{"title":"基于多量子位哈达玛矩阵的量子密钥分发","authors":"Dazu Huang, Zhigang Chen","doi":"10.1109/IAS.2008.40","DOIUrl":null,"url":null,"abstract":"A deterministic one-step quantum key distribution scheme is proposed based on multi-qubit Hadamard matrices. In our proposed scheme, the secret key, which is encoded and decoded by using multi-qubit Hadamard transform, is deterministic. In addition, we also discuss in some detail how this protocol must be carefully designed for correcting errors and checking eavesdropping. This protocol is secure under the well-known assumption that the classical channel cannot be modified. It also has an advantage of not exchanging any other classical information except for eavesdropping check.","PeriodicalId":103328,"journal":{"name":"2008 The Fourth International Conference on Information Assurance and Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Quantum Key Distribution Based on Multi-qubit Hadamard Matrices\",\"authors\":\"Dazu Huang, Zhigang Chen\",\"doi\":\"10.1109/IAS.2008.40\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A deterministic one-step quantum key distribution scheme is proposed based on multi-qubit Hadamard matrices. In our proposed scheme, the secret key, which is encoded and decoded by using multi-qubit Hadamard transform, is deterministic. In addition, we also discuss in some detail how this protocol must be carefully designed for correcting errors and checking eavesdropping. This protocol is secure under the well-known assumption that the classical channel cannot be modified. It also has an advantage of not exchanging any other classical information except for eavesdropping check.\",\"PeriodicalId\":103328,\"journal\":{\"name\":\"2008 The Fourth International Conference on Information Assurance and Security\",\"volume\":\"55 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-09-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 The Fourth International Conference on Information Assurance and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IAS.2008.40\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 The Fourth International Conference on Information Assurance and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAS.2008.40","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Quantum Key Distribution Based on Multi-qubit Hadamard Matrices
A deterministic one-step quantum key distribution scheme is proposed based on multi-qubit Hadamard matrices. In our proposed scheme, the secret key, which is encoded and decoded by using multi-qubit Hadamard transform, is deterministic. In addition, we also discuss in some detail how this protocol must be carefully designed for correcting errors and checking eavesdropping. This protocol is secure under the well-known assumption that the classical channel cannot be modified. It also has an advantage of not exchanging any other classical information except for eavesdropping check.