CN112787815B - Continuous variable quantum key communication method and system based on attack perception and defense - Google Patents

Continuous variable quantum key communication method and system based on attack perception and defense Download PDF

Info

Publication number
CN112787815B
CN112787815B CN202110160921.4A CN202110160921A CN112787815B CN 112787815 B CN112787815 B CN 112787815B CN 202110160921 A CN202110160921 A CN 202110160921A CN 112787815 B CN112787815 B CN 112787815B
Authority
CN
China
Prior art keywords
data
attack
receiving end
transmitting end
signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110160921.4A
Other languages
Chinese (zh)
Other versions
CN112787815A (en
Inventor
张航
程泽群
黄端
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Central South University
Original Assignee
Central South University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Central South University filed Critical Central South University
Priority to CN202110160921.4A priority Critical patent/CN112787815B/en
Publication of CN112787815A publication Critical patent/CN112787815A/en
Application granted granted Critical
Publication of CN112787815B publication Critical patent/CN112787815B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computational Linguistics (AREA)
  • Software Systems (AREA)
  • Mathematical Physics (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Biomedical Technology (AREA)
  • Biophysics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • General Engineering & Computer Science (AREA)
  • Molecular Biology (AREA)
  • Computing Systems (AREA)
  • Electromagnetism (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Optical Communication System (AREA)

Abstract

The invention discloses a continuous variable quantum key communication method based on attack perception and defense, which comprises the steps that a sender sends data and calibrates a communication state under the normal open and specific attack communication states; a receiver receives data, divides the data into data packets and carries out data equalization processing to obtain training data and test data; constructing an attack perception preliminary identification model based on a convolutional neural network, and training and testing to obtain the attack perception identification model based on the convolutional neural network; and the receiver adopts an attack perception identification model based on a convolutional neural network to carry out attack perception identification and recombine the data to obtain the final sending data. The invention also discloses a system for realizing the continuous variable quantum key communication method based on attack perception and defense. The invention can sense and identify the attack of the continuous variable quantum key communication process and carry out corresponding communication bit stream processing, and has high identification accuracy, high communication efficiency, stability and reliability.

