CN105049200B - The data post processing method of quantum key distribution system - Google Patents
The data post processing method of quantum key distribution system Download PDFInfo
- Publication number
- CN105049200B CN105049200B CN201510500542.XA CN201510500542A CN105049200B CN 105049200 B CN105049200 B CN 105049200B CN 201510500542 A CN201510500542 A CN 201510500542A CN 105049200 B CN105049200 B CN 105049200B
- Authority
- CN
- China
- Prior art keywords
- detector
- detection efficient
- error code
- signal
- key distribution
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000009826 distribution Methods 0.000 title claims abstract description 35
- 238000000034 method Methods 0.000 title claims abstract description 29
- 238000012805 post-processing Methods 0.000 title claims abstract description 13
- 238000001514 detection method Methods 0.000 claims abstract description 62
- 238000003672 processing method Methods 0.000 abstract description 5
- 230000006870 function Effects 0.000 description 14
- 230000003321 amplification Effects 0.000 description 6
- 238000003199 nucleic acid amplification method Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 238000003860 storage Methods 0.000 description 5
- 238000012937 correction Methods 0.000 description 4
- 230000010287 polarization Effects 0.000 description 4
- 238000005259 measurement Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 235000013399 edible fruits Nutrition 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 238000012512 characterization method Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 210000003733 optic disk Anatomy 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000002304 perfume Substances 0.000 description 1
- 238000005293 physical law Methods 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 230000005610 quantum mechanics Effects 0.000 description 1
- 235000013599 spices Nutrition 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Landscapes
- Optical Communication System (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a kind of data post processing methods of quantum key distribution system, include the following steps:Separately detect multiple signals of sender's transmitting;The detection efficient of the first detector and the detection efficient of the second detector are obtained according to the quantity of the quantity of signal and multiple signals;Safe key is obtained according to the detection efficient of the detection efficient of the first detector and the second detector, alternatively, obtaining safe key, phase error code and bit error code according to the detection efficient of the detection efficient of the first detector, the second detector obtains safe key.The processing method of the embodiment of the present invention obtains security key by two different schemes, ideal situation including no bit error rate and there are the actual conditions of error code, so as to better ensure that the safety of quantum key distribution system, improve existing quantum key distribution processing method, improve the usage experience of user.
Description
Technical field
The present invention relates to internet communication technical field, more particularly to a kind of Data Post of quantum key distribution system
Method.
Background technology
In theory, QKD (quantum key distribution, quantum key distribution) is provided based on physical law
Unconditional security.However, in practical applications, the loophole of detector efficiency may be for practical quantum key distribution system
It is fatal because it is practical measure in it is difficult to ensure that two detectors it is identical, cause attacker that may be attacked by time shift
The methods of makes two detectors, and there are apparent efficiency is detuning so that 0 obtained and 1 quantity is different more, so as to therefrom obtain
It wins the confidence breath, destroys the safety of QKD system.
Invention content
One of the technical issues of the present invention is directed to solve at least to a certain extent in above-mentioned the relevant technologies.
For this purpose, it is an object of the invention to propose a kind of data post processing method of quantum key distribution system, the processing
Method can better ensure that the safety of quantum key distribution system, and simple and convenient.
In order to achieve the above objectives, the embodiment of the present invention proposes a kind of Data Post side of quantum key distribution system
Method, the quantum key distribution system include sender and recipient, and the recipient includes the first detector and the second detection
Device, it is described to include the following steps:S1:The first detector and the second detector of the recipient separately detects sender's transmitting
Multiple signals, for detecting the first signal, second detector is used to detect second signal first detector;S2:Root
The detection efficient of first detector is obtained, and according to institute according to the quantity of first signal and the quantity of the multiple signal
It states the quantity of second signal and the quantity of the multiple signal obtains the detection efficient of second detector;S3:According to described
The detection efficient of first detector and the detection efficient of the second detector obtain safe key, alternatively, being visited according to described first
Detection efficient, the detection efficient of the second detector of survey device obtain safe key, phase error code and bit error code and obtain safety
Key.
The data post processing method of the quantum key distribution system proposed according to embodiments of the present invention passes through the first detector
Detection efficient and the detection efficient of the second detector obtain safe key, alternatively, according to the detection efficient of the first detector,
The detection efficient of second detector obtains safe key, phase error code and bit error code and obtains safe key, passes through two kinds
Different schemes obtain security key, ideal situation including no bit error rate and have the actual conditions of error code, so as to solve
The methods of certainly attacker can be attacked by time shift therefrom obtains information this problem, by the information that attacker may grasp into
Row is rejected, and is better ensured that the safety of quantum key distribution system, is improved existing quantum key distribution processing method, is improved
The usage experience of user.
