CN105049200B - The data post processing method of quantum key distribution system - Google Patents

The data post processing method of quantum key distribution system Download PDF

Info

Publication number
CN105049200B
CN105049200B CN201510500542.XA CN201510500542A CN105049200B CN 105049200 B CN105049200 B CN 105049200B CN 201510500542 A CN201510500542 A CN 201510500542A CN 105049200 B CN105049200 B CN 105049200B
Authority
CN
China
Prior art keywords
detector
detection efficient
error code
signal
key distribution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510500542.XA
Other languages
Chinese (zh)
Other versions
CN105049200A (en
Inventor
马雄峰
赵琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tsinghua University
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Priority to CN201510500542.XA priority Critical patent/CN105049200B/en
Publication of CN105049200A publication Critical patent/CN105049200A/en
Application granted granted Critical
Publication of CN105049200B publication Critical patent/CN105049200B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Optical Communication System (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a kind of data post processing methods of quantum key distribution system, include the following steps:Separately detect multiple signals of sender's transmitting;The detection efficient of the first detector and the detection efficient of the second detector are obtained according to the quantity of the quantity of signal and multiple signals;Safe key is obtained according to the detection efficient of the detection efficient of the first detector and the second detector, alternatively, obtaining safe key, phase error code and bit error code according to the detection efficient of the detection efficient of the first detector, the second detector obtains safe key.The processing method of the embodiment of the present invention obtains security key by two different schemes, ideal situation including no bit error rate and there are the actual conditions of error code, so as to better ensure that the safety of quantum key distribution system, improve existing quantum key distribution processing method, improve the usage experience of user.