Description

Continuous variable quantum key communication method and system based on attack perception and defense
Technical Field
The invention belongs to the field of quantum key communication, and particularly relates to a continuous variable quantum key communication method and system based on attack perception and defense.
Background
With the development of economic technology and the improvement of living standard of people, the safety of data transmission has been paid extensive attention and important research. In recent years, Continuous Variable Quantum Key Distribution (CVQKD) has been developed rapidly, and great progress has been made in theoretical research and experimental research. Various CVQKD protocols have been proposed, such as GG02 protocol, compression status protocol, one-dimensional protocol, etc.; CVQKD has become an important research and development direction in the field of quantum communication. CVQKD allows a sender Alice and a receiver Bob in two places to exchange secure keys over an unknown channel, theoretically proving resistant to general collective and coherent attacks.
However, the actual implementation is not as theoretical: the actual system has some loopholes, and the copper leakage causes deviation between the theoretical CVQKD system and the actual CVQKD system, thereby providing security loopholes for an eavesdropper to attack. In practical application, an attacker Eve may attack a transmitted bit stream with one or more attacks, and a receiving end Bob often does not process the original key (raw key) after receiving the original key, but selects to discard the whole bit stream after finding the attack. However, this method of directly discarding the whole bit stream is not only very rough, but also wastes a lot of time and resources.
Disclosure of Invention
One of the purposes of the invention is to provide a continuous variable quantum key communication method based on attack perception and defense, which can sense and identify the attack of the continuous variable quantum key communication process, process the corresponding communication bit stream, and has high identification accuracy, high communication efficiency and stability and reliability.
The invention also aims to provide a system for realizing the attack perception and defense-based continuous variable quantum key communication method.
The continuous variable quantum key communication method based on attack perception and defense provided by the invention comprises the following steps:
s1, in a normal communication state and a specific attacked communication state, a sender sends data to a receiver and calibrates the communication state of the data when sending the data;
s2, a receiving party receives data sent by a sending party and divides the received data into a plurality of data packets according to a set length;
s3, dividing the data packet obtained in the step S2 into preliminary training data and test data;
s4, carrying out data equalization processing on the preliminary training data obtained in the step S3 to obtain training data;
s5, constructing an attack perception preliminary identification model based on a convolutional neural network;
s6, training the initial attack perception recognition model based on the convolutional neural network constructed in the step S5 by adopting the training data obtained in the step S4, and testing by adopting the test data obtained in the step S3 to obtain a final attack perception recognition model based on the convolutional neural network;
s7, carrying out attack perception recognition on the communication between the sender and the receiver by adopting the attack perception recognition model based on the convolutional neural network obtained in the step S6;
and S8, according to the attack perception identification result in the step S7, the receiver recombines the received data, thereby obtaining the final data sent by the sender.
The communication state affected by the specific attack in step S1 specifically includes local oscillator optical attack (LO intensity attack), Calibration attack (Calibration attack), and Saturation attack (Saturation attack).
The data equalization processing in step S4 is specifically performed by the following steps:
A. an oversampling algorithm based on the mahakil algorithm: for a few classes of samples
Figure BDA0002936588690000031
For each minority class sample, according to the formula
Figure BDA0002936588690000032
Calculating a mahalanobis distance, where μ is the mean of the sample distribution and S is the covariance matrix of the sample distribution; the samples are then sorted according to mahalanobis distance and divided into two parts:
Figure BDA0002936588690000033
and
Figure BDA0002936588690000034
the new data of the n +1 th generation is composed of the parent data of the n-th generation and
Figure BDA0002936588690000035
or
Figure BDA0002936588690000036
Obtaining an average value; performing the process in a loop until the ratio of the minority samples and the majority samples reaches 1: N, wherein N is an odd number, and adding the generated data into the data set to obtain a balanced data set
Figure BDA0002936588690000037
The same flow is adopted for each kind of attack to carry out oversampling processing;
B. an undersampling algorithm based on bagging voting: for the data set after the oversampling processing, equally dividing most types of samples into N groups, wherein N is an odd number; and respectively pairing with minority samples to obtain N groups of 1:1 sample sets, respectively training N neural network models by using the N groups of 1:1 sample sets, and finally obtaining a prediction result which is a voting result of the N models.
