CN105959113A - Quantum password allocation method for preventing detector side channel attacks - Google Patents
Quantum password allocation method for preventing detector side channel attacks Download PDFInfo
- Publication number
- CN105959113A CN105959113A CN201610528535.5A CN201610528535A CN105959113A CN 105959113 A CN105959113 A CN 105959113A CN 201610528535 A CN201610528535 A CN 201610528535A CN 105959113 A CN105959113 A CN 105959113A
- Authority
- CN
- China
- Prior art keywords
- detector
- receiving terminal
- side channel
- information
- detector side
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 21
- 238000001514 detection method Methods 0.000 claims abstract description 15
- 238000009826 distribution Methods 0.000 claims description 19
- 238000012360 testing method Methods 0.000 claims description 19
- 238000005259 measurement Methods 0.000 claims description 18
- 230000003321 amplification Effects 0.000 claims description 3
- 238000003199 nucleic acid amplification method Methods 0.000 claims description 3
- 230000008569 process Effects 0.000 abstract description 7
- 238000002360 preparation method Methods 0.000 description 9
- 238000004519 manufacturing process Methods 0.000 description 3
- 239000000523 sample Substances 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 230000010287 polarization Effects 0.000 description 2
- 238000012216 screening Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000001427 coherent effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000008030 elimination Effects 0.000 description 1
- 238000003379 elimination reaction Methods 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000002372 labelling Methods 0.000 description 1
- 239000002096 quantum dot Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Abstract
The invention relates to a quantum password allocation method for preventing detector side channel attacks. A quantum correlation between Alice and Bob is checked by random Bell detection on a receiving end Bob party under the condition that a detection device used in an existing measuring quantum password allocation scheme does not need to be improved, so that the presence of the detector side channel attacks is detected. Through adoption of the quantum password allocation method, existing detection side channel attacks can be effectively detected in a measuring quantum password allocation process, and the problem of leakage of detector side channel information is solved.
Description
Technical field
The present invention relates to quantum cryptography field, a kind of for preventing the quantum cryptography of detector side channel attack from dividing
Method of completing the square.
Background technology
Preparation is measured quantum key distribution scheme and is had the advantage that speed is fast, password production rate is high, be easily achieved.But visit
The attack surveying device side channel greatly destroys its safety, and listener-in Eve is can be in order under conditions of quantum principles
Its invalid information is obtained, it means that she can eavesdrop communication and not be found by the defect of detector.Detector side channel is attacked
Hit the safety to quantum key distribution and cause the biggest harm.Therefore detector must be carried out bigger improvement, to avoid detection
The attack of device wing passage.
Taking some measures at present prevents these from attacking, for example unrelated with measurement apparatus quantum cryptography system
System.In this case, the safety of measurement result depends on the monogynous tangled, it is achieved increasingly complex, and password production rate is relatively
Low.Or use more perfect detector just to prevent from attacking.
Summary of the invention
It is an object of the invention to provide a kind of quantum key distribution method for preventing detector side channel attack, in order to
Solve the dependence of existing method to tangle or the problem of detector.
For achieving the above object, the solution of the present invention includes:
Step one, transmitting terminal A select an information embedded mode at random, and random 0 or 1 are enrolled the quantum state of photon, send out
To receiving terminal B;
Step 2, receiving terminal B arrange both of which: signal mode and test pattern;Receiving terminal B randomly chooses according to probability
One of which pattern;In the signal mode, randomly choose that information reading manner reads that photon carries 0 or 1;Work as receiving terminal
When B selects signal mode, the information that transmitting terminal A and receiving terminal B announces them by common signal channel embeds and reading manner, will letter
Cease embedded mode those bits consistent with reading manner as cipher bits;At test pattern, specific information is selected to read
Mode carries out Bell test;When receiving terminal B selects test pattern, transmitting terminal A and receiving terminal B calculates S by common signal channelCHSH
Value announce they base lose select and measurement result.
