透過您的圖書館登入
IP:3.12.146.87
  • 學位論文

多態系統量子秘密共享

Multilevel Quantum Secret Sharing

指導教授 : 林豐利
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


我們使用量子力學的性質來處理資訊,量子密碼便是利用測不準原理及粒子間的糾纏性質來達到保密及傳訊的效果。量子密碼目前可以分為兩種情況,第一種是量子金鑰共享,第二種則是秘密共享。第一種情況是Alice傳訊給Bob,並在傳遞的訊息上加密。第二種情況則是有三個人,共享一個包含三個粒子的糾纏態,每個人對自己擁有的粒子做測量,則只有在蒐集其中兩個人測量的結果後,才能推測第三個人測量到的狀態為何,所以第三個粒子的狀態為另兩個人所共享。 此篇論文將Phys. Rev. A.59, 1829【18】的二態系統,推廣到多態、三粒子及多粒子系統。我們使用的是經富立葉轉換過後的基底,加以線性組合後,所構成d組基底。和Phys. Rev. A.59, 1829【18】一樣,讓參與秘密共享協定的人,任意的在上述d組基底中,隨意選取一組測量自己的粒子。經由計算我們發現在d=4的系統下,有最高的機率發現竊聽者,所以在多態系統下操作可增加協定的安全性。

並列摘要


We use quantum mechanics to handle our information,such as Quantum Cryptography。Quantum Cryptography can send information and keep the transmission secret by using uncertainty principal and entanglement between particles。 We can divide Quantum Cryptography into two parts。One of them is Quantum Key Distribution (QKD),the other is Quantum Secret Sharing (QSS)。QKD is the protocol between Alice and Bob,Alice is the person who sends messages to Bob and hopes to keep them in secret。QSS is the protocol between three people ,each of them holds a qubit from the initial three qubits entangled state。Every one measures his or her own particle。Only when we have information about the measuring results of two among them do we have ideas about the measuring result of the third person。 As a result,we can say that the quantum state of the third particle is shared by others。 This paper develops Phys. Rev. A.59, 1829【18】 which uses the two level 、three-partite system to multilevel、three-partite and multipartite system 。We measure in d sets of bases which are linearly combined by the Fourier Transform bases。The same as the Phys. Rev. A.59, 1829 【18】 QSS protocol ,people participating in the QSS protocol measure their own particle individually in one of the d sets bases。After calculation,we find it has the largest opportunities to detect the eavesdropper in d=4 system。 Therefore,we can have safer QSS protocols through increasing the level of quantum states。

參考文獻


【2】P. W. Shor, “Algorithms for quantum computation: discrete logarithm and factoring”, Proceedings of the 35th Annual Symposium on the Foundations of Computer Science, p.124-134 (1994).
【3】S. Wiesner, “Conjugate coding”, Sigact News 15, pp.78-88(1983).
【5】A. Ekert, “Quantum cryptography based on Bell’s theorem”, Phys. Rev. Lett. 67, pp.661-663 (1991).
【6】C. H. Bennett, “Quantum cryptography using two nonorthogonal states”, Phys. Rev. Lett. 68,3121-3124 (1992).
【7】J. S. Bell, Physics 1,195;J. F. Clauser, M. A. Horne,A. Shimony, and R. A. Holt, “Proposed Experiment to Test Local Hidden-Variable Theories”, Phys. Rev. Lett. 23, 880 (1969).

延伸閱讀


國際替代計量