Step S5, the specific structure of the initial attack perception identification model based on the convolutional neural network is convolutional layer 1: the size of a convolution kernel is 4 x 1, the number of channels is 8, and padding is same; a pooling layer 1: the size of the pooling window is 2 × 1, the step size is 2 × 1, and the padding is same; and (3) convolutional layer 2: the convolution kernel size is 4 x 1, the number of channels is 8, the number of channels is 16, and the padding is same; and (3) a pooling layer 2: the size of the pooling window is 2 × 1, the step size is 2 × 1, and the padding is same; full connection layer 1: a size of 1024; full connection layer 2: a size of 4; the adopted activation function is leak _ relu; the adopted loss function is a cross entropy loss function; the adopted optimizer is Adadeltaoptimizer, and the learning _ rate parameter is 1; the keep _ prob parameter of the neural network is chosen to be 0.5.
The receiving side performs reassembly on the received data in step S8, specifically, the receiving side deletes the data identified as abnormal from the received original data, and directly connects the remaining normal data to be the final reassembled data.
The invention also provides a system for realizing the continuous variable quantum key communication method based on attack perception and defense, which comprises a sending end and a receiving end; the transmitting end comprises a transmitting end pulse laser, a transmitting end beam splitter, a transmitting end electro-optic intensity modulator, a transmitting end electro-optic phase modulator, a transmitting end adjustable attenuator and a transmitting end polarization coupler; the transmitting end pulse laser, the transmitting end beam splitter, the transmitting end electro-optic intensity modulator, the transmitting end electro-optic phase modulator, the transmitting end adjustable attenuator and the transmitting end polarization coupler are sequentially connected in series; meanwhile, a second output end of the beam splitter at the sending end is connected with a second input end of the polarization coupler at the sending end; the output end of the polarization coupler of the transmitting end is the output end of the transmitting end; a sending end pulse laser generates a coherent light pulse signal and transmits the coherent light pulse signal to a sending end beam splitter; the transmitting end beam splitter is used for separating the received coherent optical pulse signal into a local oscillation optical signal and a signal optical signal, uploading the signal optical signal to the transmitting end electric light intensity modulator, and uploading the local oscillation optical signal to the transmitting end polarization coupler; the transmitting end electro-optical intensity modulator is used for carrying out amplitude modulation on the separated signal optical signals and uploading the signal optical signals to the transmitting end electro-optical phase modulator; the transmitting end electro-optical phase modulator is used for carrying out phase modulation on the received signal under randomly generated 0 or pi and uploading the modulated result to the transmitting end adjustable attenuator; the transmitting end adjustable attenuator is used for attenuating the received signal energy to quantum level and inputting the signal energy to the transmitting end polarization coupler; the transmitting end polarization coupler is used for coupling the received processed signal optical signal with an original local oscillation optical signal and transmitting the coupled signal to a receiving end through a quantum channel; the receiving end comprises a receiving end polarization beam splitter, a receiving end electro-optic phase modulator, a receiving end beam splitter, a receiving end homodyne detector and a receiving end attack perception and defense module; the receiving end polarization beam splitter, the receiving end electro-optic phase modulator, the receiving end beam splitter, the receiving end homodyne detector and the receiving end attack sensing and defense module are sequentially connected in series; meanwhile, a second output end of the receiving end polarization beam splitter is connected with a second input end of the receiving end beam splitter; the receiving end polarization beam splitter is used for separating the received signal into local oscillation light and signal light; the signal light is directly sent to a receiving end beam splitter, and the local oscillation light is uploaded to a receiving end electro-optical phase modulator; the receiving end electro-optical phase modulator is used for randomly selecting a measuring base from the received local oscillation light, measuring the measuring base and uploading the measured local oscillation light to the receiving end beam splitter; the receiving end beam splitter is used for coupling the received processed local oscillation light with the original signal light and inputting a coupled signal to a receiving end homodyne detector; the receiving end homodyne detector is used for carrying out homodyne detection on the received signals and uploading the detection result to the receiving end attack sensing and defending module; the receiving end attack perception and defense module is used for adopting the continuous variable quantum key communication method based on attack perception and defense to perform perception recognition and processing on the received signals, so that the receiving end obtains the final data sent by the sending end.