In addition, the data post processing method of quantum key distribution system according to the above embodiment of the present invention can also have
Following additional technical characteristic:
Further, in one embodiment of the invention, it before the S3, further includes:It is high to abandon detection efficient
The part signal that detector detects, so that the quantity one of signal that first detector and second detector detect
It causes.
Further, in one embodiment of the invention, it is described according to the detection efficient of first detector and
The formula that the detection efficient of two detectors obtains safe key is:
Wherein, η0For the detection efficient of first detector, η1Detection efficient for second detector.
Further, in one embodiment of the invention, the detection efficient according to first detector, second
The detection efficient of detector obtains safe key, phase error code and bit error code and obtains the formula of safe key:
Wherein, epFor the phase error code, ebFor the bit error code, H2(x)=- xlog2x-(1-x)log2(1-x), H2
(x) it is the Shannon entropy function of binary.
In addition, in one embodiment of the invention, the detection efficient according to first detector, the second detection
The detection efficient of device obtains safe key, phase error code and bit error code and obtains the formula of safe key:
Wherein, epFor the phase error code, ebFor the bit error code, H2(x)=- xlog2x-(1-x)log2(1-x), H2
(x) it is the Shannon entropy function of binary.
The additional aspect of the present invention and advantage will be set forth in part in the description, and will partly become from the following description
It obtains significantly or is recognized by the practice of the present invention.
Description of the drawings
The above-mentioned and/or additional aspect and advantage of the present invention will become in the description from combination accompanying drawings below to embodiment
Significantly and it is readily appreciated that, wherein:
Fig. 1 is detection efficient and the curve synoptic diagram of time in the relevant technologies;
Fig. 2 is the flow chart according to the data post processing method of the quantum key distribution system of the embodiment of the present invention.
Specific embodiment
The embodiment of the present invention is described below in detail, the example of the embodiment is shown in the drawings, wherein from beginning to end
Same or similar label represents same or similar element or the element with same or like function.Below with reference to attached
The embodiment of figure description is exemplary, it is intended to for explaining the present invention, and is not considered as limiting the invention.
In addition, term " first ", " second " are only used for description purpose, and it is not intended that instruction or hint relative importance
Or the implicit quantity for indicating indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or
Implicitly include one or more this feature.In the description of the present invention, " multiple " are meant that two or more,
Unless otherwise specifically defined.
In the present invention unless specifically defined or limited otherwise, term " installation ", " connected ", " connection ", " fixation " etc.
Term should be interpreted broadly, for example, it may be being fixedly connected or being detachably connected or be integrally connected;It can be machine
Tool is connected or is electrically connected;It can be directly connected, can also be indirectly connected by intermediary, can be two members
Connection inside part.For the ordinary skill in the art, above-mentioned term can be understood in this hair as the case may be
Concrete meaning in bright.
In the present invention unless specifically defined or limited otherwise, fisrt feature second feature it " on " or it " under "
It can be in direct contact including the first and second features, it is not to be in direct contact but pass through it that can also include the first and second features
Between other characterisation contact.Moreover, fisrt feature second feature " on ", " top " and " above " including first spy
Sign is right over second feature and oblique upper or is merely representative of fisrt feature level height higher than second feature.Fisrt feature exists
Second feature " under ", " lower section " and " following " immediately below second feature and obliquely downward or be merely representative of including fisrt feature
Fisrt feature level height is less than second feature.
Before the data post processing method of quantum key distribution system proposed according to embodiments of the present invention in description below,
Quantum key distribution system in the relevant technologies is briefly described first.