Step 3, after password distributes, cipher bits is carried out error correcting and privacy and is amplified by transmitting terminal A and receiving terminal B,
For generating security password;Described SCHSHValue be used for carrying out privacy amplification, according to SCHSHSize and formula (6) judge to be marked
The amount of the information of note number, if the amount of labeled information beyond the threshold value preset, then abandons;If below default threshold value,
Then by relevant means, label information can be eliminated.Due to concrete elimination means and the application inquire into content without
Close, and the paper in quantum cryptography field relates to more, therefore do not repeat them here.
Further, the information embedded mode of described transmitting terminal A includes oblique line baseWith straight line baseLetter
Under number pattern, receiving terminal B basic vector existsWithIn randomly choose.
Further, under test pattern, receiving terminal B basic vector existsWithIn with
Machine selects;SCHSH≡<A1B1+A1B2+A2B1-A2B2>。
Further, the upper limit of the quantity of information of labeled receiving terminal B is estimated by following formula:
Wherein H2(x)=-xlog2x-(1-x)log2(1-x) it is binary information entropy.
Further, receiving terminal B is respectively labeled as D except being used for decoding the detector of 0 and 10And D1, also there is a spy
Survey device Dt;Each detector arranges a time window, and in window, detector can detect the signal pulse of entrance effectively,
Effective pulse can not be obtained at window external detector;D0And D1Detection efficient be labeled as η and DtDetection efficient be ηt, than
Relatively η and ηtWork as ηtDuring > η, it is judged that detector side channel attack.
According to the custom of this area, transmitting terminal A is Alice, and receiving terminal B is Bob, listener-in Eve.The present invention need not
Under conditions of the detection device used in existing preparation measurement quantum key distribution scheme is improved, by receiving terminal
Bob side enters row stochastic Bell and checks the Quantum Correlation between Alice and Bob, thus detects detector side channel and attack
Hit and whether exist.During quantum key distribution is measured in preparation, can effectively detect the detector side channel attack of existence, solve
Detector side channel information leakage problem.Advantages of the present invention also includes: need not change preparation and measures quantum key distribution side
Case (such as changes the quantum cryptography system unrelated with measurement apparatus into), it is ensured that the dispensing rate of quantum cryptography, password production rate etc.
Unaffected.The program is not worried the efficiency of detector, because photon the most labeled in scheme can be used to calculate
CHSH multinomial.The program realizes in quantum key distribution mode is measured in preparation, therefore without the concern for tangling.
Detailed description of the invention
The present invention will be further described in detail below.
The basic ideas of the present invention are to use preparation-measurement Bell test in quantum key distribution, and ultimate principle is:
According to the custom of this area, transmitting terminal A is Alice, and receiving terminal B is Bob, listener-in Eve.If Alice has one
Individual single-photon source (can use weak coherent light source) in actual experiment, she is randomly chosenOrLight is prepared with 0 or 1
Sub-B, before measuring photon B, the state of photon B remains the quantum state prepared by Alice;
Bob is randomly chosen at baseWithThe upper photon measuring entrance laboratory;
Alice and Bob selects with their base and preparation (measurement) result calculates CHSH multinomial, if CHSH inequality
Classical limit is broken, and illustrates that Quantum Correlation exists, and otherwise Quantum Correlation does not exists.
If the base of photon B is become estranged by Alice, value selects is completely random, then at SCHSH≡<A1B1+A1B2+
A2B1-A2B2Can obtain in >
Similarly have,
WithWithSubstitute B1、B2, obtainTherefore can obtain
Quantum theory and local hidden variable theories are the most incompatible, and the conflict without leak Bell inequality means office
Territory hidden variable theory can be excluded.Otherwise, if the conflict without leak Bell inequality cannot be obtained, mean that quantum is managed
Opinion is wrong.Recently, the conflict without leak Bell inequality has obtained the verification experimental verification of three groups.These important results
Mean that local hidden variable theories is incorrect.Based on the fact that, we can be by a simple and effective way
Prevent preparation measure quantum key distribution process when present in the attack of detector side channel.Need not experimental provision
Under conditions of improving, the amount checking between Alice and Bob by receiving terminal Bob side is entered row stochastic Bell test
Son association, thus detect whether detector side channel attack exists.
The method that the present invention is described below as a example by the BB84 scheme improved, it should be noted that the method for the present invention is not
Can be only used for BB84 scheme, it is also possible to for other quantum key distribution schemes.