The sending end pulse laser adopts a picosecond optical pulse generator with the model number of Thorlabs OPG 1015; the electro-optical intensity modulator at the transmitting end adopts an electro-optical intensity modulator with the model number of Photoline MX-LN-10; the electro-optical phase modulator at the transmitting end and the electro-optical phase modulator at the receiving end both adopt the electro-optical phase modulators with the model number of MPZ-LN-10; the transmitting end polarization coupler adopts a polarization beam coupler with the model number of Thorlabs PBC980 PM-FC; the receiving end homodyne detector adopts a balanced amplification photoelectric detector with the model number of Thorlabs PDA 435A.
According to the attack perception and defense-based continuous variable quantum key communication method and system, the equalized samples are used for training the convolutional neural network, the trained model can mark and identify corresponding abnormal parts in a bit stream under the condition of limited samples, corresponding data packets are selectively discarded according to the marking result, and the remaining normal data packets are reconnected into the bit stream; therefore, the invention reduces the average access noise of the quantum key distribution system, saves the resource waste caused by discarding the whole string of bit streams in the prior art, can sense and identify the attack of the continuous variable quantum key communication process, and carries out corresponding communication bit stream processing, and has high identification accuracy, high communication efficiency, stability and reliability.
Drawings
FIG. 1 is a schematic process flow diagram of the process of the present invention.
FIG. 2 is a functional block diagram of the system of the present invention.
Detailed Description
FIG. 1 is a schematic flow chart of the method of the present invention: the continuous variable quantum key communication method based on attack perception and defense provided by the invention comprises the following steps:
s1, in a normal communication state and a specific attacked communication state, a sender sends data to a receiver and calibrates the communication state of the data when sending the data; the communication state under the specific attack specifically includes local oscillator optical attack (LO intensity attack), Calibration attack (Calibration attack), and Saturation attack (Saturation attack).
S2, a receiving party receives data sent by a sending party and divides the received data into a plurality of data packets according to a set length;
s3, dividing the data packet obtained in the step S2 into preliminary training data and test data;
s4, carrying out data equalization processing on the preliminary training data obtained in the step S3 to obtain training data; specifically, the data equalization processing is carried out by adopting the following steps:
A. an oversampling algorithm based on the mahakil algorithm: for a few classes of samples
Figure BDA0002936588690000061
For each minority class sample, according to the formula
Figure BDA0002936588690000062
Calculating a mahalanobis distance, where μ is the mean of the sample distribution and S is the covariance matrix of the sample distribution; the samples are then sorted according to mahalanobis distance and divided into two parts:
Figure BDA0002936588690000071
and
Figure BDA0002936588690000072
the new data of the n +1 th generation is composed of the parent data of the n-th generation and
Figure BDA0002936588690000073
or
Figure BDA0002936588690000074
Obtaining an average value; performing the process in a loop until the ratio of the minority samples and the majority samples reaches 1: N, wherein N is an odd number, and adding the generated data into the data set to obtain a balanced data set
Figure BDA0002936588690000075
The same flow is adopted for each kind of attack to carry out oversampling processing;
B. an undersampling algorithm based on bagging voting: for the data set after the oversampling processing, equally dividing most types of samples into N groups, wherein N is an odd number; respectively matching with minority samples to obtain N groups of 1:1 sample sets, respectively training N neural network models by using the N groups of 1:1 sample sets, wherein the final prediction result is the voting result of the N models;
s5, constructing an attack perception preliminary identification model based on a convolutional neural network; the specific structure is convolution layer 1 (convolution kernel size is 4 x 1, channel number is 1, number is 8, padding is same); pooling layer 1 (pooling window size 2 x 1, step size 2 x 1, padding same name); convolution layer 2 (convolution kernel size 4 × 1, number of channels 8, number of channels 16, padding same name); pooling layer 2 (pooling window size 2 x 1, step size 2 x 1, padding same name); fully connected layer 1 (1024 in size); fully connected layer 2 (size 4); the adopted activation function is leak _ relu; the adopted loss function is a cross entropy loss function; the adopted optimizer is Adadeltaoptimizer (the learning _ rate parameter is 1); selecting 0.5 for the keep _ prob parameter of the neural network; meanwhile, the Adadelta optimizer can automatically adjust the learning rate, and other parameters which are not described are default parameters;
s6, training the initial attack perception recognition model based on the convolutional neural network constructed in the step S5 by adopting the training data obtained in the step S4, and testing by adopting the test data obtained in the step S3 to obtain a final attack perception recognition model based on the convolutional neural network;