QKD (quantum key distribution, quantum key distribution) is two legal use based on quantum mechanics
Family, a sender and a recipient, even if providing one kind can still be total to safely in the presence of having listener-in
The method for enjoying key.After success shared key, two user can to oneself, the information to be transmitted be encrypted with it, from
And realize secure communication.Wherein Bennett-Brassard-1984 (BB84) agreement is most famous, by most popular quantum
Key distribution protocol.BB84 agreements are by the polarization of light, so as to be encoded to photon, with equiprobability random coded in horizontal vertical
The straight positive and negative 45 degree of polarizations (X yls) of polarization (Z yls).Sender randomly generates the number string of a string 0,1 bits, when selection under Z bases into
Row coding, sender are encoded into 0 | and 0 > is encoded into 1 | and 1 >, under X bases, sender is encoded into 01 is encoded intoThen recipient is sent to by quantum channel, received
The information that side is sent out with equiprobability using X bases or the measurement of Z bases from sender, sender and recipient are in certified classics later
Oneself coding is announced in channel and measures the base of selection, spreads the data selected and identical base is selected to be encoded and measured.This
The safety of agreement is based on completely differentiating by measuring between non-orthogonal state.Considering there are in the case of listener-in,
When listener-in obtains the photon that sender sends out, listener-in does not know the base of this photon coding, therefore listener-in can only
The base of sender's coding is guessed, so as to which listener-in only has the base of 50% correct probability surmise sender's coding.Such as
Fruit listener-in conjecture is correct and recipient has also just selected the base identical with sender to measure, and listener-in will obtain this
The key of one.But if he guesses wrong, he measures the polarization that will change light, and at this moment recipient and sender
Identical base is selected to measure, the measurement of listener-in is possible to introduce error code, causes recipient and sender occur to make
It is measured with identical base but obtains the possibility of different keys.After this, sender and recipient can take out one
Key is divided to carry out comparison and estimates the bit error rate.The presence of listener-in can be found according to the error rate to key of two people, into
And estimating key in two human hands, how many stolen hearer knows.If the information that stolen hearer knows is excessive, it is close to abandon these
Otherwise key can ensure that shared key is identical using error correction (Error correction) according to the bit error rate, use
The method (Privacy amplification) of privacy amplification reduces the length of key, so as to which the information for knowing listener-in is clear
It removes.Last sender and recipient have shared one section of safe and identical key, realize the purpose of key distribution.
It is in practical applications, source and measuring apparatus and imperfect however, although QKD is perfectly safe in theory,
The safety of QKD then can be all influenced to a certain extent, wherein the attack for detector is most.Classical BB84's
In QKD agreements, receiving square end needs two independent detectors to measure the quantum state received.However in practical application
In, then it is very difficult to two identical detectors of feature of manufacture.Detuning between two detector efficiencies can be carried to listener-in
Chance is supplied.Pretend state attack (faked states attack), time shift attack (time-shift attack) can needle
Inefficient between detector is attacked, so as to affect the safety of QKD.Such as in time shift attack, normal condition
The arrival time of new number should be 0 time identified in figure down.However, with reference to shown in Fig. 1, if listener-in has carried out time shift
Attack, that is, the arrival time of signal is moved to t-Or t+At the moment, detecting 0 will be different with the efficiency for detecting 1, surreptitiously
Hearer can therefrom obtain the information of key.Consider an extreme case, such as detect the detector efficiency of 0 bit than visiting
The detector efficiency for measuring 1 bit is much higher, and listener-in has once known this information, as long as then conjecture just has very the result is that 0
Big probability guesses the key that sender and recipient share right.
In addition, it measures with device-independent quantum key distribution agreement (MDIQKD) although can be very good to remove detector
Any loophole at end, but since it is more increasingly complex in realization than traditional BB84, it is lower into code check, it is extensive there are no obtaining
Practical application.
The present invention is based on the above problem, and proposes a kind of data post processing method of quantum key distribution system.
The Data Post side of quantum key distribution system proposed according to embodiments of the present invention is described with reference to the accompanying drawings
Method.With reference to shown in Fig. 1, which includes the following steps:
S1:The first detector and the second detector of recipient separately detects multiple signals of sender's transmitting, and first visits
Device is surveyed for detecting the first signal, the second detector is used to detect second signal.
S2:The detection efficient of first detector is obtained according to the quantity of the quantity of the first signal and multiple signals, and according to
The quantity of second signal and the quantity of multiple signals obtain the detection efficient of the second detector.
S3:Safe key is obtained according to the detection efficient of the detection efficient of the first detector and the second detector, alternatively,
Safe key, phase error code and bit are obtained according to the detection efficient of the detection efficient of the first detector, the second detector to miss
Code obtains safe key.
The embodiment of the present invention is the scheme resisted for the detuning attack of detector efficiency.Because detector efficiency is detuning,
It needs to carry out additional operation in QKD last handling processes, so as to weed out the information that listener-in may learn that.
