A secure crossing two qubits protocol based on quantum homomorphic encryption

QUANTUM SCIENCE AND TECHNOLOGY(2022)

引用 3|浏览10
暂无评分
摘要
In order to solve the information leakage caused by dishonest intermediate nodes in quantum network coding, we apply quantum homomorphic encryption to the butterfly network, and propose a secure protocol for crossing two qubits. Firstly, in the communication process between two senders and the first intermediate node, two senders encrypt their measured particles and send them to the first intermediate node for encoding. If two intermediate nodes are dishonest and know the encryption rules between two senders and two receivers, or there is an external eavesdropper, none of them can recover the transmitted qubits of two senders from the encrypted transmitted particles. In this way, our protocol can transmit two qubits safely and crossly in the butterfly network. Secondly, by analyzing the internal participant attack and the external eavesdropper attack launched by dishonest intermediate nodes and an external eavesdropper respectively, it is confirmed that our protocol is secure. Finally, the experimental simulation results based on the Qiskit framework prove that our protocol is feasible.
更多
查看译文
关键词
quantum network coding, quantum homomorphic encryption, butterfly network, crossing two qubits, internal participant attack
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要