BB84 scheme based on preparation-measurement Bell test:
Step one, Alice laboratory generate n single photon, Alice is at oblique line baseStraight line baseWith
0, any value in 1 randomly chooses and prepares these photons, and then these photons send and give Bob.
Step 2, Bob have both of which: he selects the probability of signal mode to be p, and the probability selecting test pattern is 1-p
(preferably, only Bob oneself knows the value of p).In signal mode, measure basic vector existWithIn select at random
Select, test pattern is measured basic vector and existsWithIn randomly choose.
When Bob selects signal mode, Alice and Bob announces their measurement basic vector by common signal channel, and they are him
Measurement result be saved in identical basic vector as screening cipher bits.
When Bob selects test pattern, Alice and Bob calculates S by common signal channelCHSHValue announce their base
Lose and select and measurement result.
Step 3, after password distributes, the cipher bits of screening is carried out error correcting and privacy and is amplified by Alice and Bob,
If security password can be generated, then password distribution task just completes, and otherwise task just have failed.Above-mentioned error correction process
Relevant to the result of above-mentioned signal mode, privacy is amplified relevant to the measurement result of test pattern.Error correcting i.e. passes through error code
Rate judges whether the process of fatal eavesdropping.
The principle of such scheme is, by increasing a test pattern in password assigning process, by test pattern
Result carries out privacy amplification such that it is able to generate security password.
Concrete theory analysis is as follows: because Alice randomly chooses basic vector and the value of photon B, stateUnder conditions of conjugated radicle loses, the preparation of state is consistent, Eve
Which can not find out state to prepare.If she carries out state recognition task to photon, it is necessary for introducing interference.The most any
Under conditions of loss, it can be assumed that Eve acts on photon B with a probe.If depending on the phase interaction between probe and photon
With for unitary evolution, can obtain
Here | E > it is the blank state of Eve probe, f and e is that photon B polarization is constant and polarization occurs the general of upset respectively
Rate, e generally also shows quantum bit error rate in the information that Eve eavesdrops.Quantity of information H between Alice and Bob2E () is generally used
Correct their Bit String mistake, and binary entropy is H2(x)=-xlo2gx-(1-x)lo2gx。
After under Eve attacks, < A2B1> result that recalculates is
It is likewise possible to obtain
After Eve attacks, obtainIn quantum key distribution is measured in preparation, the eavesdropping energy of Eve
Hard to bear collective attacks restriction.The upper limit of the quantity of information of Eve labelling Bob can be estimated by following formula:
Wherein H2(x)=-xlog2x-(1-x)log2(1-x) it is binary information entropy.
If the detector of Bob is the most perfect, then it may happen that detector side channel information is revealed.Eve meeting
Detector side channel is attacked by the shortcoming utilizing Bob detector side channel.In the embodiment above, Bob is not required to
The detector of Bob is improved.Further, Bob can also increase the improvement to detector, is described as follows:
If Bob is respectively labeled as D except the detector being used for decoding 0 and 10And D1, he also has a detector Dt, for
Reduce the impact of secret mark number, often give in the middle of password generation process each detector plus time window, in window
Detector can detect the signal pulse of entrance effectively, can not obtain effective pulse at window external detector, be experimentally
Time window is realized by open and close detector.Assume DtHave and D0And D1The same detection efficient still has sufficiently large
Time window ensure all can be by D0And D1The signal detected all can be by DtDetect.D0And D1Detection efficient be labeled as
η and DtDetection efficient be ηt, without η in the case of detector side channel attackt=η.Once there is detector side channel
Attack, it appeared that ηt> η,Therefore Eve obtains in the middle of detector side channel attack process
Quantity of information just can be estimated effectively:
Theory analysis is as follows:
Theorem 1: the attack of detector side channel can successfully be carried out, the bit value of the Alice of Eve acquisition that and if only if
Measurement result relative to Bob is partially or completely to determine.
Eve and photon B interacts with acquisition Alice to the state of photon B, after Bob measured the photon received,
He and Alice announce that their basic vector selects.The entropy minimizing of Eve state can make Eve obtain information from Alice to be limited.
