Journal on Communications ›› 2014, Vol. 35 ›› Issue (7): 193-198.doi: 10.3969/j.issn.1000-436x.2014.07.023

• Academic communication • Previous Articles     Next Articles

Multicast communication protocol based on quantum key distribution against trojan horse attacking

Hong-yang MA1,2,Xing-kui FAN1   

  1. 1 School of Sciences,Qingdao Technological University,Qingdao 266033,China
    2 College of Information Science and Engineering,Ocean University of China, Qingdao 266100,China
  • Online:2014-07-25 Published:2017-06-24
  • Supported by:
    The Science and Technology Program of High Education of Shandong;The Qingdao Science and Technology Program-Fundamental Research;The National Natural Science Foundation of China;The National Natural Science Foundation of China

Abstract:

A multicast communication protocol over quantum channel against Trojan horse attacking was proposed, in the network with one source quantum node and M target quantum nodes. The source quantum node is to build 2n+δ quantum EPR state, and to send sequence tags. In the sending sequence, n are selected randomly as the test states. Channel test is carried out with the inequality of CHSH. The rest n+δ of sending sequence transform into non-orthogonal state as the key. The key is block encoded as cipher text which is to be copied into M with optimal universal quantum cloning and sent to each target quantum node. After target quantum node receiving cipher text, decoding is conducted. The communication protocols of throughput, channel utilization, security proof were analyzed theoretically. By analyzing, the protocol can effectively counter Trojan horse attacking, guarantee the multicast communication information safely.

Key words: quantum channel, multicast, Trojan horse, quantum network

No Suggested Reading articles found!