Processing

Please wait...

Settings

Settings

Goto Application

1. WO2011002276 - QUANTUM KEY DISTRIBUTION IN TERMS OF THE GREENBERGER-HORNE-ZEILINGER STATE - MULTI-KEY GENERATION

Note: Text based on automatic Optical Character Recognition processes. Please use the PDF version for legal matters

[ EN ]

CLAIMS

1. A method of carrying out communication between multiple users based on a quantum key distribution (QKD), the method comprising:

generating (101) Greenberger-Horne-Zei linger states (GHZs) by all users randomly; distributing (102) a particle from each GHZs to form sub-sequences;

forming (103) a plurality of sequences correspond to a plurality of users based on the particles on each user, wherein one of the sequences generated by the sender comprises a home sequence;

transmitting (104) sub-sequences to the other users;

checking (105) security of the channels through verifying the sequences;

encoding (107) users' own key that are in the particles of the other users;

transmitting (108) blocks of particles and returning to the corresponding user;

retrieving (109) own initial sequences, wherein the keys of the other users are decoded;

performing (110) a GHZs measurement to obtain encoded keys by each user; and comparing (112) the measurement results at each user site.

2. The method according to claim 1, wherein the recipient users acknowledges before establishment of the transmission.

3. The method according to claim 1, wherein the transmission (104) of the particles occurs in blocks and orders of the sequences that are not known to the recipients.

4. The method according to claim 1, wherein the GHZ triplets are n+d+d' ordered GHZ triplets.

5. The method according to claim 1, wherein the transmitting (104) sub- sequences to the users before establishing the communication.

6. The method according to claim 1, wherein the encoding (107) includes applying a unitary transformation on the particles sent by the other users.

7. The method according to claim 5, wherein the transmitting sub-sequences is carried out on the particles with the same tag number of the two different sub-sequences.

8. The method according to claim 1, wherein the checking of the security is carried out by the property of entanglement.

9. The method according to claim 1, wherein the transmission of the blocks are returning to the other partners carried out upon completion of the encoding process.

10. The method according to claim 1, wherein each of the user holds a same plurality of key as the total users.