IE=Ha priori-Ha posteriori (7)
Under the attack of detector side channel, the task of Eve is the uncertainty eliminating Alice state, although the detection of Bob
There is various defect in device, but assumes that it is necessary for not having unnecessary information to reveal from his laboratory.Otherwise, quantum key distribution
Safety it cannot be guaranteed that, this explanation Eve should be from detector steal information indirectly.If the state that Alice is to photon B
Prepare identical, then Ha priori=1.
In view of Ha posteriori=∑rP (r) H (i | r), represent Bob with P (r) and obtain the probability that measurement result is r, H (i
| r) represent the probability that quantum state is i of Alice when measurement result is r.Ideally, the measurement result of Bob should be divided equably
Cloth is 0 and 1.If Eve does not interacts with photon B, then announce then H after his base selects at Boba posteriori=1,
Therefore IE=0, Eve can not steal any information from Alice over there.In order to meet IE> 0, Ha posterior< 1 must expire
Foot, again because ∑ must at any time be metrP (r)=1, then Eve just can not get H (i | r)=1, this represents that Eve is at Bob
Obtain under conditions of measurement result r the message part of the quantum state i to Alice or determine completely.
If therefore detector side channel attack can successfully be implemented, Eve must control detector D0And D1Produce
Detection efficient is poor, and this inefficient is random and cannot be found by Bob from the point of view of time average.But this efficiency
Difference can pass through η/ηtEstimate and be embodied inOn, therefore can be used to estimate that Eve is in detection
Quantity of information acquired in device side-channel attack.
It is presented above the detailed description of the invention that the present invention relates to, but the present invention is not limited to described embodiment.
Under the thinking that the present invention provides, use the mode being readily apparent that to those skilled in the art to the skill in above-described embodiment
Art means carry out converting, replace, revise, and the effect played is essentially identical with the relevant art means in the present invention, realize
Goal of the invention the most essentially identical, so formed technical scheme above-described embodiment is finely adjusted formation, this technology
Scheme still falls within protection scope of the present invention.
Claims (5)
1. for preventing the quantum key distribution method of detector side channel attack, it is characterised in that step is as follows:
Step one, transmitting terminal A select an information embedded mode at random, random 0 or 1 are enrolled the quantum state of photon, issues and connect
Receiving end B;
Step 2, receiving terminal B arrange both of which: signal mode and test pattern;Receiving terminal B randomly chooses wherein according to probability
A kind of pattern;In the signal mode, randomly choose that information reading manner reads that photon carries 0 or 1;When receiving terminal B selects
When selecting signal mode, the information that transmitting terminal A and receiving terminal B announces them by common signal channel embeds and reading manner, by information
Embedded mode those bits consistent with reading manner are as cipher bits;At test pattern, select specific information reading side
Formula carries out Bell test;When receiving terminal B selects test pattern, transmitting terminal A and receiving terminal B calculates S by common signal channelCHSH's
Value is announced that their base loses and is selected and measurement result;
Step 3, after password distributes, cipher bits is carried out error correcting and privacy and is amplified by transmitting terminal A and receiving terminal B, is used for
Generate security password;Described SCHSHValue be used for carrying out privacy amplification.
The most according to claim 1 for preventing the quantum key distribution method of detector side channel attack, its feature exists
In, the information embedded mode of described transmitting terminal A includes oblique line baseWith straight line baseUnder signal mode, receiving terminal
B basic vector existsWithIn randomly choose.
The most according to claim 2 for preventing the quantum key distribution method of detector side channel attack, its feature exists
In, under test pattern, receiving terminal B basic vector existsWithIn randomly choose;SCHSH≡<
A1B1+A1B2+A2B1-A2B2>。
The most according to claim 3 for preventing the quantum key distribution method of detector side channel attack, its feature exists
In, the upper limit of the quantity of information of labeled receiving terminal B is estimated by following formula:
Wherein H2(x)=-xlog2x-(1-x)log2(1-x) it is binary information entropy.