Description

The data post processing method of quantum key distribution system
Technical field
The present invention relates to internet communication technical field, more particularly to a kind of Data Post of quantum key distribution system Method.
Background technology
In theory, QKD (quantum key distribution, quantum key distribution) is provided based on physical law Unconditional security.However, in practical applications, the loophole of detector efficiency may be for practical quantum key distribution system It is fatal because it is practical measure in it is difficult to ensure that two detectors it is identical, cause attacker that may be attacked by time shift The methods of makes two detectors, and there are apparent efficiency is detuning so that 0 obtained and 1 quantity is different more, so as to therefrom obtain It wins the confidence breath, destroys the safety of QKD system.
Invention content
One of the technical issues of the present invention is directed to solve at least to a certain extent in above-mentioned the relevant technologies.
For this purpose, it is an object of the invention to propose a kind of data post processing method of quantum key distribution system, the processing Method can better ensure that the safety of quantum key distribution system, and simple and convenient.
In order to achieve the above objectives, the embodiment of the present invention proposes a kind of Data Post side of quantum key distribution system Method, the quantum key distribution system include sender and recipient, and the recipient includes the first detector and the second detection Device, it is described to include the following steps:S1:The first detector and the second detector of the recipient separately detects sender's transmitting Multiple signals, for detecting the first signal, second detector is used to detect second signal first detector;S2:Root The detection efficient of first detector is obtained, and according to institute according to the quantity of first signal and the quantity of the multiple signal It states the quantity of second signal and the quantity of the multiple signal obtains the detection efficient of second detector;S3:According to described The detection efficient of first detector and the detection efficient of the second detector obtain safe key, alternatively, being visited according to described first Detection efficient, the detection efficient of the second detector of survey device obtain safe key, phase error code and bit error code and obtain safety Key.
The data post processing method of the quantum key distribution system proposed according to embodiments of the present invention passes through the first detector Detection efficient and the detection efficient of the second detector obtain safe key, alternatively, according to the detection efficient of the first detector, The detection efficient of second detector obtains safe key, phase error code and bit error code and obtains safe key, passes through two kinds Different schemes obtain security key, ideal situation including no bit error rate and have the actual conditions of error code, so as to solve The methods of certainly attacker can be attacked by time shift therefrom obtains information this problem, by the information that attacker may grasp into Row is rejected, and is better ensured that the safety of quantum key distribution system, is improved existing quantum key distribution processing method, is improved The usage experience of user.
In addition, the data post processing method of quantum key distribution system according to the above embodiment of the present invention can also have Following additional technical characteristic:
Further, in one embodiment of the invention, it before the S3, further includes:It is high to abandon detection efficient The part signal that detector detects, so that the quantity one of signal that first detector and second detector detect It causes.
Further, in one embodiment of the invention, it is described according to the detection efficient of first detector and The formula that the detection efficient of two detectors obtains safe key is:
Wherein, η0For the detection efficient of first detector, η1Detection efficient for second detector.
Further, in one embodiment of the invention, the detection efficient according to first detector, second The detection efficient of detector obtains safe key, phase error code and bit error code and obtains the formula of safe key:
Wherein, epFor the phase error code, ebFor the bit error code, H2(x)=- xlog2x-(1-x)log2(1-x), H2 (x) it is the Shannon entropy function of binary.
In addition, in one embodiment of the invention, the detection efficient according to first detector, the second detection The detection efficient of device obtains safe key, phase error code and bit error code and obtains the formula of safe key:
Wherein, epFor the phase error code, ebFor the bit error code, H2(x)=- xlog2x-(1-x)log2(1-x), H2 (x) it is the Shannon entropy function of binary.
The additional aspect of the present invention and advantage will be set forth in part in the description, and will partly become from the following description It obtains significantly or is recognized by the practice of the present invention.
Description of the drawings
The above-mentioned and/or additional aspect and advantage of the present invention will become in the description from combination accompanying drawings below to embodiment Significantly and it is readily appreciated that, wherein:
Fig. 1 is detection efficient and the curve synoptic diagram of time in the relevant technologies;
Fig. 2 is the flow chart according to the data post processing method of the quantum key distribution system of the embodiment of the present invention.
Specific embodiment
The embodiment of the present invention is described below in detail, the example of the embodiment is shown in the drawings, wherein from beginning to end Same or similar label represents same or similar element or the element with same or like function.Below with reference to attached The embodiment of figure description is exemplary, it is intended to for explaining the present invention, and is not considered as limiting the invention.
In addition, term " first ", " second " are only used for description purpose, and it is not intended that instruction or hint relative importance Or the implicit quantity for indicating indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or Implicitly include one or more this feature.In the description of the present invention, " multiple " are meant that two or more, Unless otherwise specifically defined.
In the present invention unless specifically defined or limited otherwise, term " installation ", " connected ", " connection ", " fixation " etc. Term should be interpreted broadly, for example, it may be being fixedly connected or being detachably connected or be integrally connected;It can be machine Tool is connected or is electrically connected;It can be directly connected, can also be indirectly connected by intermediary, can be two members Connection inside part.For the ordinary skill in the art, above-mentioned term can be understood in this hair as the case may be Concrete meaning in bright.
In the present invention unless specifically defined or limited otherwise, fisrt feature second feature it " on " or it " under " It can be in direct contact including the first and second features, it is not to be in direct contact but pass through it that can also include the first and second features Between other characterisation contact.Moreover, fisrt feature second feature " on ", " top " and " above " including first spy Sign is right over second feature and oblique upper or is merely representative of fisrt feature level height higher than second feature.Fisrt feature exists Second feature " under ", " lower section " and " following " immediately below second feature and obliquely downward or be merely representative of including fisrt feature Fisrt feature level height is less than second feature.
Before the data post processing method of quantum key distribution system proposed according to embodiments of the present invention in description below, Quantum key distribution system in the relevant technologies is briefly described first.
QKD (quantum key distribution, quantum key distribution) is two legal use based on quantum mechanics Family, a sender and a recipient, even if providing one kind can still be total to safely in the presence of having listener-in The method for enjoying key.After success shared key, two user can to oneself, the information to be transmitted be encrypted with it, from And realize secure communication.Wherein Bennett-Brassard-1984 (BB84) agreement is most famous, by most popular quantum Key distribution protocol.BB84 agreements are by the polarization of light, so as to be encoded to photon, with equiprobability random coded in horizontal vertical The straight positive and negative 45 degree of polarizations (X yls) of polarization (Z yls).Sender randomly generates the number string of a string 0,1 bits, when selection under Z bases into Row coding, sender are encoded into 0 | and 0 > is encoded into 1 | and 1 >, under X bases, sender is encoded into 01 is encoded intoThen recipient is sent to by quantum channel, received The information that side is sent out with equiprobability using X bases or the measurement of Z bases from sender, sender and recipient are in certified classics later Oneself coding is announced in channel and measures the base of selection, spreads the data selected and identical base is selected to be encoded and measured.This The safety of agreement is based on completely differentiating by measuring between non-orthogonal state.Considering there are in the case of listener-in, When listener-in obtains the photon that sender sends out, listener-in does not know the base of this photon coding, therefore listener-in can only The base of sender's coding is guessed, so as to which listener-in only has the base of 50% correct probability surmise sender's coding.Such as Fruit listener-in conjecture is correct and recipient has also just selected the base identical with sender to measure, and listener-in will obtain this The key of one.But if he guesses wrong, he measures the polarization that will change light, and at this moment recipient and sender Identical base is selected to measure, the measurement of listener-in is possible to introduce error code, causes recipient and sender occur to make It is measured with identical base but obtains the possibility of different keys.After this, sender and recipient can take out one Key is divided to carry out comparison and estimates the bit error rate.The presence of listener-in can be found according to the error rate to key of two people, into And estimating key in two human hands, how many stolen hearer knows.If the information that stolen hearer knows is excessive, it is close to abandon these Otherwise key can ensure that shared key is identical using error correction (Error correction) according to the bit error rate, use The method (Privacy amplification) of privacy amplification reduces the length of key, so as to which the information for knowing listener-in is clear It removes.Last sender and recipient have shared one section of safe and identical key, realize the purpose of key distribution.
It is in practical applications, source and measuring apparatus and imperfect however, although QKD is perfectly safe in theory, The safety of QKD then can be all influenced to a certain extent, wherein the attack for detector is most.Classical BB84's In QKD agreements, receiving square end needs two independent detectors to measure the quantum state received.However in practical application In, then it is very difficult to two identical detectors of feature of manufacture.Detuning between two detector efficiencies can be carried to listener-in Chance is supplied.Pretend state attack (faked states attack), time shift attack (time-shift attack) can needle Inefficient between detector is attacked, so as to affect the safety of QKD.Such as in time shift attack, normal condition The arrival time of new number should be 0 time identified in figure down.However, with reference to shown in Fig. 1, if listener-in has carried out time shift Attack, that is, the arrival time of signal is moved to t-Or t+At the moment, detecting 0 will be different with the efficiency for detecting 1, surreptitiously Hearer can therefrom obtain the information of key.Consider an extreme case, such as detect the detector efficiency of 0 bit than visiting The detector efficiency for measuring 1 bit is much higher, and listener-in has once known this information, as long as then conjecture just has very the result is that 0 Big probability guesses the key that sender and recipient share right.
In addition, it measures with device-independent quantum key distribution agreement (MDIQKD) although can be very good to remove detector Any loophole at end, but since it is more increasingly complex in realization than traditional BB84, it is lower into code check, it is extensive there are no obtaining Practical application.
The present invention is based on the above problem, and proposes a kind of data post processing method of quantum key distribution system.
The Data Post side of quantum key distribution system proposed according to embodiments of the present invention is described with reference to the accompanying drawings Method.With reference to shown in Fig. 1, which includes the following steps:
S1:The first detector and the second detector of recipient separately detects multiple signals of sender's transmitting, and first visits Device is surveyed for detecting the first signal, the second detector is used to detect second signal.
S2:The detection efficient of first detector is obtained according to the quantity of the quantity of the first signal and multiple signals, and according to The quantity of second signal and the quantity of multiple signals obtain the detection efficient of the second detector.
S3:Safe key is obtained according to the detection efficient of the detection efficient of the first detector and the second detector, alternatively, Safe key, phase error code and bit are obtained according to the detection efficient of the detection efficient of the first detector, the second detector to miss Code obtains safe key.
The embodiment of the present invention is the scheme resisted for the detuning attack of detector efficiency.Because detector efficiency is detuning, It needs to carry out additional operation in QKD last handling processes, so as to weed out the information that listener-in may learn that.
Specifically, in one embodiment of the invention, according to the detection efficient of the first detector and the second detector The formula that detection efficient obtains safe key is:
Wherein, η0For the detection efficient of the first detector, η1Detection efficient for the second detector.
Further, in one embodiment of the invention, according to the detection efficient of the first detector, second detector Detection efficient obtains safe key, phase error code and bit error code and obtains the formula of safe key:
Wherein, epFor phase error code, ebFor bit error code, H2(x)=- xlog2x-(1-x)log2(1-x), H2(x) it is two The Shannon entropy function of member.
Further, in one embodiment of the invention, it before S3, further includes:Abandon the high detection of detection efficient The part signal that device detects, so that the quantity of signal that the first detector and the second detector detect is consistent.
In addition, in one embodiment of the invention, according to the detection efficient of the first detector, the detection of the second detector Efficiency obtains safe key, phase error code and bit error code and obtains the formula of safe key:
Wherein, epFor phase error code, ebFor bit error code, H2(x)=- xlog2x-(1-x)log2(1-x), H2(x) it is two The Shannon entropy function of member.
Specifically, it is assumed that a QKD system, two detector efficiencies for receiving square end are constant, but different.Main processing Scheme has following two:
First, there are the schemes (it is assumed that detector efficiency is scalar) that data abandon.
It is assumed that sending square end transmits 2N signal (having identical number of bits 0 and bit 1), receive what square end detected The number of 0 bit and 1 bit is respectively M0,M1.It is possible thereby to the efficiency for estimating to receive 0,1 detector of square end is respectively M0/N, M1/, if they are η0, η1.η might as well be set01, that is, detect 0 quantity it is smaller than the quantity for detecting 1.At this moment by redundance The data for detecting 1 bit are got rid of, the 0 of identical quantity under preservation, the detection of 1 bit leaves η0N, η0The 0 of N number, 1 ratio It is special.In the absence of noise, listener-in does not introduce bit error code (bit error) and phase error code (phase Error), the ratio of the key of safety finally obtained has:
It is right by as the post-processing approach of traditional QKD agreements in the case of may introducing noise in view of listener-in Remaining data carry out error correction (Error correction) and secrecy amplification (Privacy amplification), last It can be such as following formula into code check:
Wherein epIt is phase error code, ebIt is bit error code, H2(x)=- xlog2x-(1-x)log2(1-x) is the Shannon of binary Entropy function.
2nd, there is no the schemes that data abandon (detector efficiency can be vector, and scalar is all suitable for).
It is identical with the above method, first calculate the efficiency eta of two detectors0, η1.Receive the detector efficiency of square end not Unanimously, the randomness of the measurement result for the state that sender sends out is reduced, in order to remove the information that listener-in may know that, in original It needs to carry out additional secrecy amplification on the basis of some secrecy amplifications rather than directly removes a part of data.
Wherein, it is contemplated that in the case that listener-in may introduce noise, it is last can be such as following formula into code check:
Wherein, epFor phase error code, ebFor bit error code, H2(x)=- xlog2x-(1-x)log2(1-x) is the perfume (or spice) of binary Agriculture entropy function.Although this processing scheme is less than the first processing scheme into code check, its range on probation is more extensive, In the case of can be applied to detector efficiency and being vector.
In practical quantum key distribution (QKD) application, it is possible that the 0 and 1 different more situation of quantity, because On the basis of original quantum key distribution device, the embodiment of the present invention takes into account the detuning situation of detector efficiency for this It goes, it is proposed that two kinds of processing schemes, so as to improve original quantum key distribution post-processing approach.
It should be understood that the setting of step S1 and step S3 is suitable only for the convenience of description rather than the execution of method for limiting Sequence.
The data post processing method of the quantum key distribution system proposed according to embodiments of the present invention passes through the first detector Detection efficient and the detection efficient of the second detector obtain safe key, alternatively, according to the detection efficient of the first detector, The detection efficient of second detector obtains safe key, phase error code and bit error code and obtains safe key, passes through two kinds Different schemes obtain security key, ideal situation including no bit error rate and have the actual conditions of error code, so as to solve The methods of certainly attacker can be attacked by time shift therefrom obtains information this problem, by the information that attacker may grasp into Row is rejected, and is better ensured that the safety of quantum key distribution system, is improved existing quantum key distribution processing method, is improved The usage experience of user has preferably commercial application prospect.
Any process described otherwise above or method description are construed as in flow chart or herein, represent to include Module, segment or the portion of the code of the executable instruction of one or more the step of being used to implement specific logical function or process Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discuss suitable Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, to perform function, this should be of the invention Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for Instruction execution system, device or equipment (such as computer based system, including the system of processor or other can be held from instruction The system of row system, device or equipment instruction fetch and execute instruction) it uses or combines these instruction execution systems, device or set It is standby and use.For the purpose of this specification, " computer-readable medium " can any can be included, store, communicate, propagate or pass Defeated program is for instruction execution system, device or equipment or the dress used with reference to these instruction execution systems, device or equipment It puts.The more specific example (non-exhaustive list) of computer-readable medium is including following:Electricity with one or more wiring Connecting portion (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory (ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable Medium, because can be for example by carrying out optical scanner to paper or other media, then into edlin, interpretation or when necessary with it His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the present invention can be realized with hardware, software, firmware or combination thereof.Above-mentioned In embodiment, software that multiple steps or method can in memory and by suitable instruction execution system be performed with storage Or firmware is realized.If for example, with hardware come realize in another embodiment, can be under well known in the art Any one of row technology or their combination are realized:With for the logic gates to data-signal realization logic function Discrete logic, have suitable combinational logic gate circuit application-specific integrated circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that realize all or part of step that above-described embodiment method carries Suddenly it is that relevant hardware can be instructed to complete by program, the program can be stored in a kind of computer-readable storage medium In matter, the program when being executed, one or a combination set of the step of including embodiment of the method.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, it can also That each unit is individually physically present, can also two or more units be integrated in a module.Above-mentioned integrated mould The form that hardware had both may be used in block is realized, can also be realized in the form of software function module.The integrated module is such as Fruit is realized in the form of software function module and is independent product sale or in use, can also be stored in a computer In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " example ", " is specifically shown " some embodiments " The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description Point is contained at least one embodiment of the present invention or example.In the present specification, schematic expression of the above terms are not Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any One or more embodiments or example in combine in an appropriate manner.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example Property, it is impossible to limitation of the present invention is interpreted as, those of ordinary skill in the art are not departing from the principle of the present invention and objective In the case of can make changes, modifications, substitutions and variations to the above described embodiments within the scope of the invention.

Claims (1)

  1. A kind of 1. data post processing method of quantum key distribution system, which is characterized in that the quantum key distribution system packet Sender and recipient are included, the recipient includes the first detector and the second detector, described to include the following steps:
    S1:The first detector and the second detector of the recipient separately detects multiple signals of sender's transmitting, and described the For detecting the first signal, second detector is used to detect second signal one detector;
    S2:The detection that first detector is obtained according to the quantity of the quantity of first signal and the multiple signal is imitated Rate, and the detection efficient of second detector is obtained according to the quantity of the second signal and the quantity of the multiple signal;
    S3:When the quantity of signal that first detector and second detector detect is inconsistent, detection effect is abandoned The part signal that the high detector of rate detects, so that the signal that first detector and second detector detect Quantity is consistent, and safe key is obtained according to the detection efficient of the detection efficient of first detector and the second detector, In, it is described that the formula of safe key is obtained according to the detection efficient of first detector and the detection efficient of the second detector For:
    Wherein, η0For the detection efficient of first detector, η1Detection efficient for second detector;
    And/or safe key, phase are obtained according to the detection efficient of first detector, the detection efficient of the second detector Error code and bit error code obtain safe key, wherein, the detection efficient according to first detector, the second detector Detection efficient obtain safe key, phase error code and bit error code and obtain the formula of safe key be:
    Wherein, epFor the phase error code, ebFor the bit error code, H2(x)=- xlog2x-(1-x)log2(1-x), H2(x) Shannon entropy function for binary.
CN201510500542.XA 2015-08-14 2015-08-14 The data post processing method of quantum key distribution system Active CN105049200B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510500542.XA CN105049200B (en) 2015-08-14 2015-08-14 The data post processing method of quantum key distribution system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510500542.XA CN105049200B (en) 2015-08-14 2015-08-14 The data post processing method of quantum key distribution system

Publications (2)

Publication Number Publication Date
CN105049200A CN105049200A (en) 2015-11-11
CN105049200B true CN105049200B (en) 2018-06-19

Family

ID=54455423

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510500542.XA Active CN105049200B (en) 2015-08-14 2015-08-14 The data post processing method of quantum key distribution system

Country Status (1)

Country Link
CN (1) CN105049200B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105959113B (en) * 2016-07-06 2018-11-30 洛阳师范学院 For preventing the quantum key distribution method of detector side channel attack
CN110830108B (en) * 2019-10-31 2021-03-19 中国人民解放军国防科技大学 Anti-attack detection method and device for laser transmitter of quantum secret communication system
CN112929080B (en) * 2019-12-06 2022-08-23 北京中创为南京量子通信技术有限公司 Calculation method for coding error rate of quantum key generation system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102075324A (en) * 2011-01-06 2011-05-25 安徽量子通信技术有限公司 Quantum code teaching system and communication method thereof
CN102739395A (en) * 2012-07-04 2012-10-17 华南师范大学 Quantum key distribution system for resisting blinding attack
CN103490879A (en) * 2013-09-27 2014-01-01 中国科学技术大学 Self-correcting quantum secret key distribution method and system
CN104506309A (en) * 2014-12-26 2015-04-08 华南师范大学 Quantum key distribution method and system based on orbital angular momentum encoding
CN104579638A (en) * 2014-09-30 2015-04-29 清华大学 Decoy-state quantum key distribution system based on discrete random phase

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102075324A (en) * 2011-01-06 2011-05-25 安徽量子通信技术有限公司 Quantum code teaching system and communication method thereof
CN102739395A (en) * 2012-07-04 2012-10-17 华南师范大学 Quantum key distribution system for resisting blinding attack
CN103490879A (en) * 2013-09-27 2014-01-01 中国科学技术大学 Self-correcting quantum secret key distribution method and system
CN104579638A (en) * 2014-09-30 2015-04-29 清华大学 Decoy-state quantum key distribution system based on discrete random phase
CN104506309A (en) * 2014-12-26 2015-04-08 华南师范大学 Quantum key distribution method and system based on orbital angular momentum encoding

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
非对称信道传输效率的测量设备无关量子密钥分配研究;东晨等;《物理学报》;20140208;第63卷(第3期);第2-6页 *
预报单光子源诱骗态量子密钥产生率及数值计算;权东晓;《计算物理》;20090125;第26卷(第1期);第2-7页 *

Also Published As

Publication number Publication date
CN105049200A (en) 2015-11-11

Similar Documents

Publication Publication Date Title
Juels et al. Honey encryption: Security beyond the brute-force bound
Gisin et al. Towards practical and fast quantum cryptography
JP2016131335A (en) Information processing method, information processing program and information processing device
CN105049200B (en) The data post processing method of quantum key distribution system
WO2014028617A8 (en) Near field communication based key sharing techniques
US11693944B2 (en) Visual image authentication
CN102170350A (en) Multiple uncertainty encryption system with misleading function
US11128453B2 (en) Visual image authentication
CN106603232B (en) Nearest privacy query method based on careless quantum key distribution
CN109661792A (en) Calculate the device and method of block cipher
CN106034122A (en) Information processing method, electronic equipment and server
Hong-Yang et al. Quantum private query based on stable error correcting code in the case of noise
CN105959113B (en) For preventing the quantum key distribution method of detector side channel attack
Sharma et al. Big data protection via neural and quantum cryptography
CN109412791A (en) Key information processing method, device, electronic equipment and computer-readable medium
Huang et al. Man-in-the-middle attack on BB84 protocol and its defence
CN104579673B (en) Interactive authentication method between RFID card and card reader
CN107070643A (en) A kind of quantum key distribution device and method
CN206341226U (en) A kind of quantum key distribution device
RU2346397C1 (en) Method of protecting personal biometrical identification and authentification data
Singamaneni et al. Efficient quantum cryptography technique for key distribution
Patil et al. An embedding of secret message in audio signal
Wang et al. Phoney: Protecting password hashes with threshold cryptology and honeywords
Sobota et al. Application of quantum cryptography protocols in authentication process
Meraoumia et al. Biometric cryptosystem to secure smart object communications in the internet of things

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant