CN105959113A - Quantum password allocation method for preventing detector side channel attacks - Google Patents

Quantum password allocation method for preventing detector side channel attacks Download PDF

Info

Publication number
CN105959113A
CN105959113A CN201610528535.5A CN201610528535A CN105959113A CN 105959113 A CN105959113 A CN 105959113A CN 201610528535 A CN201610528535 A CN 201610528535A CN 105959113 A CN105959113 A CN 105959113A
Authority
CN
China
Prior art keywords
detector
receiving terminal
side channel
information
detector side
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610528535.5A
Other languages
Chinese (zh)
Other versions
CN105959113B (en
Inventor
贾磊磊
谭勇刚
王松林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Regular Quantum Beijing Technology Co ltd
Original Assignee
Luoyang Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Luoyang Normal University filed Critical Luoyang Normal University
Priority to CN201610528535.5A priority Critical patent/CN105959113B/en
Publication of CN105959113A publication Critical patent/CN105959113A/en
Application granted granted Critical
Publication of CN105959113B publication Critical patent/CN105959113B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Abstract

The invention relates to a quantum password allocation method for preventing detector side channel attacks. A quantum correlation between Alice and Bob is checked by random Bell detection on a receiving end Bob party under the condition that a detection device used in an existing measuring quantum password allocation scheme does not need to be improved, so that the presence of the detector side channel attacks is detected. Through adoption of the quantum password allocation method, existing detection side channel attacks can be effectively detected in a measuring quantum password allocation process, and the problem of leakage of detector side channel information is solved.

Description

For preventing the quantum key distribution method of detector side channel attack
Technical field
The present invention relates to quantum cryptography field, a kind of for preventing the quantum cryptography of detector side channel attack from dividing Method of completing the square.
Background technology
Preparation is measured quantum key distribution scheme and is had the advantage that speed is fast, password production rate is high, be easily achieved.But visit The attack surveying device side channel greatly destroys its safety, and listener-in Eve is can be in order under conditions of quantum principles Its invalid information is obtained, it means that she can eavesdrop communication and not be found by the defect of detector.Detector side channel is attacked Hit the safety to quantum key distribution and cause the biggest harm.Therefore detector must be carried out bigger improvement, to avoid detection The attack of device wing passage.
Taking some measures at present prevents these from attacking, for example unrelated with measurement apparatus quantum cryptography system System.In this case, the safety of measurement result depends on the monogynous tangled, it is achieved increasingly complex, and password production rate is relatively Low.Or use more perfect detector just to prevent from attacking.
Summary of the invention
It is an object of the invention to provide a kind of quantum key distribution method for preventing detector side channel attack, in order to Solve the dependence of existing method to tangle or the problem of detector.
For achieving the above object, the solution of the present invention includes:
Step one, transmitting terminal A select an information embedded mode at random, and random 0 or 1 are enrolled the quantum state of photon, send out To receiving terminal B;
Step 2, receiving terminal B arrange both of which: signal mode and test pattern;Receiving terminal B randomly chooses according to probability One of which pattern;In the signal mode, randomly choose that information reading manner reads that photon carries 0 or 1;Work as receiving terminal When B selects signal mode, the information that transmitting terminal A and receiving terminal B announces them by common signal channel embeds and reading manner, will letter Cease embedded mode those bits consistent with reading manner as cipher bits;At test pattern, specific information is selected to read Mode carries out Bell test;When receiving terminal B selects test pattern, transmitting terminal A and receiving terminal B calculates S by common signal channelCHSH Value announce they base lose select and measurement result.
Step 3, after password distributes, cipher bits is carried out error correcting and privacy and is amplified by transmitting terminal A and receiving terminal B, For generating security password;Described SCHSHValue be used for carrying out privacy amplification, according to SCHSHSize and formula (6) judge to be marked The amount of the information of note number, if the amount of labeled information beyond the threshold value preset, then abandons;If below default threshold value, Then by relevant means, label information can be eliminated.Due to concrete elimination means and the application inquire into content without Close, and the paper in quantum cryptography field relates to more, therefore do not repeat them here.
Further, the information embedded mode of described transmitting terminal A includes oblique line baseWith straight line baseLetter Under number pattern, receiving terminal B basic vector existsWithIn randomly choose.
Further, under test pattern, receiving terminal B basic vector existsWithIn with Machine selects;SCHSH≡<A1B1+A1B2+A2B1-A2B2>。
Further, the upper limit of the quantity of information of labeled receiving terminal B is estimated by following formula:
I E &le; H 2 ( 1 + ( S C H S H / 2 ) 2 - 1 2 ) , - - - ( 6 )
Wherein H2(x)=-xlog2x-(1-x)log2(1-x) it is binary information entropy.
Further, receiving terminal B is respectively labeled as D except being used for decoding the detector of 0 and 10And D1, also there is a spy Survey device Dt;Each detector arranges a time window, and in window, detector can detect the signal pulse of entrance effectively, Effective pulse can not be obtained at window external detector;D0And D1Detection efficient be labeled as η and DtDetection efficient be ηt, than Relatively η and ηtWork as ηtDuring > η, it is judged that detector side channel attack.
According to the custom of this area, transmitting terminal A is Alice, and receiving terminal B is Bob, listener-in Eve.The present invention need not Under conditions of the detection device used in existing preparation measurement quantum key distribution scheme is improved, by receiving terminal Bob side enters row stochastic Bell and checks the Quantum Correlation between Alice and Bob, thus detects detector side channel and attack Hit and whether exist.During quantum key distribution is measured in preparation, can effectively detect the detector side channel attack of existence, solve Detector side channel information leakage problem.Advantages of the present invention also includes: need not change preparation and measures quantum key distribution side Case (such as changes the quantum cryptography system unrelated with measurement apparatus into), it is ensured that the dispensing rate of quantum cryptography, password production rate etc. Unaffected.The program is not worried the efficiency of detector, because photon the most labeled in scheme can be used to calculate CHSH multinomial.The program realizes in quantum key distribution mode is measured in preparation, therefore without the concern for tangling.
Detailed description of the invention
The present invention will be further described in detail below.
The basic ideas of the present invention are to use preparation-measurement Bell test in quantum key distribution, and ultimate principle is:
According to the custom of this area, transmitting terminal A is Alice, and receiving terminal B is Bob, listener-in Eve.If Alice has one Individual single-photon source (can use weak coherent light source) in actual experiment, she is randomly chosenOrLight is prepared with 0 or 1 Sub-B, before measuring photon B, the state of photon B remains the quantum state prepared by Alice;
Bob is randomly chosen at baseWithThe upper photon measuring entrance laboratory;
Alice and Bob selects with their base and preparation (measurement) result calculates CHSH multinomial, if CHSH inequality Classical limit is broken, and illustrates that Quantum Correlation exists, and otherwise Quantum Correlation does not exists.
If the base of photon B is become estranged by Alice, value selects is completely random, then at SCHSH≡<A1B1+A1B2+ A2B1-A2B2Can obtain in >
< A 2 B 1 > = 1 2 B < 0 | B 1 | 0 > - 1 2 < 1 | B 1 | 1 > B - - - ( 1 )
Similarly have,
< A 2 B 2 > = 1 2 B < 0 | B 2 | 0 > B - 1 2 B < 1 | B 2 | 1 > B < A 1 B 1 > = 1 2 B < + | B 1 | + > - 1 2 B < - | B 1 | - > B < A 1 B 2 > = 1 2 B < + | B 2 | + > - 1 2 B < - | B 2 | - > B - - - ( 2 )
WithWithSubstitute B1、B2, obtainTherefore can obtain
Quantum theory and local hidden variable theories are the most incompatible, and the conflict without leak Bell inequality means office Territory hidden variable theory can be excluded.Otherwise, if the conflict without leak Bell inequality cannot be obtained, mean that quantum is managed Opinion is wrong.Recently, the conflict without leak Bell inequality has obtained the verification experimental verification of three groups.These important results Mean that local hidden variable theories is incorrect.Based on the fact that, we can be by a simple and effective way Prevent preparation measure quantum key distribution process when present in the attack of detector side channel.Need not experimental provision Under conditions of improving, the amount checking between Alice and Bob by receiving terminal Bob side is entered row stochastic Bell test Son association, thus detect whether detector side channel attack exists.
The method that the present invention is described below as a example by the BB84 scheme improved, it should be noted that the method for the present invention is not Can be only used for BB84 scheme, it is also possible to for other quantum key distribution schemes.
BB84 scheme based on preparation-measurement Bell test:
Step one, Alice laboratory generate n single photon, Alice is at oblique line baseStraight line baseWith 0, any value in 1 randomly chooses and prepares these photons, and then these photons send and give Bob.
Step 2, Bob have both of which: he selects the probability of signal mode to be p, and the probability selecting test pattern is 1-p (preferably, only Bob oneself knows the value of p).In signal mode, measure basic vector existWithIn select at random Select, test pattern is measured basic vector and existsWithIn randomly choose.
When Bob selects signal mode, Alice and Bob announces their measurement basic vector by common signal channel, and they are him Measurement result be saved in identical basic vector as screening cipher bits.
When Bob selects test pattern, Alice and Bob calculates S by common signal channelCHSHValue announce their base Lose and select and measurement result.
Step 3, after password distributes, the cipher bits of screening is carried out error correcting and privacy and is amplified by Alice and Bob, If security password can be generated, then password distribution task just completes, and otherwise task just have failed.Above-mentioned error correction process Relevant to the result of above-mentioned signal mode, privacy is amplified relevant to the measurement result of test pattern.Error correcting i.e. passes through error code Rate judges whether the process of fatal eavesdropping.
The principle of such scheme is, by increasing a test pattern in password assigning process, by test pattern Result carries out privacy amplification such that it is able to generate security password.
Concrete theory analysis is as follows: because Alice randomly chooses basic vector and the value of photon B, stateUnder conditions of conjugated radicle loses, the preparation of state is consistent, Eve Which can not find out state to prepare.If she carries out state recognition task to photon, it is necessary for introducing interference.The most any Under conditions of loss, it can be assumed that Eve acts on photon B with a probe.If depending on the phase interaction between probe and photon With for unitary evolution, can obtain
| 0 > A | 0 > B | E > &RightArrow; U | 0 > A ( f | 0 > B | 0 > E + e | 1 > B ) | 1 > E ) , | 1 > A | 1 > B | E > &RightArrow; U | 1 > A ( f | 1 > B | 0 > E + e | 0 > B ) | 1 > E ) , | + > A | + > B | E > &RightArrow; U | + > A ( f | + > B | + > E + e | - > B ) | - > E ) , | - > A | - > B | E > &RightArrow; U | - > A ( f | - > B | + > E + e | + > B ) | - > E ) . - - - ( 3 )