s7, carrying out attack perception recognition on the communication between the sender and the receiver by adopting the attack perception recognition model based on the convolutional neural network obtained in the step S6;
s8, according to the attack perception identification result of the step S7, the receiver recombines the received data, so as to obtain the final data sent by the sender; specifically, the receiver deletes the data identified as abnormal from the received original data, and directly connects the remaining normal data to be the final recombined data.
FIG. 2 is a functional block diagram of the system of the present invention: the invention also provides a system for realizing the continuous variable quantum key communication method based on attack perception and defense, which comprises a sending end and a receiving end; the transmitting end comprises a transmitting end pulse laser, a transmitting end beam splitter, a transmitting end electro-optic intensity modulator, a transmitting end electro-optic phase modulator, a transmitting end adjustable attenuator and a transmitting end polarization coupler; the transmitting end pulse laser, the transmitting end beam splitter, the transmitting end electro-optic intensity modulator, the transmitting end electro-optic phase modulator, the transmitting end adjustable attenuator and the transmitting end polarization coupler are sequentially connected in series; meanwhile, a second output end of the beam splitter at the sending end is connected with a second input end of the polarization coupler at the sending end; the output end of the polarization coupler of the transmitting end is the output end of the transmitting end; a sending end pulse laser generates a coherent light pulse signal and transmits the coherent light pulse signal to a sending end beam splitter; the transmitting end beam splitter is used for separating the received coherent optical pulse signal into a local oscillation optical signal and a signal optical signal, uploading the signal optical signal to the transmitting end electric light intensity modulator, and uploading the local oscillation optical signal to the transmitting end polarization coupler; the transmitting end electro-optical intensity modulator is used for carrying out amplitude modulation on the separated signal optical signals and uploading the signal optical signals to the transmitting end electro-optical phase modulator; the transmitting end electro-optical phase modulator is used for carrying out phase modulation on the received signal under randomly generated 0 or pi and uploading the modulated result to the transmitting end adjustable attenuator; the transmitting end adjustable attenuator is used for attenuating the received signal energy to quantum level and inputting the signal energy to the transmitting end polarization coupler; the transmitting end polarization coupler is used for coupling the received processed signal optical signal with an original local oscillation optical signal and transmitting the coupled signal to a receiving end through a quantum channel; the receiving end comprises a receiving end polarization beam splitter, a receiving end electro-optic phase modulator, a receiving end beam splitter, a receiving end homodyne detector and a receiving end attack perception and defense module; the receiving end polarization beam splitter, the receiving end electro-optic phase modulator, the receiving end beam splitter, the receiving end homodyne detector and the receiving end attack sensing and defense module are sequentially connected in series; meanwhile, a second output end of the receiving end polarization beam splitter is connected with a second input end of the receiving end beam splitter; the receiving end polarization beam splitter is used for separating the received signal into local oscillation light and signal light; the signal light is directly sent to a receiving end beam splitter, and the local oscillation light is uploaded to a receiving end electro-optical phase modulator; the receiving end electro-optical phase modulator is used for randomly selecting a measuring base from the received local oscillation light, measuring the measuring base and uploading the measured local oscillation light to the receiving end beam splitter; the receiving end beam splitter is used for coupling the received processed local oscillation light with the original signal light and inputting a coupled signal to a receiving end homodyne detector; the receiving end homodyne detector is used for carrying out homodyne detection on the received signals and uploading the detection result to the receiving end attack sensing and defending module; the receiving end attack perception and defense module is used for adopting the continuous variable quantum key communication method based on attack perception and defense to perform perception recognition and processing on the received signals, so that the receiving end obtains the final data sent by the sending end.
In specific implementation, the sending end pulse laser adopts a picosecond optical pulse generator with the model number of Thorlabs OPG 1015; the electro-optical intensity modulator at the transmitting end adopts an electro-optical intensity modulator with the model number of Photoline MX-LN-10; the electro-optical phase modulator at the transmitting end and the electro-optical phase modulator at the receiving end both adopt the electro-optical phase modulators with the model number of MPZ-LN-10; the transmitting end polarization coupler adopts a polarization beam coupler with the model number of Thorlabs PBC980 PM-FC; the receiving end homodyne detector adopts a balanced amplification photoelectric detector with the model number of Thorlabs PDA 435A.