Specifically, in one embodiment of the invention, according to the detection efficient of the first detector and the second detector
The formula that detection efficient obtains safe key is:
Wherein, η0For the detection efficient of the first detector, η1Detection efficient for the second detector.
Further, in one embodiment of the invention, according to the detection efficient of the first detector, second detector
Detection efficient obtains safe key, phase error code and bit error code and obtains the formula of safe key:
Wherein, epFor phase error code, ebFor bit error code, H2(x)=- xlog2x-(1-x)log2(1-x), H2(x) it is two
The Shannon entropy function of member.
Further, in one embodiment of the invention, it before S3, further includes:Abandon the high detection of detection efficient
The part signal that device detects, so that the quantity of signal that the first detector and the second detector detect is consistent.
In addition, in one embodiment of the invention, according to the detection efficient of the first detector, the detection of the second detector
Efficiency obtains safe key, phase error code and bit error code and obtains the formula of safe key:
Wherein, epFor phase error code, ebFor bit error code, H2(x)=- xlog2x-(1-x)log2(1-x), H2(x) it is two
The Shannon entropy function of member.
Specifically, it is assumed that a QKD system, two detector efficiencies for receiving square end are constant, but different.Main processing
Scheme has following two:
First, there are the schemes (it is assumed that detector efficiency is scalar) that data abandon.
It is assumed that sending square end transmits 2N signal (having identical number of bits 0 and bit 1), receive what square end detected
The number of 0 bit and 1 bit is respectively M0,M1.It is possible thereby to the efficiency for estimating to receive 0,1 detector of square end is respectively M0/N,
M1/, if they are η0, η1.η might as well be set0<η1, that is, detect 0 quantity it is smaller than the quantity for detecting 1.At this moment by redundance
The data for detecting 1 bit are got rid of, the 0 of identical quantity under preservation, the detection of 1 bit leaves η0N, η0The 0 of N number, 1 ratio
It is special.In the absence of noise, listener-in does not introduce bit error code (bit error) and phase error code (phase
Error), the ratio of the key of safety finally obtained has:
It is right by as the post-processing approach of traditional QKD agreements in the case of may introducing noise in view of listener-in
Remaining data carry out error correction (Error correction) and secrecy amplification (Privacy amplification), last
It can be such as following formula into code check:
Wherein epIt is phase error code, ebIt is bit error code, H2(x)=- xlog2x-(1-x)log2(1-x) is the Shannon of binary
Entropy function.
2nd, there is no the schemes that data abandon (detector efficiency can be vector, and scalar is all suitable for).
It is identical with the above method, first calculate the efficiency eta of two detectors0, η1.Receive the detector efficiency of square end not
Unanimously, the randomness of the measurement result for the state that sender sends out is reduced, in order to remove the information that listener-in may know that, in original
It needs to carry out additional secrecy amplification on the basis of some secrecy amplifications rather than directly removes a part of data.
Wherein, it is contemplated that in the case that listener-in may introduce noise, it is last can be such as following formula into code check:
Wherein, epFor phase error code, ebFor bit error code, H2(x)=- xlog2x-(1-x)log2(1-x) is the perfume (or spice) of binary
Agriculture entropy function.Although this processing scheme is less than the first processing scheme into code check, its range on probation is more extensive,
In the case of can be applied to detector efficiency and being vector.
In practical quantum key distribution (QKD) application, it is possible that the 0 and 1 different more situation of quantity, because
On the basis of original quantum key distribution device, the embodiment of the present invention takes into account the detuning situation of detector efficiency for this
It goes, it is proposed that two kinds of processing schemes, so as to improve original quantum key distribution post-processing approach.
It should be understood that the setting of step S1 and step S3 is suitable only for the convenience of description rather than the execution of method for limiting
Sequence.
The data post processing method of the quantum key distribution system proposed according to embodiments of the present invention passes through the first detector
Detection efficient and the detection efficient of the second detector obtain safe key, alternatively, according to the detection efficient of the first detector,
The detection efficient of second detector obtains safe key, phase error code and bit error code and obtains safe key, passes through two kinds
Different schemes obtain security key, ideal situation including no bit error rate and have the actual conditions of error code, so as to solve
The methods of certainly attacker can be attacked by time shift therefrom obtains information this problem, by the information that attacker may grasp into
Row is rejected, and is better ensured that the safety of quantum key distribution system, is improved existing quantum key distribution processing method, is improved
The usage experience of user has preferably commercial application prospect.
