Simulation Tools and Techniques. 11th International Conference, SIMUtools 2019, Chengdu, China, July 8–10, 2019, Proceedings

Research Article

A Quantum Key Distribution Protocol Based on the EPR Pairs and Its Simulation

Download
109 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-32216-8_28,
        author={Jian Li and Hengji Li and Chaoyang Li and Leilei Li and Yanyan Hou and Xiubo Chen and Yuguang Yang},
        title={A Quantum Key Distribution Protocol Based on the EPR Pairs and Its Simulation},
        proceedings={Simulation Tools and Techniques. 11th International Conference, SIMUtools 2019, Chengdu, China, July 8--10, 2019, Proceedings},
        proceedings_a={SIMUTOOLS},
        year={2019},
        month={10},
        keywords={Quantum key distribution Entanglement Quantum circuit simulation},
        doi={10.1007/978-3-030-32216-8_28}
    }
    
  • Jian Li
    Hengji Li
    Chaoyang Li
    Leilei Li
    Yanyan Hou
    Xiubo Chen
    Yuguang Yang
    Year: 2019
    A Quantum Key Distribution Protocol Based on the EPR Pairs and Its Simulation
    SIMUTOOLS
    Springer
    DOI: 10.1007/978-3-030-32216-8_28
Jian Li, Hengji Li1,*, Chaoyang Li1, Leilei Li1, Yanyan Hou, Xiubo Chen1, Yuguang Yang2
  • 1: Beijing University of Posts Telecommunications
  • 2: Beijing University of Technology
*Contact email: lihj@bupt.edu.cn

Abstract

A novel quantum key distribution protocol based on entanglement and dense coding is proposed, which does not need to store the qubits. Every four particles is divided into a group, of which or are in entanglement. Some of the groups are used to transfer the message, and the others are used to check the eavesdropping. In the message mode, the authorized party needn’t to know the location information of the group, he only needs to make the unitary operation to the first and the forth of the group. Also, the trade-off between information and disturbance is calculated under the intercept-measure-resend attack and entanglement-measure attack, which tells that the protocol is asymptotically secure. Moreover, the quantum circuit simulation of the protocol is shown.