one TP 49 4.1.2.2 PQKD protocol using four-particle GHZ-like state with two TPs 50 4.1.3 Security Analysis 50 4.1.3.1 Eavesdropping attacks 50 4.1.3.2 Insider attack 51 4.2 The Proposed PQKD Protocol via three-particle Entangled States 55 4.2.1 PQKD immune to Collective-dephasing Noise 55 4.2.1.1 PQKD protocol using GHZ state with one TP 56 4.2.1.2 PQKD protocol using GHZ state with two TPs 60 4.2.2 PQKD immune to Collective-rotation Noise with third parties 61 4.2.3 Security Analysis 62 4.2.3.1 Outsider attack 62 4.2.3.2 Insider attack 63 4.3 Comparison 72 Chapter 5 QPC Protocols immune to Collective Noises 74 5.1 Extended Liu et al.’s Protocol for Collective Nosies 74 5.1.1 Review of Liu et al.’s scheme 74 5.1.2 The Extended Liu et al.’s scheme immune to Collective Noises 76 5.2 The Proposed QPC Protocols immune to Collective Nosies 80 5.2.1 The Proposed QPC Protocols immune to Collective-dephasing Noise 80 5.2.2 The Proposed QPC Protocols immune to Collective-rotation Noise 84 5.2.3 Security Analysis 84 5.3 Comparison 87 Chapter 6 QD Protocols immune to Collective Noises 89 6.1 The Proposed QD immune to Collective-dephasing Noise 90 6.2 The Proposed QD immune to Collective-rotation Noise 93 6.3 Security Analysis 93 6.3.1 Security against eavesdropping attacks 94 6.3.2 Security against Trojan horse attack 94 6.3.3 Security analysis of information leakage 95 Chapter 7 Conclusion 96 Bibliography 98

    [1] C. H. Bennett and G. Brassard, "Quantum Cryptography: Public Key Distribution and Coin Tossing," in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 1984, pp. 175-179.
    [2] C. H. Bennett, "Quantum cryptography using any two nonorthogonal states," Physical Review Letters, vol. 68, pp. 3121-3124, 05/25/ 1992.
    [3] M. Ben-Or, M. Horodecki, D. W. Leung, D. Mayers, and J. Oppenheim, "The universal composable security of quantum key distribution," Theory of Cryptography, Proceedings, vol. 3378, pp. 386-406, 2005.
    [4] S. L. Braunstein and S. Pirandola, "Side-Channel-Free Quantum Key Distribution," Physical Review Letters, vol. 108, Mar 30 2012.
    [5] P. Chen, Y. S. Li, F. G. Deng, and G. L. Long, "Measuring-basis encrypted quantum key distribution with four-state systems," Communications in Theoretical Physics, vol. 47, pp. 49-52, Jan 2007.
    [6] F. G. Deng, G. L. Long, Y. Wang, and L. Xiao, "Increasing the efficiencies of random-choice-based quantum communication protocols with delayed measurement," Chinese Physics Letters, vol. 21, pp. 2097-2100, Nov 2004.
    [7] A. K. Ekert, "Quantum cryptography based on Bell's theorem," Physical review letters, vol. 67, pp. 661-663, 1991.
    [8] G. Gao, "Quantum key distribution by comparing Bell states," Optics Communications, vol. 281, pp. 876-879, Feb 15 2008.
    [9] T. Hwang, C. C. Hwang, and C. W. Tsai, "Quantum key distribution protocol using dense coding of three-qubit W state," European Physical Journal D, vol. 61, pp. 785-790, Feb 2011.
    [10] T. Hwang and K. C. Lee, "EPR quantum key distribution protocols with potential 100% qubit efficiency," Iet Information Security, vol. 1, pp. 43-45, Mar 2007.
    [11] T. Hwang, K. C. Lee, and C. M. Li, "Provably secure three-party authenticated quantum key distribution protocols," Ieee Transactions on Dependable and Secure Computing, vol. 4, pp. 71-80, Jan-Mar 2007.