Claims (4)

1. A continuous variable quantum key communication method based on attack perception and defense comprises the following steps:
s1, in a normal communication state and a specific attacked communication state, a sender sends data to a receiver and calibrates the communication state of the data when sending the data; the communication state under the specific attack specifically comprises local oscillator light attack, calibration attack and saturation attack;
s2, a receiving party receives data sent by a sending party and divides the received data into a plurality of data packets according to a set length;
s3, dividing the data packet obtained in the step S2 into preliminary training data and test data;
s4, carrying out data equalization processing on the preliminary training data obtained in the step S3 to obtain training data; specifically, the data equalization processing is carried out by adopting the following steps:
A. an oversampling algorithm based on the mahakil algorithm: for a few classes of samples
Figure FDA0003286794330000011
bin ∈ (LO, Cal, Sat), for each of a few class samples, according to the formula
Figure FDA0003286794330000012
Calculating a mahalanobis distance, where μ is the mean of the sample distribution and S is the covariance matrix of the sample distribution; the samples are then sorted according to mahalanobis distance and divided into two parts:
Figure FDA0003286794330000013
and
Figure FDA0003286794330000014
the new data of the n +1 th generation is composed of the parent data of the n-th generation and
Figure FDA0003286794330000015
or
Figure FDA0003286794330000016
Obtaining an average value; performing the process in a loop until the ratio of the minority samples and the majority samples reaches 1: N, wherein N is an odd number, and adding the generated data into the data set to obtain a balanced data set
Figure FDA0003286794330000017
The same flow is adopted for each kind of attack to carry out oversampling processing;
B. an undersampling algorithm based on bagging voting: for the data set after the oversampling processing, equally dividing most types of samples into N groups, wherein N is an odd number; respectively matching with minority samples to obtain N groups of 1:1 sample sets, respectively training N neural network models by using the N groups of 1:1 sample sets, wherein the final prediction result is the voting result of the N models;
s5, constructing an attack perception preliminary identification model based on a convolutional neural network; the concrete structure is that the convolution layer 1: the size of a convolution kernel is 4 x 1, the number of channels is 8, and padding is same; a pooling layer 1: the size of the pooling window is 2 × 1, the step size is 2 × 1, and the padding is same; and (3) convolutional layer 2: the convolution kernel size is 4 x 1, the number of channels is 8, the number of channels is 16, and the padding is same; and (3) a pooling layer 2: the size of the pooling window is 2 × 1, the step size is 2 × 1, and the padding is same; full connection layer 1: a size of 1024; full connection layer 2: a size of 4; the adopted activation function is leak _ relu; the adopted loss function is a cross entropy loss function; the adopted optimizer is Adadeltaoptimizer, and the learning _ rate parameter is 1; selecting 0.5 for the keep _ prob parameter of the neural network;
s6, training the initial attack perception recognition model based on the convolutional neural network constructed in the step S5 by adopting the training data obtained in the step S4, and testing by adopting the test data obtained in the step S3 to obtain a final attack perception recognition model based on the convolutional neural network;
s7, carrying out attack perception recognition on the communication between the sender and the receiver by adopting the attack perception recognition model based on the convolutional neural network obtained in the step S6;
and S8, according to the attack perception identification result in the step S7, the receiver recombines the received data, thereby obtaining the final data sent by the sender.
2. The attack awareness and defense-based continuous variable quantum key communication method according to claim 1, wherein the receiving party performs reassembly on the received data, specifically, the receiving party deletes the data identified as abnormal from the received original data, and directly connects the remaining normal data to serve as the final reassembled data.
3. A system for implementing the attack awareness and defense-based continuous variable quantum key communication method according to claim 1 or 2, which is characterized by comprising a sending end and a receiving end; the transmitting end comprises a transmitting end pulse laser, a transmitting end beam splitter, a transmitting end electro-optic intensity modulator, a transmitting end electro-optic phase modulator, a transmitting end adjustable attenuator and a transmitting end polarization coupler; the transmitting end pulse laser, the transmitting end beam splitter, the transmitting end electro-optic intensity modulator, the transmitting end electro-optic phase modulator, the transmitting end adjustable attenuator and the transmitting end polarization coupler are sequentially connected in series; meanwhile, a second output end of the beam splitter at the sending end is connected with a second input end of the polarization coupler at the sending end; the output end of the polarization coupler of the transmitting end is the output end of the transmitting end; a sending end pulse laser generates a coherent light pulse signal and transmits the coherent light pulse signal to a sending end beam splitter; the transmitting end beam splitter is used for separating the received coherent optical pulse signal into a local oscillation optical signal and a signal optical signal, uploading the signal optical signal to the transmitting end electric light intensity modulator, and uploading the local oscillation optical signal to the transmitting end polarization coupler; the transmitting end electro-optical intensity modulator is used for carrying out amplitude modulation on the separated signal optical signals and uploading the signal optical signals to the transmitting end electro-optical phase modulator; the transmitting end electro-optical phase modulator is used for carrying out phase modulation on the received signal under randomly generated 0 or pi and uploading the modulated result to the transmitting end adjustable attenuator; the transmitting end adjustable attenuator is used for attenuating the received signal energy to quantum level and inputting the signal energy to the transmitting end polarization coupler; the transmitting end polarization coupler is used for coupling the received processed signal optical signal with an original local oscillation optical signal and transmitting the coupled signal to a receiving end through a quantum channel; the receiving end comprises a receiving end polarization beam splitter, a receiving end electro-optic phase modulator, a receiving end beam splitter, a receiving end homodyne detector and a receiving end attack perception and defense module; the receiving end polarization beam splitter, the receiving end electro-optic phase modulator, the receiving end beam splitter, the receiving end homodyne detector and the receiving end attack sensing and defense module are sequentially connected in series; meanwhile, a second output end of the receiving end polarization beam splitter is connected with a second input end of the receiving end beam splitter; the receiving end polarization beam splitter is used for separating the received signal into local oscillation light and signal light; the signal light is directly sent to a receiving end beam splitter, and the local oscillation light is uploaded to a receiving end electro-optical phase modulator; the receiving end electro-optical phase modulator is used for randomly selecting a measuring base from the received local oscillation light, measuring the measuring base and uploading the measured local oscillation light to the receiving end beam splitter; the receiving end beam splitter is used for coupling the received processed local oscillation light with the original signal light and inputting a coupled signal to a receiving end homodyne detector; the receiving end homodyne detector is used for carrying out homodyne detection on the received signals and uploading the detection result to the receiving end attack sensing and defending module; the receiving end attack perception and defense module is used for adopting the continuous variable quantum key communication method based on attack perception and defense to perform perception recognition and processing on the received signals, so that the receiving end obtains the final data sent by the sending end.
4. The system of claim 3, wherein said transmitting side pulse laser employs a picosecond optical pulse generator model Thorlabs OPG 1015; the electro-optical intensity modulator at the transmitting end adopts an electro-optical intensity modulator with the model number of Photoline MX-LN-10; the electro-optical phase modulator at the transmitting end and the electro-optical phase modulator at the receiving end both adopt the electro-optical phase modulators with the model number of MPZ-LN-10; the transmitting end polarization coupler adopts a polarization beam coupler with the model number of Thorlabs PBC980 PM-FC; the receiving end homodyne detector adopts a balanced amplification photoelectric detector with the model number of Thorlabs PDA 435A.
CN202110160921.4A 2021-02-05 2021-02-05 Continuous variable quantum key communication method and system based on attack perception and defense Active CN112787815B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110160921.4A CN112787815B (en) 2021-02-05 2021-02-05 Continuous variable quantum key communication method and system based on attack perception and defense

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110160921.4A CN112787815B (en) 2021-02-05 2021-02-05 Continuous variable quantum key communication method and system based on attack perception and defense

Publications (2)

Publication Number Publication Date
CN112787815A CN112787815A (en) 2021-05-11
CN112787815B true CN112787815B (en) 2021-11-30

Family

ID=75760941

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110160921.4A Active CN112787815B (en) 2021-02-05 2021-02-05 Continuous variable quantum key communication method and system based on attack perception and defense

Country Status (1)

Country Link
CN (1) CN112787815B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114499861B (en) * 2022-03-30 2022-07-12 浙江九州量子信息技术股份有限公司 Quantum key cloud security situation sensing method based on machine learning

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101010899A (en) * 2004-08-31 2007-08-01 松下电器产业株式会社 Data communication apparatus
US10891555B2 (en) * 2018-08-07 2021-01-12 Nxgen Partners Ip, Llc Universal quantum computer, communication, QKD security and quantum networks using OAM Qu-dits with digital light processing
GB201720063D0 (en) * 2017-12-01 2018-01-17 Cambridge Entpr Ltd Quantum security systems
CN110011786B (en) * 2019-03-20 2022-03-18 中国电子科技集团公司第三十研究所 High-safety IP secret communication method
CN110190959B (en) * 2019-06-28 2021-05-07 中南大学 Encryption and decryption method based on continuous variable quantum neural network
CN110719128A (en) * 2019-09-30 2020-01-21 安徽问天量子科技股份有限公司 Device and method for detecting sensible positioning of optical fiber eavesdropping
CN110880971B (en) * 2019-11-22 2021-01-08 中南大学 Chirp-based continuous variable quantum key distribution method and system
CN111988130B (en) * 2020-08-18 2022-06-07 中南大学 Attack detection method for device defects in discrete quantum key distribution
CN111970280B (en) * 2020-08-18 2022-05-06 中南大学 Attack detection method of continuous variable quantum key distribution system
CN111970279B (en) * 2020-08-18 2022-06-07 中南大学 Continuous variable quantum key distribution attack detection method and detection system thereof
CN112134683B (en) * 2020-09-22 2022-02-15 中南大学 Attack detection method of discrete variable quantum key distribution system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Security of post-selection based continuous variable quantum key distribution against arbitrary attacks";Nathan Walk et al.;《CLEO: 2011 - Laser Science to Photonic Applications》;20110506;全文 *
基于等效信道的物理层认证和密钥分发机制;戴峤等;《中国科学:信息科学》;20141220(第12期);全文 *

Also Published As

Publication number Publication date
CN112787815A (en) 2021-05-11

Similar Documents

Publication Publication Date Title
CN111970279B (en) Continuous variable quantum key distribution attack detection method and detection system thereof
CN109039604B (en) Passive decoy state quantum digital signature method
CN106788706B (en) Continuous variable quantum key distribution method capable of resisting actual attack
Dixon et al. Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate
CN106850196B (en) Improved continuous variable quantum key distribution method capable of resisting practical attack
CN109687964B (en) Novel data coordination method for continuous variable quantum key distribution
CN113225184A (en) Passive decoy state modulation reference system-independent quantum key distribution system and method
CN112953973B (en) Hybrid attack detection method for continuous variable quantum key distribution system
CN112787815B (en) Continuous variable quantum key communication method and system based on attack perception and defense
Yang et al. Measurement-device-independent entanglement-based quantum key distribution
Liu et al. Source-independent quantum random number generator against tailored detector blinding attacks
CN112929163B (en) Measuring device-independent continuous variable quantum key distribution method and system
CN112187442A (en) Telemetry data analysis system and method based on privacy protection
CN116319010B (en) Method for detecting QKD system defect and hacking based on machine learning
CN113452523B (en) Abnormal communication detection method for continuous variable quantum key distribution process
RU2496239C1 (en) Method for steganographic transmission of information through main optical channel and apparatus for implementing said method
CN115361118A (en) Loss tolerant reference frame and measuring device independent quantum key distribution method
CN114268433A (en) Nonlinear compensation method of high-speed continuous variable quantum key distribution system
Li et al. Effects of measurement dependence on generalized Clauser-Horne-Shimony-Holt Bell test in the single-run and multiple-run scenarios
Paglierani et al. A primer on underwater quantum key distribution
CN117714057B (en) Multi-field measurement device independent quantum conference key negotiation method and system
CN106789036B (en) Quantum key distribution system physical modeling method oriented to security analysis
CN114124544B (en) Quantum attack detection method and quantum key distribution method based on clustering algorithm
Chapman et al. Entanglement-based quantum digital signatures over a deployed campus network
CN219394858U (en) Quantum secret sharing system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant