-
公开(公告)号:US08391486B2
公开(公告)日:2013-03-05
申请号:US13068466
申请日:2011-04-28
Applicant: James E. Troupe
Inventor: James E. Troupe
IPC: H04L29/06
CPC classification number: H04B10/70 , H04L9/0852
Abstract: A method is provided for distributing a random list of binary values between first and second parties. The method includes sending photons from the second party into an interferometer at a first beam splitter; performing a first weak measurement on photons as a first pointer result into a first time-ordered list for photons; performing a second weak measurement by the first party on photons that pass through a second beam splitter as being a second pointer result into a second time-ordered list; recording identification for first and second detectors that the photons arrive via a third beam splitter as respective first and second detector registrations for collecting in a third time-ordered list as respective first and second detection lists; determining first and second averages of the respective first and second detection lists; and comparing the averages to verify existence of a non-trivial difference that indicates secure communication status of the element's binary value.
Abstract translation: 提供了一种用于在第一方和第二方之间分配二进制值的随机列表的方法。 该方法包括在第一分束器处将光子从第二方发送到干涉仪中; 对光子执行第一个弱测量作为第一个指针结果为光子的第一个有序列表; 在通过第二分束器的光子上执行第一方的第二弱测量作为第二指针结果为第二时间排序列表; 用于第一和第二检测器的记录识别,光子通过第三分束器到达作为相应的第一和第二检测器注册,用于以第三有序列表收集作为相应的第一和第二检测列表; 确定相应的第一和第二检测列表的第一和第二平均值; 并比较平均值以验证是否存在表示元素二进制值的安全通信状态的非平凡差异。
-
公开(公告)号:US20120314863A1
公开(公告)日:2012-12-13
申请号:US13068466
申请日:2011-04-28
Applicant: James E. Troupe
Inventor: James E. Troupe
IPC: H04K1/00
CPC classification number: H04B10/70 , H04L9/0852
Abstract: A method is provided for distributing a random list of binary values between first and second parties. The method includes sending photons from the second party into an interferometer at a first beam splitter; performing a first weak measurement on photons as a first pointer result into a first time-ordered list for photons; performing a second weak measurement by the first party on photons that pass through a second beam splitter as being a second pointer result into a second time-ordered list; recording identification for first and second detectors that the photons arrive via a third beam splitter as respective first and second detector registrations for collecting in a third time-ordered list as respective first and second detection lists; determining first and second averages of the respective first and second detection lists; and comparing the averages to verify existence of a non-trivial difference that indicates secure communication status of the element's binary value.
Abstract translation: 提供了一种用于在第一方和第二方之间分配二进制值的随机列表的方法。 该方法包括在第一分束器处将光子从第二方发送到干涉仪中; 对光子执行第一个弱测量作为第一个指针结果为光子的第一个有序列表; 在通过第二分束器的光子上执行第一方的第二弱测量作为第二指针结果为第二时间排序列表; 用于第一和第二检测器的记录识别,光子通过第三分束器到达作为相应的第一和第二检测器注册,用于以第三有序列表收集作为相应的第一和第二检测列表; 确定相应的第一和第二检测列表的第一和第二平均值; 并比较平均值以验证是否存在表示元素二进制值的安全通信状态的非平凡差异。
-
公开(公告)号:US09306739B1
公开(公告)日:2016-04-05
申请号:US14548167
申请日:2014-11-19
Applicant: James E. Troupe
Inventor: James E. Troupe
CPC classification number: H04L9/0852 , H04L9/002 , H04L9/0858
Abstract: A communication process is provided for sending a qubit message between Alice and Bob using a quantum channel for obviating a faked-state attack by Eve. The qubit message is composed of ensemble bits and transmitted as a plurality of photons into the quantum channel. Each photon has a corresponding bit value. The process includes: Alice preparing three uniformly random bit strings each of length 4N to produce strings R (raw key), P (bit basis) and U (unitary operation), and Bob preparing two uniformly random bit strings of the same length to produce strings M (bit basis) and V (unitary operation). Alice broadcasts P, applies her unitary operation and records a first weak measurement to the photons for transmission. Meanwhile Bob broadcasts M, applies his unitary operation and records both a second weak measurement and a strong measurement to the photons. Alice segregates her key and weak measurement strings to produce corresponding truncated strings from differing bases in P and M, and broadcasts the truncated key string. Bob segregates his weak and strong measurement strings from the differing bases to produce corresponding truncated strings, broadcasting the truncated strong measurement string. Bob then compares an average of his truncated weak measurement string to a security threshold as a first condition. Alice compares an average of her truncated weak measurement string to the security threshold as a second condition. If both conditions are satisfactory, Alice segregates a new truncated key string from R by selecting same bases in P and M for sending to Bob.
Abstract translation: 提供了一种通信过程,用于在Alice和Bob之间使用量子信道发送量子比特消息,以消除Eve的伪状态攻击。 量子位消息由整体位组成,并作为多个光子传输到量子通道中。 每个光子都有相应的位值。 该过程包括:Alice准备长度为4N的三个均匀的随机比特串,以产生字符串R(原始密钥),P(比特基础)和U(单一运算),Bob准备两个相同长度的均匀随机比特串, 字符串M(位基)和V(单一运算)。 爱丽丝广播P,应用她的单一操作,并记录第一个弱测量到光子传输。 同时,Bob广播M,应用他的单一操作,并记录了光子的第二个弱测量和强测量。 爱丽丝分离她的密钥和弱测量字符串,从P和M中的不同基地产生相应的截断字符串,并广播截断的密钥串。 鲍勃将他的弱和强测量串从不同的基础分离出来,产生相应的截断字符串,广播截断的强测量字符串。 然后,Bob将其截断的弱测量字符串的平均值与安全阈值作为第一条件进行比较。 Alice将她截断的弱测量字符串的平均值与安全阈值作为第二个条件进行比较。 如果两个条件都令人满意,则Alice通过在P和M中选择相同的基数来将新的截断的密钥串从R R中分离出来,以发送给Bob。
-
公开(公告)号:US20220329417A1
公开(公告)日:2022-10-13
申请号:US16844404
申请日:2020-04-09
Applicant: Jacob M. Farinholt , James E. Troupe
Inventor: Jacob M. Farinholt , James E. Troupe
IPC: H04L9/08
Abstract: A quantum key distribution (QKD) receiver is provided for communicating with a transmitter that produces a plurality of entangled photon qubit pairs to send one qubit from each pair randomly alternating between basis states. The receiver includes a first polarized beam splitter, an orthogonal pair of photon detectors, a weak measurement apparatus, a broadcaster, an error rate estimator, and a post-processor. The first splitter receives the one qubit for passage or reflection. The photon detector pair measures the one qubit from passage or reflection. The apparatus performs a weak measurement on the one qubit and includes an impedance device to induce time delay, a pair of mirrors flanking the impedance device, and second and third polarized beam splitters for alternatively passing the one qubit to each other and to the pair of mirrors. The broadcaster for sending weak measurement results from the detectors to the transmitter. The error rate estimator determines whether the weak measurement satisfies a bit error threshold. The post-processor corrects the weak measurement from one of the basis states in response to a shared random key from the transmitter.
-
-
-