    [12] X. H. Li, B. K. Zhao, Y. B. Sheng, F. G. Deng, and H. Y. Zhou, "Fault Tolerant Quantum Key Distribution Based on Quantum Dense Coding with Collective Noise," International Journal of Quantum Information, vol. 7, pp. 1479-1489, Dec 2009.
    [13] X.-H. Li, X.-J. Duan, F.-G. Deng, and H.-Y. Zhou, "Error-Rejecting Bennett–Brassard–Mermin Quantum Key Distribution Protocol Based on Linear Optics over a Collective-Noise Channel," International Journal of Quantum Information, vol. 08, pp. 1141-1151, 2010.
    [14] Z. J. Zhang, Z. X. Man, and S. H. Shi, "An efficient multiparty quantum key distribution scheme," International Journal of Quantum Information, vol. 3, pp. 555-560, Sep 2005.
    [15] B. K. Zhao, Y. B. Sheng, F. G. Deng, F. S. Zhang, and H. Y. Zhou, "Stable and Deterministic Quantum Key Distribution Based on Differential Phase Shift," International Journal of Quantum Information, vol. 7, pp. 739-745, Jun 2009.
    [16] P. W. Shor and J. Preskill, "Simple proof of security of the BB84 quantum key distribution protocol," Physical Review Letters, vol. 85, pp. 441-444, Jul 10 2000.
    [17] T. Hwang, C. W. Tsai, and S. K. Chong, "Probabilistic Quantum Key Distribution," Quantum Information & Computation, vol. 11, pp. 615-637, Jul 2011.
    [18] A. C. Yao, "Protocols for secure computations," 23rd Annual Symposium on Foundations of Computer Science, pp. 160-164, 1982 1982.
    [19] F. Boudot, B. Schoenmakers, and J. Traore, "A fair and efficient solution to the socialist millionaires' problem," Discrete Applied Mathematics, vol. 111, pp. 23-36, Jul 2001.
    [20] Y. G. Yang and Q. Y. Wen, "An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement," Journal of Physics a-Mathematical and Theoretical, vol. 42, Feb 2009.
    [21] X. B. Chen, G. Xu, X. X. Niu, Q. Y. Wen, and Y. X. Yang, "An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement," Optics Communications, vol. 283, pp. 1561-1565, Apr 2010.
    [22] Y. G. Yang, J. Xia, X. Jia, and H. Zhang, "Comment on quantum private comparison protocols with a semi-honest third party," Quantum Information Processing, vol. 12, pp. 877-885, Feb 2013.
    [23] W. W. Zhang and K. J. Zhang, "Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party," Quantum Information Processing, vol. 12, pp. 1981-1990, May 2013.
    [24] B. Liu, F. Gao, H. Y. Jia, W. Huang, W. W. Zhang, and Q. Y. Wen, "Efficient quantum private comparison employing single photons and collective detection," Quantum Information Processing, vol. 12, pp. 887-897, Feb 2013.
    [25] B. A. Nguyen, "Quantum dialogue," Physics Letters A, vol. 328, pp. 6-10, Jul 19 2004.
    [26] Y. Xia, C. B. Fu, S. Zhang, S. K. Hong, K. H. Yeon, and C. I. Um, "Quantum dialogue by using the GHZ state," Journal of the Korean Physical Society, vol. 48, pp. 24-27, Jan 2006.
    [27] X. R. Jin, X. Ji, Y. Q. Zhang, S. Zhang, S. K. Hong, K. H. Yeon, et al., "Three-party quantum secure direct communication based on GHZ states," Physics Letters A, vol. 354, pp. 67-70, May 22 2006.
    [28] Z. X. Man and Y. J. Xia, "Improvement of security of three-party quantum secure direct communication based on GHZ states," Chinese Physics Letters, vol. 24, pp. 15-18, Jan 2007.
    [29] Z. X. Man and Y. J. Xia, "Controlled bidirectional quantum direct communication by using a GHZ state," Chinese Physics Letters, vol. 23, pp. 1680-1682, Jul 2006.
    [30] F. Gao, S. J. Qin, Q. Y. Wen, and F. C. Zhu, "Comment on: "Three-party quantum secure direct communication based on GHZ states" [Phys. Lett. A 354 (2006) 67]," Physics Letters A, vol. 372, pp. 3333-3336, Apr 28 2008.
    [31] Y. Xia, J. Song, J. Nie, and H. S. Song, "Controlled secure quantum dialogue using a pure entangled GHZ states," Communications in Theoretical Physics, vol. 48, pp. 841-846, Nov 15 2007.
    [32] Y. Sun, Q. Y. Wen, and F. C. Zhu, "Multiparty quantum chatting scheme," Chinese Physics Letters, vol. 25, pp. 828-831, Mar 2008.
    [33] L. Dong, X. M. Xiu, Y. J. Gao, and F. Chi, "A controlled quantum dialogue protocol in the network using entanglement swapping," Optics Communications, vol. 281, pp. 6135-6138, Dec 15 2008.
    [34] C. W. Yang and T. Hwang, "Quantum dialogue protocols immune to collective noise," Quantum Information Processing, vol. 12, pp. 2131-2142, Jun 2013.
    [35] X. H. Li, F. G. Deng, and H. Y. Zhou, "Efficient quantum key distribution over a collective noise channel," Physical Review A, vol. 78, Aug 2008.
    [36] L. Xi-Han, Z. Bao-Kui, S. Yu-Bo, D. Fu-Guo, and Z. Hong-Yu, "Fault tolerant quantum key distribution based on quantum dense coding with collective noise," International Journal of Quantum Information, vol. 7, pp. 1479-1489, Dec. 2009.
    [37] J. Lin and T. Hwang, "Bell state entanglement swappings over collective noises and their applications on quantum cryptography," Quantum Information Processing, vol. 12, pp. 1089-1107, 2013/02/01 2013.
    [38] P. Zanardi and M. Rasetti, "Noiseless quantum codes," Physical Review Letters, vol. 79, pp. 3306-3309, Oct 27 1997.
    [39] D. A. Lidar, I. L. Chuang, and K. B. Whaley, "Decoherence-free subspaces for quantum computation," Physical Review Letters, vol. 81, pp. 2594-2597, Sep 1998.
    [40] E. Knill, R. Laflamme, and L. Viola, "Theory of quantum error correction for general noise," Physical Review Letters, vol. 84, pp. 2525-2528, Mar 2000.
    [41] X.-H. Li, F.-G. Deng, and H.-Y. Zhou, "Efficient quantum key distribution over a collective noise channel," Physical Review A, vol. 78, 2008.
    [42] C.-W. Yang and T. Hwang, "Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels," Quantum Information Processing, vol. 12, pp. 3207-3222, 2013.
    [43] C. W. Yang and T. Hwang, "Trojan horse attack free fault-tolerant quantum key distribution protocols," Quantum Information Processing, vol. 13, pp. 781-794, Mar 2014.
    [44] W. Huang, Q. Wen, B. Liu, F. Gao, and Y. Sun, "Robust and efficient quantum private comparison of equality with collective detection over collective-noise channels," Science China Physics, Mechanics and Astronomy, vol. 56, pp. 1670-1678, 2013.
    [45] Q. Y. Cai, "Eavesdropping on the two-way quantum communication protocols with invisible photons," Physics Letters A, vol. 351, pp. 23-25, Feb 2006.
    [46] F. G. Deng, X. H. Li, H. Y. Zhou, and Z. J. Zhang, "Improving the security of multiparty quantum secret sharing against Trojan horse attack," Physical Review A, vol. 72, Oct 2005.
    [47] F. G. Deng, X. H. Li, H. Y. Zhou, and Z. J. Zhang, "Improving the security of multiparty quantum secret sharing against Trojan horse attack (vol 72, art no 044302, 2005)," Physical Review A, vol. 73, Apr 2006.
    [48] X. H. Li, F. G. Deng, and H. Y. Zhou, "Improving the security of secure direct communication based on the secret transmitting order of particles," Physical Review A, vol. 74, Nov 2006.
    [49] F. Gao, F. Z. Guo, Q. Y. Wen, and F. C. Zhu, "Comment on "Quantum key distribution for d-level systems with generalized Bell states"," Physical Review A, vol. 72, Dec 2005.
    [50] F. Gao, Q. Y. Wen, and F. C. Zhu, "Comment on: "Quantum exam" Phys. Lett. A 350 (2006) 174," Physics Letters A, vol. 360, pp. 748-750, Jan 2007.
    [51] A. Einstein, B. Podolsky, and N. Rosen, "Can quantum-mechanical description of physical reality be considered complete?," Physical Review, vol. 47, pp. 0777-0780, May 1935.
    [52] D. M. Greenberger, M. A. Horne, A. Shimony, and A. Zeilinger, "BELL THEOREM WITHOUT INEQUALITIES," American Journal of Physics, vol. 58, pp. 1131-1143, Dec 1990.
    [53] W. Dur, G. Vidal, and J. I. Cirac, "Three qubits can be entangled in two inequivalent ways," Physical Review A, vol. 62, Dec 2000.
    [54] C.-W. Yang, C.-W. Tsai, and T. Hwang, "Fault tolerant deterministic quantum communications using GHZ states over collective-noise channels," Quantum Information Processing, vol. 12, pp. 3043-3055, 2013/09/01 2013.
    [55] S.-H. Kao and T. Hwang, "Multiparty controlled quantum secure direct communication based on quantum search algorithm," Quantum Information Processing, vol. 12, pp. 3791-3805, 2013/12/01 2013.
    [56] C. Yang, C. Tsai, and T. Hwang, "Fault tolerant two-step quantum secure direct communication protocol against collective noises," Science China Physics, Mechanics and Astronomy, vol. 54, pp. 496-501, 2011.
    [57] T.-H. Lin, C.-W. Yang, and T. Hwang, "Unitary operation attack and the improvement on probabilistic quantum key distribution," Quantum Info. Comput., vol. 14, pp. 757-762, 2014.
    [58] F. Gao, S. J. Qin, and Q. Y. Wen, "A simple participant attack on the Bradler-Dusek protocol," Quantum Information & Computation, vol. 7, pp. 329-334, May 2007.
    [59] H. K. Lo and H. F. Chau, "Unconditional security of quantum key distribution over arbitrarily long distances," Science, vol. 283, pp. 2050-2056, Mar 1999.
    [60] Y. Sun, Q. Y. Wen, and F. C. Zhu, "Improving the multiparty quantum secret sharing over two collective-noise channels against insider attack," Optics Communications, vol. 283, pp. 181-183, Jan 2010.
    [61] C.-W. Yang and T. Hwang, "Improved QSDC Protocol over a Collective-Dephasing Noise Channel," International Journal of Theoretical Physics, vol. 51, pp. 3941-3950, 2012.
    [62] C. W. Yang and T. Hwang, "Measure-and-Resend Attack and Improvement on "A Scheme to Share Information via Employing Discrete Algorithm to Quantum States"," International Journal of Theoretical Physics, vol. 53, pp. 224-227, Jan 2014.
    [63] C. E. Shannon, "COMMUNICATION THEORY OF SECRECY SYSTEMS," Bell System Technical Journal, vol. 28, pp. 656-715, 1949.
    [64] F. Gao, F. Z. Guo, Q. Y. Wen, and F. C. Zhu, "Comment on "Experimental Demonstration of a Quantum Protocol for Byzantine Agreement and Liar Detection"," Physical Review Letters, vol. 101, Nov 14 2008.
    [65] C. H. Bennett and G. Brassard, "Quantum Cryptography: Public Key Distribution and Coin Tossing," presented at the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 1984.

    下載圖示 校內:2024-08-31公開
    校外:2024-08-31公開
    QR CODE