5. according to the quantum key distribution side for preventing detector side channel attack according to any one of claim 1-4
Method, it is characterised in that receiving terminal B is respectively labeled as D except the detector being used for decoding 0 and 10And D1, also there is a detector
Dt;Each detector arranges a time window, and in window, detector can detect the signal pulse of entrance effectively, at window
Mouth external detector can not obtain effective pulse;D0And D1Detection efficient be labeled as η and DtDetection efficient be ηt, compare η and
ηtWork as ηtDuring > η, it is judged that detector side channel attack.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610528535.5A CN105959113B (en) | 2016-07-06 | 2016-07-06 | For preventing the quantum key distribution method of detector side channel attack |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610528535.5A CN105959113B (en) | 2016-07-06 | 2016-07-06 | For preventing the quantum key distribution method of detector side channel attack |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105959113A true CN105959113A (en) | 2016-09-21 |
CN105959113B CN105959113B (en) | 2018-11-30 |
Family
ID=56899582
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610528535.5A Active CN105959113B (en) | 2016-07-06 | 2016-07-06 | For preventing the quantum key distribution method of detector side channel attack |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105959113B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107528686A (en) * | 2017-08-30 | 2017-12-29 | 洛阳师范学院 | A kind of generation method of the quantum cryptography unrelated with equipment based on actual detection system |
US11334667B1 (en) | 2020-01-17 | 2022-05-17 | Wells Fargo Bank, N.A. | Systems and methods for disparate quantum computing threat detection |
US11336462B1 (en) | 2019-09-10 | 2022-05-17 | Wells Fargo Bank, N.A. | Systems and methods for post-quantum cryptography optimization |
US11366897B1 (en) | 2020-01-17 | 2022-06-21 | Wells Fargo Bank, N.A. | Systems and methods for layered quantum computing detection |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1929372A (en) * | 2006-09-22 | 2007-03-14 | 西南大学 | Highly effective quantum key distribution method |
GB2430123A (en) * | 2005-09-09 | 2007-03-14 | Toshiba Res Europ Ltd | A quantum communication system |
GB2441364A (en) * | 2006-08-31 | 2008-03-05 | Toshiba Res Europ Ltd | A quantum communication system which selects different protocols on the basis of security |
CN103199994A (en) * | 2013-02-19 | 2013-07-10 | 华南师范大学 | Active phase compensation method and device of joint scan |
CN105049200A (en) * | 2015-08-14 | 2015-11-11 | 清华大学 | Data post-processing method of quantum key distribution system |
-
2016
- 2016-07-06 CN CN201610528535.5A patent/CN105959113B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2430123A (en) * | 2005-09-09 | 2007-03-14 | Toshiba Res Europ Ltd | A quantum communication system |
GB2441364A (en) * | 2006-08-31 | 2008-03-05 | Toshiba Res Europ Ltd | A quantum communication system which selects different protocols on the basis of security |
CN1929372A (en) * | 2006-09-22 | 2007-03-14 | 西南大学 | Highly effective quantum key distribution method |
CN103199994A (en) * | 2013-02-19 | 2013-07-10 | 华南师范大学 | Active phase compensation method and device of joint scan |
CN105049200A (en) * | 2015-08-14 | 2015-11-11 | 清华大学 | Data post-processing method of quantum key distribution system |
Non-Patent Citations (7)
Title |
---|
MARIO STIPČEVIĆ: ""Preventing detector blinding attack and other random number generator attacks on quantum cryptography by use of an explicit random number generator"", 《RESEARCHGATE》 * |
MINAL LOPES等: ""CRYPTOGRAPHY FROM QUANTUM MECHANICAL VIEWPOINT"", 《INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)》 * |
SAMUEL L. BRAUNSTEIN等: ""Side-channel-free quantum key distribution"", 《PHYSICAL REVIEW LETTERS》 * |
张现周等: ""Quantum key distribution series network protocol with M-classical Bobs"", 《CHINESE PHYSICS B》 * |
李恕海等: ""一种新型基于完全Bell测量的量子密钥分配协议"", 《中国密码学会2007年年会》 * |
谭勇刚等: ""Biased Random Number Generator Based on Bell’s Theorem"", 《CHINESE PHYSICS LETTERS》 * |
谭勇刚等: ""The Essence of More Nonlocality with Less Entanglement in Bell Tests"", 《COMMUNICATIONS IN THEORETICAL PHYSICS》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107528686A (en) * | 2017-08-30 | 2017-12-29 | 洛阳师范学院 | A kind of generation method of the quantum cryptography unrelated with equipment based on actual detection system |
CN107528686B (en) * | 2017-08-30 | 2019-11-22 | 洛阳师范学院 | A kind of generation method of the quantum cryptography unrelated with equipment based on actual detection system |
US11336462B1 (en) | 2019-09-10 | 2022-05-17 | Wells Fargo Bank, N.A. | Systems and methods for post-quantum cryptography optimization |
US11736303B1 (en) | 2019-09-10 | 2023-08-22 | Wells Fargo Bank, N.A. | Systems and methods for post-quantum cryptography optimization |
US11736302B1 (en) | 2019-09-10 | 2023-08-22 | Wells Fargo Bank, N.A. | Systems and methods for post-quantum cryptography optimization |
US11334667B1 (en) | 2020-01-17 | 2022-05-17 | Wells Fargo Bank, N.A. | Systems and methods for disparate quantum computing threat detection |
US11366897B1 (en) | 2020-01-17 | 2022-06-21 | Wells Fargo Bank, N.A. | Systems and methods for layered quantum computing detection |
US11914707B1 (en) | 2020-01-17 | 2024-02-27 | Wells Fargo Bank, N.A. | Systems and methods for disparate quantum computing threat detection |
Also Published As
Publication number | Publication date |
---|---|
CN105959113B (en) | 2018-11-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109194479B (en) | Measuring equipment-independent quantum key distribution method based on single photon multiple degrees of freedom | |
US7853011B2 (en) | Methods and apparatus for monitoring the integrity of a quantum channel supporting multi-quanta pulse transmission | |
CN105959113A (en) | Quantum password allocation method for preventing detector side channel attacks | |
US20140068765A1 (en) | Method and apparatus for authenticating user in multiparty quantum communications | |
KR101767067B1 (en) | Method and system for improving security of quantum encryption key distribution protocol | |
CN108092771A (en) | A kind of anti-tamper controlled quantum safety direct communication method and system | |
CN106685654A (en) | Quantum secret key distribution method with function of bidirectional identity authentication | |
KR20120071883A (en) | Quantum authentication method and apparatus for quantum secret sharing protocol | |
CN101854347B (en) | User ID authentication method and system based on quantum network | |
Ur Rehman et al. | Security of a control key in quantum key distribution | |
CN107070643B (en) | Quantum key distribution device and method | |
Mafu et al. | Finite-key-size security of the Phoenix-Barnett-Chefles 2000 quantum-key-distribution protocol | |
CN110635907B (en) | Controlled quantum conversation method with identity authentication function based on GHZ-like state | |
CN206341226U (en) | A kind of quantum key distribution device | |
RU2360367C1 (en) | Polarisation quantum cryptosystem | |
CN109039603A (en) | A kind of half quantum key delivering method of fault tolerant based on decoherence free subspace | |
CN109450630A (en) | A kind of quantum safety direct communication method based on Omega state and ultra dense coding | |
CN109792379B (en) | Information processing method and device | |
Subramaniam et al. | Limits on detecting eavesdropper in qkd protocols | |
CN107968685B (en) | Quantum communication coin throwing method and relay system | |
Usenko et al. | Large-alphabet quantum key distribution with two-mode coherently correlated beams | |
Abushgra et al. | QKD protocol based on entangled states by trusted third party | |
Cleve | Introduction to Quantum Information Processing | |
CN107528686A (en) | A kind of generation method of the quantum cryptography unrelated with equipment based on actual detection system | |
Lace et al. | Quantum Cryptographic Key Distribution Protocols. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20240201 Address after: 1003, 1st Floor, Building 7, No. 2 Wanhong West Street, West Eight Rooms, Dongzhimenwai, Chaoyang District, Beijing, 100015 Patentee after: Regular Quantum (Beijing) Technology Co.,Ltd. Country or region after: China Address before: No. 71 Longmen Road, High tech Development Zone, Luoyang City, Henan Province, 471022 Patentee before: LUOYANG NORMAL University Country or region before: China |