Here | E > it is the blank state of Eve probe, f and e is that photon B polarization is constant and polarization occurs the general of upset respectively Rate, e generally also shows quantum bit error rate in the information that Eve eavesdrops.Quantity of information H between Alice and Bob2E () is generally used Correct their Bit String mistake, and binary entropy is H2(x)=-xlo2gx-(1-x)lo2gx。
After under Eve attacks, < A2B1> result that recalculates is
< A 2 B 1 > = f ( 1 2 B < 0 | B 1 | 0 > B - 1 2 B < 1 | B 1 | 1 > B + e ( 1 2 B < 1 | B 1 | 1 > B - 1 2 B < 0 | B 1 | 0 > B = ( f - e ) ( 1 2 B < 0 | B 1 | 0 > B - 1 2 B < 1 | B 1 | 1 > ) - - - ( 4 )
It is likewise possible to obtain
< A 2 B 2 > = ( f - e ) ( 1 2 B < 0 | B 2 | 0 > B - 1 2 B < 1 | B 2 | 1 > B ) ,
< A 1 B 1 > = ( f - e ) ( 1 2 B < + | B 1 | + > B - 1 2 B < - | B 1 | - > B ) , - - - ( 5 )
< A 1 B 2 > = ( f - e ) ( 1 2 B < + | B 2 | + ) B - 1 2 B < - | B 2 | - > B ) .
After Eve attacks, obtainIn quantum key distribution is measured in preparation, the eavesdropping energy of Eve Hard to bear collective attacks restriction.The upper limit of the quantity of information of Eve labelling Bob can be estimated by following formula:
I E &le; H 2 ( 1 + ( S C H S H / 2 ) 2 - 1 2 ) , - - - ( 6 )
Wherein H2(x)=-xlog2x-(1-x)log2(1-x) it is binary information entropy.
If the detector of Bob is the most perfect, then it may happen that detector side channel information is revealed.Eve meeting Detector side channel is attacked by the shortcoming utilizing Bob detector side channel.In the embodiment above, Bob is not required to The detector of Bob is improved.Further, Bob can also increase the improvement to detector, is described as follows:
If Bob is respectively labeled as D except the detector being used for decoding 0 and 10And D1, he also has a detector Dt, for Reduce the impact of secret mark number, often give in the middle of password generation process each detector plus time window, in window Detector can detect the signal pulse of entrance effectively, can not obtain effective pulse at window external detector, be experimentally Time window is realized by open and close detector.Assume DtHave and D0And D1The same detection efficient still has sufficiently large Time window ensure all can be by D0And D1The signal detected all can be by DtDetect.D0And D1Detection efficient be labeled as η and DtDetection efficient be ηt, without η in the case of detector side channel attackt=η.Once there is detector side channel Attack, it appeared that ηt> η,Therefore Eve obtains in the middle of detector side channel attack process Quantity of information just can be estimated effectively:
I E &le; H 2 ( 1 + ( S C H S H s i d e - c h a n n e l / 2 ) 2 - 1 2 ) - - - ( 7 )
Theory analysis is as follows:
Theorem 1: the attack of detector side channel can successfully be carried out, the bit value of the Alice of Eve acquisition that and if only if Measurement result relative to Bob is partially or completely to determine.
Eve and photon B interacts with acquisition Alice to the state of photon B, after Bob measured the photon received, He and Alice announce that their basic vector selects.The entropy minimizing of Eve state can make Eve obtain information from Alice to be limited.
IE=Ha priori-Ha posteriori (7)
Under the attack of detector side channel, the task of Eve is the uncertainty eliminating Alice state, although the detection of Bob There is various defect in device, but assumes that it is necessary for not having unnecessary information to reveal from his laboratory.Otherwise, quantum key distribution Safety it cannot be guaranteed that, this explanation Eve should be from detector steal information indirectly.If the state that Alice is to photon B Prepare identical, then Ha priori=1.
In view of Ha posteriori=∑rP (r) H (i | r), represent Bob with P (r) and obtain the probability that measurement result is r, H (i | r) represent the probability that quantum state is i of Alice when measurement result is r.Ideally, the measurement result of Bob should be divided equably Cloth is 0 and 1.If Eve does not interacts with photon B, then announce then H after his base selects at Boba posteriori=1, Therefore IE=0, Eve can not steal any information from Alice over there.In order to meet IE> 0, Ha posterior< 1 must expire Foot, again because ∑ must at any time be metrP (r)=1, then Eve just can not get H (i | r)=1, this represents that Eve is at Bob Obtain under conditions of measurement result r the message part of the quantum state i to Alice or determine completely.
If therefore detector side channel attack can successfully be implemented, Eve must control detector D0And D1Produce Detection efficient is poor, and this inefficient is random and cannot be found by Bob from the point of view of time average.But this efficiency Difference can pass through η/ηtEstimate and be embodied inOn, therefore can be used to estimate that Eve is in detection Quantity of information acquired in device side-channel attack.
It is presented above the detailed description of the invention that the present invention relates to, but the present invention is not limited to described embodiment. Under the thinking that the present invention provides, use the mode being readily apparent that to those skilled in the art to the skill in above-described embodiment Art means carry out converting, replace, revise, and the effect played is essentially identical with the relevant art means in the present invention, realize Goal of the invention the most essentially identical, so formed technical scheme above-described embodiment is finely adjusted formation, this technology Scheme still falls within protection scope of the present invention.

Claims (5)

1. for preventing the quantum key distribution method of detector side channel attack, it is characterised in that step is as follows:
Step one, transmitting terminal A select an information embedded mode at random, random 0 or 1 are enrolled the quantum state of photon, issues and connect Receiving end B;
Step 2, receiving terminal B arrange both of which: signal mode and test pattern;Receiving terminal B randomly chooses wherein according to probability A kind of pattern;In the signal mode, randomly choose that information reading manner reads that photon carries 0 or 1;When receiving terminal B selects When selecting signal mode, the information that transmitting terminal A and receiving terminal B announces them by common signal channel embeds and reading manner, by information Embedded mode those bits consistent with reading manner are as cipher bits;At test pattern, select specific information reading side Formula carries out Bell test;When receiving terminal B selects test pattern, transmitting terminal A and receiving terminal B calculates S by common signal channelCHSH's Value is announced that their base loses and is selected and measurement result;
Step 3, after password distributes, cipher bits is carried out error correcting and privacy and is amplified by transmitting terminal A and receiving terminal B, is used for Generate security password;Described SCHSHValue be used for carrying out privacy amplification.
The most according to claim 1 for preventing the quantum key distribution method of detector side channel attack, its feature exists In, the information embedded mode of described transmitting terminal A includes oblique line baseWith straight line baseUnder signal mode, receiving terminal B basic vector existsWithIn randomly choose.
The most according to claim 2 for preventing the quantum key distribution method of detector side channel attack, its feature exists In, under test pattern, receiving terminal B basic vector existsWithIn randomly choose;SCHSH≡< A1B1+A1B2+A2B1-A2B2>。
The most according to claim 3 for preventing the quantum key distribution method of detector side channel attack, its feature exists In, the upper limit of the quantity of information of labeled receiving terminal B is estimated by following formula:
I E &le; H 2 ( 1 + ( S C H S H / 2 ) 2 - 1 2 ) , - - - ( 6 )
Wherein H2(x)=-xlog2x-(1-x)log2(1-x) it is binary information entropy.
5. according to the quantum key distribution side for preventing detector side channel attack according to any one of claim 1-4 Method, it is characterised in that receiving terminal B is respectively labeled as D except the detector being used for decoding 0 and 10And D1, also there is a detector Dt;Each detector arranges a time window, and in window, detector can detect the signal pulse of entrance effectively, at window Mouth external detector can not obtain effective pulse;D0And D1Detection efficient be labeled as η and DtDetection efficient be ηt, compare η and ηtWork as ηtDuring > η, it is judged that detector side channel attack.
CN201610528535.5A 2016-07-06 2016-07-06 For preventing the quantum key distribution method of detector side channel attack Active CN105959113B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610528535.5A CN105959113B (en) 2016-07-06 2016-07-06 For preventing the quantum key distribution method of detector side channel attack

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610528535.5A CN105959113B (en) 2016-07-06 2016-07-06 For preventing the quantum key distribution method of detector side channel attack

Publications (2)

Publication Number Publication Date
CN105959113A true CN105959113A (en) 2016-09-21
CN105959113B CN105959113B (en) 2018-11-30

Family

ID=56899582

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610528535.5A Active CN105959113B (en) 2016-07-06 2016-07-06 For preventing the quantum key distribution method of detector side channel attack

Country Status (1)

Country Link
CN (1) CN105959113B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107528686A (en) * 2017-08-30 2017-12-29 洛阳师范学院 A kind of generation method of the quantum cryptography unrelated with equipment based on actual detection system
US11334667B1 (en) 2020-01-17 2022-05-17 Wells Fargo Bank, N.A. Systems and methods for disparate quantum computing threat detection
US11336462B1 (en) 2019-09-10 2022-05-17 Wells Fargo Bank, N.A. Systems and methods for post-quantum cryptography optimization
US11366897B1 (en) 2020-01-17 2022-06-21 Wells Fargo Bank, N.A. Systems and methods for layered quantum computing detection

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1929372A (en) * 2006-09-22 2007-03-14 西南大学 Highly effective quantum key distribution method
GB2430123A (en) * 2005-09-09 2007-03-14 Toshiba Res Europ Ltd A quantum communication system
GB2441364A (en) * 2006-08-31 2008-03-05 Toshiba Res Europ Ltd A quantum communication system which selects different protocols on the basis of security
CN103199994A (en) * 2013-02-19 2013-07-10 华南师范大学 Active phase compensation method and device of joint scan
CN105049200A (en) * 2015-08-14 2015-11-11 清华大学 Data post-processing method of quantum key distribution system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2430123A (en) * 2005-09-09 2007-03-14 Toshiba Res Europ Ltd A quantum communication system
GB2441364A (en) * 2006-08-31 2008-03-05 Toshiba Res Europ Ltd A quantum communication system which selects different protocols on the basis of security
CN1929372A (en) * 2006-09-22 2007-03-14 西南大学 Highly effective quantum key distribution method
CN103199994A (en) * 2013-02-19 2013-07-10 华南师范大学 Active phase compensation method and device of joint scan
CN105049200A (en) * 2015-08-14 2015-11-11 清华大学 Data post-processing method of quantum key distribution system

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
MARIO STIPČEVIĆ: ""Preventing detector blinding attack and other random number generator attacks on quantum cryptography by use of an explicit random number generator"", 《RESEARCHGATE》 *
MINAL LOPES等: ""CRYPTOGRAPHY FROM QUANTUM MECHANICAL VIEWPOINT"", 《INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)》 *
SAMUEL L. BRAUNSTEIN等: ""Side-channel-free quantum key distribution"", 《PHYSICAL REVIEW LETTERS》 *
张现周等: ""Quantum key distribution series network protocol with M-classical Bobs"", 《CHINESE PHYSICS B》 *
李恕海等: ""一种新型基于完全Bell测量的量子密钥分配协议"", 《中国密码学会2007年年会》 *
谭勇刚等: ""Biased Random Number Generator Based on Bell’s Theorem"", 《CHINESE PHYSICS LETTERS》 *
谭勇刚等: ""The Essence of More Nonlocality with Less Entanglement in Bell Tests"", 《COMMUNICATIONS IN THEORETICAL PHYSICS》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107528686A (en) * 2017-08-30 2017-12-29 洛阳师范学院 A kind of generation method of the quantum cryptography unrelated with equipment based on actual detection system
CN107528686B (en) * 2017-08-30 2019-11-22 洛阳师范学院 A kind of generation method of the quantum cryptography unrelated with equipment based on actual detection system
US11336462B1 (en) 2019-09-10 2022-05-17 Wells Fargo Bank, N.A. Systems and methods for post-quantum cryptography optimization
US11736303B1 (en) 2019-09-10 2023-08-22 Wells Fargo Bank, N.A. Systems and methods for post-quantum cryptography optimization
US11736302B1 (en) 2019-09-10 2023-08-22 Wells Fargo Bank, N.A. Systems and methods for post-quantum cryptography optimization
US11334667B1 (en) 2020-01-17 2022-05-17 Wells Fargo Bank, N.A. Systems and methods for disparate quantum computing threat detection
US11366897B1 (en) 2020-01-17 2022-06-21 Wells Fargo Bank, N.A. Systems and methods for layered quantum computing detection
US11914707B1 (en) 2020-01-17 2024-02-27 Wells Fargo Bank, N.A. Systems and methods for disparate quantum computing threat detection

Also Published As

Publication number Publication date
CN105959113B (en) 2018-11-30

Similar Documents

Publication Publication Date Title
CN109194479B (en) Measuring equipment-independent quantum key distribution method based on single photon multiple degrees of freedom
US7853011B2 (en) Methods and apparatus for monitoring the integrity of a quantum channel supporting multi-quanta pulse transmission
CN105959113A (en) Quantum password allocation method for preventing detector side channel attacks
US20140068765A1 (en) Method and apparatus for authenticating user in multiparty quantum communications
KR101767067B1 (en) Method and system for improving security of quantum encryption key distribution protocol
CN108092771A (en) A kind of anti-tamper controlled quantum safety direct communication method and system
CN106685654A (en) Quantum secret key distribution method with function of bidirectional identity authentication
KR20120071883A (en) Quantum authentication method and apparatus for quantum secret sharing protocol
CN101854347B (en) User ID authentication method and system based on quantum network
Ur Rehman et al. Security of a control key in quantum key distribution
CN107070643B (en) Quantum key distribution device and method
Mafu et al. Finite-key-size security of the Phoenix-Barnett-Chefles 2000 quantum-key-distribution protocol
CN110635907B (en) Controlled quantum conversation method with identity authentication function based on GHZ-like state
CN206341226U (en) A kind of quantum key distribution device
RU2360367C1 (en) Polarisation quantum cryptosystem
CN109039603A (en) A kind of half quantum key delivering method of fault tolerant based on decoherence free subspace
CN109450630A (en) A kind of quantum safety direct communication method based on Omega state and ultra dense coding
CN109792379B (en) Information processing method and device
Subramaniam et al. Limits on detecting eavesdropper in qkd protocols
CN107968685B (en) Quantum communication coin throwing method and relay system
Usenko et al. Large-alphabet quantum key distribution with two-mode coherently correlated beams
Abushgra et al. QKD protocol based on entangled states by trusted third party
Cleve Introduction to Quantum Information Processing
CN107528686A (en) A kind of generation method of the quantum cryptography unrelated with equipment based on actual detection system
Lace et al. Quantum Cryptographic Key Distribution Protocols.

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240201

Address after: 1003, 1st Floor, Building 7, No. 2 Wanhong West Street, West Eight Rooms, Dongzhimenwai, Chaoyang District, Beijing, 100015

Patentee after: Regular Quantum (Beijing) Technology Co.,Ltd.

Country or region after: China

Address before: No. 71 Longmen Road, High tech Development Zone, Luoyang City, Henan Province, 471022

Patentee before: LUOYANG NORMAL University

Country or region before: China