Any process described otherwise above or method description are construed as in flow chart or herein, represent to include
Module, segment or the portion of the code of the executable instruction of one or more the step of being used to implement specific logical function or process
Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discuss suitable
Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, to perform function, this should be of the invention
Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use
In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for
Instruction execution system, device or equipment (such as computer based system, including the system of processor or other can be held from instruction
The system of row system, device or equipment instruction fetch and execute instruction) it uses or combines these instruction execution systems, device or set
It is standby and use.For the purpose of this specification, " computer-readable medium " can any can be included, store, communicate, propagate or pass
Defeated program is for instruction execution system, device or equipment or the dress used with reference to these instruction execution systems, device or equipment
It puts.The more specific example (non-exhaustive list) of computer-readable medium is including following:Electricity with one or more wiring
Connecting portion (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory
(ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits
Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable
Medium, because can be for example by carrying out optical scanner to paper or other media, then into edlin, interpretation or when necessary with it
His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the present invention can be realized with hardware, software, firmware or combination thereof.Above-mentioned
In embodiment, software that multiple steps or method can in memory and by suitable instruction execution system be performed with storage
Or firmware is realized.If for example, with hardware come realize in another embodiment, can be under well known in the art
Any one of row technology or their combination are realized:With for the logic gates to data-signal realization logic function
Discrete logic, have suitable combinational logic gate circuit application-specific integrated circuit, programmable gate array (PGA), scene
Programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that realize all or part of step that above-described embodiment method carries
Suddenly it is that relevant hardware can be instructed to complete by program, the program can be stored in a kind of computer-readable storage medium
In matter, the program when being executed, one or a combination set of the step of including embodiment of the method.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, it can also
That each unit is individually physically present, can also two or more units be integrated in a module.Above-mentioned integrated mould
The form that hardware had both may be used in block is realized, can also be realized in the form of software function module.The integrated module is such as
Fruit is realized in the form of software function module and is independent product sale or in use, can also be stored in a computer
In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " example ", " is specifically shown " some embodiments "
The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description
Point is contained at least one embodiment of the present invention or example.In the present specification, schematic expression of the above terms are not
Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any
One or more embodiments or example in combine in an appropriate manner.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example
Property, it is impossible to limitation of the present invention is interpreted as, those of ordinary skill in the art are not departing from the principle of the present invention and objective
In the case of can make changes, modifications, substitutions and variations to the above described embodiments within the scope of the invention.
Claims (1)
- A kind of 1. data post processing method of quantum key distribution system, which is characterized in that the quantum key distribution system packet Sender and recipient are included, the recipient includes the first detector and the second detector, described to include the following steps:S1:The first detector and the second detector of the recipient separately detects multiple signals of sender's transmitting, and described the For detecting the first signal, second detector is used to detect second signal one detector;S2:The detection that first detector is obtained according to the quantity of the quantity of first signal and the multiple signal is imitated Rate, and the detection efficient of second detector is obtained according to the quantity of the second signal and the quantity of the multiple signal;S3:When the quantity of signal that first detector and second detector detect is inconsistent, detection effect is abandoned The part signal that the high detector of rate detects, so that the signal that first detector and second detector detect Quantity is consistent, and safe key is obtained according to the detection efficient of the detection efficient of first detector and the second detector, In, it is described that the formula of safe key is obtained according to the detection efficient of first detector and the detection efficient of the second detector For:Wherein, η0For the detection efficient of first detector, η1Detection efficient for second detector;And/or safe key, phase are obtained according to the detection efficient of first detector, the detection efficient of the second detector Error code and bit error code obtain safe key, wherein, the detection efficient according to first detector, the second detector Detection efficient obtain safe key, phase error code and bit error code and obtain the formula of safe key be:Wherein, epFor the phase error code, ebFor the bit error code, H2(x)=- xlog2x-(1-x)log2(1-x), H2(x) Shannon entropy function for binary.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510500542.XA CN105049200B (en) | 2015-08-14 | 2015-08-14 | The data post processing method of quantum key distribution system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510500542.XA CN105049200B (en) | 2015-08-14 | 2015-08-14 | The data post processing method of quantum key distribution system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105049200A CN105049200A (en) | 2015-11-11 |
CN105049200B true CN105049200B (en) | 2018-06-19 |
Family
ID=54455423
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510500542.XA Active CN105049200B (en) | 2015-08-14 | 2015-08-14 | The data post processing method of quantum key distribution system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105049200B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105959113B (en) * | 2016-07-06 | 2018-11-30 | 洛阳师范学院 | For preventing the quantum key distribution method of detector side channel attack |
CN110830108B (en) * | 2019-10-31 | 2021-03-19 | 中国人民解放军国防科技大学 | Anti-attack detection method and device for laser transmitter of quantum secret communication system |
CN112929080B (en) * | 2019-12-06 | 2022-08-23 | 北京中创为南京量子通信技术有限公司 | Calculation method for coding error rate of quantum key generation system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102075324A (en) * | 2011-01-06 | 2011-05-25 | 安徽量子通信技术有限公司 | Quantum code teaching system and communication method thereof |
CN102739395A (en) * | 2012-07-04 | 2012-10-17 | 华南师范大学 | Quantum key distribution system for resisting blinding attack |
CN103490879A (en) * | 2013-09-27 | 2014-01-01 | 中国科学技术大学 | Self-correcting quantum secret key distribution method and system |
CN104506309A (en) * | 2014-12-26 | 2015-04-08 | 华南师范大学 | Quantum key distribution method and system based on orbital angular momentum encoding |
CN104579638A (en) * | 2014-09-30 | 2015-04-29 | 清华大学 | Decoy-state quantum key distribution system based on discrete random phase |
-
2015
- 2015-08-14 CN CN201510500542.XA patent/CN105049200B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102075324A (en) * | 2011-01-06 | 2011-05-25 | 安徽量子通信技术有限公司 | Quantum code teaching system and communication method thereof |
CN102739395A (en) * | 2012-07-04 | 2012-10-17 | 华南师范大学 | Quantum key distribution system for resisting blinding attack |
CN103490879A (en) * | 2013-09-27 | 2014-01-01 | 中国科学技术大学 | Self-correcting quantum secret key distribution method and system |
CN104579638A (en) * | 2014-09-30 | 2015-04-29 | 清华大学 | Decoy-state quantum key distribution system based on discrete random phase |
CN104506309A (en) * | 2014-12-26 | 2015-04-08 | 华南师范大学 | Quantum key distribution method and system based on orbital angular momentum encoding |
Non-Patent Citations (2)
Title |
---|
非对称信道传输效率的测量设备无关量子密钥分配研究;东晨等;《物理学报》;20140208;第63卷(第3期);第2-6页 * |
预报单光子源诱骗态量子密钥产生率及数值计算;权东晓;《计算物理》;20090125;第26卷(第1期);第2-7页 * |
Also Published As
Publication number | Publication date |
---|---|
CN105049200A (en) | 2015-11-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Juels et al. | Honey encryption: Security beyond the brute-force bound | |
Gisin et al. | Towards practical and fast quantum cryptography | |
JP2016131335A (en) | Information processing method, information processing program and information processing device | |
CN105049200B (en) | The data post processing method of quantum key distribution system | |
WO2014028617A8 (en) | Near field communication based key sharing techniques | |
US11693944B2 (en) | Visual image authentication | |
CN102170350A (en) | Multiple uncertainty encryption system with misleading function | |
US11128453B2 (en) | Visual image authentication | |
CN106603232B (en) | Nearest privacy query method based on careless quantum key distribution | |
CN109661792A (en) | Calculate the device and method of block cipher | |
CN106034122A (en) | Information processing method, electronic equipment and server | |
Hong-Yang et al. | Quantum private query based on stable error correcting code in the case of noise | |
CN105959113B (en) | For preventing the quantum key distribution method of detector side channel attack | |
Sharma et al. | Big data protection via neural and quantum cryptography | |
CN109412791A (en) | Key information processing method, device, electronic equipment and computer-readable medium | |
Huang et al. | Man-in-the-middle attack on BB84 protocol and its defence | |
CN104579673B (en) | Interactive authentication method between RFID card and card reader | |
CN107070643A (en) | A kind of quantum key distribution device and method | |
CN206341226U (en) | A kind of quantum key distribution device | |
RU2346397C1 (en) | Method of protecting personal biometrical identification and authentification data | |
Singamaneni et al. | Efficient quantum cryptography technique for key distribution | |
Patil et al. | An embedding of secret message in audio signal | |
Wang et al. | Phoney: Protecting password hashes with threshold cryptology and honeywords | |
Sobota et al. | Application of quantum cryptography protocols in authentication process | |
Meraoumia et al. | Biometric cryptosystem to secure smart object communications in the internet of things |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |