CN112787815B - Continuous variable quantum key communication method and system based on attack perception and defense - Google Patents
Continuous variable quantum key communication method and system based on attack perception and defense Download PDFInfo
- Publication number
- CN112787815B CN112787815B CN202110160921.4A CN202110160921A CN112787815B CN 112787815 B CN112787815 B CN 112787815B CN 202110160921 A CN202110160921 A CN 202110160921A CN 112787815 B CN112787815 B CN 112787815B
- Authority
- CN
- China
- Prior art keywords
- data
- attack
- receiving end
- transmitting end
- signal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
- H04L9/0858—Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Computational Linguistics (AREA)
- Software Systems (AREA)
- Mathematical Physics (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Artificial Intelligence (AREA)
- Biomedical Technology (AREA)
- Biophysics (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- General Engineering & Computer Science (AREA)
- Molecular Biology (AREA)
- Computing Systems (AREA)
- Electromagnetism (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Optical Communication System (AREA)
Abstract
The invention discloses a continuous variable quantum key communication method based on attack perception and defense, which comprises the steps that a sender sends data and calibrates a communication state under the normal open and specific attack communication states; a receiver receives data, divides the data into data packets and carries out data equalization processing to obtain training data and test data; constructing an attack perception preliminary identification model based on a convolutional neural network, and training and testing to obtain the attack perception identification model based on the convolutional neural network; and the receiver adopts an attack perception identification model based on a convolutional neural network to carry out attack perception identification and recombine the data to obtain the final sending data. The invention also discloses a system for realizing the continuous variable quantum key communication method based on attack perception and defense. The invention can sense and identify the attack of the continuous variable quantum key communication process and carry out corresponding communication bit stream processing, and has high identification accuracy, high communication efficiency, stability and reliability.
Description
Technical Field
The invention belongs to the field of quantum key communication, and particularly relates to a continuous variable quantum key communication method and system based on attack perception and defense.
Background
With the development of economic technology and the improvement of living standard of people, the safety of data transmission has been paid extensive attention and important research. In recent years, Continuous Variable Quantum Key Distribution (CVQKD) has been developed rapidly, and great progress has been made in theoretical research and experimental research. Various CVQKD protocols have been proposed, such as GG02 protocol, compression status protocol, one-dimensional protocol, etc.; CVQKD has become an important research and development direction in the field of quantum communication. CVQKD allows a sender Alice and a receiver Bob in two places to exchange secure keys over an unknown channel, theoretically proving resistant to general collective and coherent attacks.
However, the actual implementation is not as theoretical: the actual system has some loopholes, and the copper leakage causes deviation between the theoretical CVQKD system and the actual CVQKD system, thereby providing security loopholes for an eavesdropper to attack. In practical application, an attacker Eve may attack a transmitted bit stream with one or more attacks, and a receiving end Bob often does not process the original key (raw key) after receiving the original key, but selects to discard the whole bit stream after finding the attack. However, this method of directly discarding the whole bit stream is not only very rough, but also wastes a lot of time and resources.
Disclosure of Invention
One of the purposes of the invention is to provide a continuous variable quantum key communication method based on attack perception and defense, which can sense and identify the attack of the continuous variable quantum key communication process, process the corresponding communication bit stream, and has high identification accuracy, high communication efficiency and stability and reliability.
The invention also aims to provide a system for realizing the attack perception and defense-based continuous variable quantum key communication method.
The continuous variable quantum key communication method based on attack perception and defense provided by the invention comprises the following steps:
s1, in a normal communication state and a specific attacked communication state, a sender sends data to a receiver and calibrates the communication state of the data when sending the data;
s2, a receiving party receives data sent by a sending party and divides the received data into a plurality of data packets according to a set length;
s3, dividing the data packet obtained in the step S2 into preliminary training data and test data;
s4, carrying out data equalization processing on the preliminary training data obtained in the step S3 to obtain training data;
s5, constructing an attack perception preliminary identification model based on a convolutional neural network;
s6, training the initial attack perception recognition model based on the convolutional neural network constructed in the step S5 by adopting the training data obtained in the step S4, and testing by adopting the test data obtained in the step S3 to obtain a final attack perception recognition model based on the convolutional neural network;
s7, carrying out attack perception recognition on the communication between the sender and the receiver by adopting the attack perception recognition model based on the convolutional neural network obtained in the step S6;
and S8, according to the attack perception identification result in the step S7, the receiver recombines the received data, thereby obtaining the final data sent by the sender.
The communication state affected by the specific attack in step S1 specifically includes local oscillator optical attack (LO intensity attack), Calibration attack (Calibration attack), and Saturation attack (Saturation attack).
The data equalization processing in step S4 is specifically performed by the following steps:
A. an oversampling algorithm based on the mahakil algorithm: for a few classes of samplesFor each minority class sample, according to the formulaCalculating a mahalanobis distance, where μ is the mean of the sample distribution and S is the covariance matrix of the sample distribution; the samples are then sorted according to mahalanobis distance and divided into two parts:andthe new data of the n +1 th generation is composed of the parent data of the n-th generation andorObtaining an average value; performing the process in a loop until the ratio of the minority samples and the majority samples reaches 1: N, wherein N is an odd number, and adding the generated data into the data set to obtain a balanced data setThe same flow is adopted for each kind of attack to carry out oversampling processing;
B. an undersampling algorithm based on bagging voting: for the data set after the oversampling processing, equally dividing most types of samples into N groups, wherein N is an odd number; and respectively pairing with minority samples to obtain N groups of 1:1 sample sets, respectively training N neural network models by using the N groups of 1:1 sample sets, and finally obtaining a prediction result which is a voting result of the N models.
Step S5, the specific structure of the initial attack perception identification model based on the convolutional neural network is convolutional layer 1: the size of a convolution kernel is 4 x 1, the number of channels is 8, and padding is same; a pooling layer 1: the size of the pooling window is 2 × 1, the step size is 2 × 1, and the padding is same; and (3) convolutional layer 2: the convolution kernel size is 4 x 1, the number of channels is 8, the number of channels is 16, and the padding is same; and (3) a pooling layer 2: the size of the pooling window is 2 × 1, the step size is 2 × 1, and the padding is same; full connection layer 1: a size of 1024; full connection layer 2: a size of 4; the adopted activation function is leak _ relu; the adopted loss function is a cross entropy loss function; the adopted optimizer is Adadeltaoptimizer, and the learning _ rate parameter is 1; the keep _ prob parameter of the neural network is chosen to be 0.5.
The receiving side performs reassembly on the received data in step S8, specifically, the receiving side deletes the data identified as abnormal from the received original data, and directly connects the remaining normal data to be the final reassembled data.
The invention also provides a system for realizing the continuous variable quantum key communication method based on attack perception and defense, which comprises a sending end and a receiving end; the transmitting end comprises a transmitting end pulse laser, a transmitting end beam splitter, a transmitting end electro-optic intensity modulator, a transmitting end electro-optic phase modulator, a transmitting end adjustable attenuator and a transmitting end polarization coupler; the transmitting end pulse laser, the transmitting end beam splitter, the transmitting end electro-optic intensity modulator, the transmitting end electro-optic phase modulator, the transmitting end adjustable attenuator and the transmitting end polarization coupler are sequentially connected in series; meanwhile, a second output end of the beam splitter at the sending end is connected with a second input end of the polarization coupler at the sending end; the output end of the polarization coupler of the transmitting end is the output end of the transmitting end; a sending end pulse laser generates a coherent light pulse signal and transmits the coherent light pulse signal to a sending end beam splitter; the transmitting end beam splitter is used for separating the received coherent optical pulse signal into a local oscillation optical signal and a signal optical signal, uploading the signal optical signal to the transmitting end electric light intensity modulator, and uploading the local oscillation optical signal to the transmitting end polarization coupler; the transmitting end electro-optical intensity modulator is used for carrying out amplitude modulation on the separated signal optical signals and uploading the signal optical signals to the transmitting end electro-optical phase modulator; the transmitting end electro-optical phase modulator is used for carrying out phase modulation on the received signal under randomly generated 0 or pi and uploading the modulated result to the transmitting end adjustable attenuator; the transmitting end adjustable attenuator is used for attenuating the received signal energy to quantum level and inputting the signal energy to the transmitting end polarization coupler; the transmitting end polarization coupler is used for coupling the received processed signal optical signal with an original local oscillation optical signal and transmitting the coupled signal to a receiving end through a quantum channel; the receiving end comprises a receiving end polarization beam splitter, a receiving end electro-optic phase modulator, a receiving end beam splitter, a receiving end homodyne detector and a receiving end attack perception and defense module; the receiving end polarization beam splitter, the receiving end electro-optic phase modulator, the receiving end beam splitter, the receiving end homodyne detector and the receiving end attack sensing and defense module are sequentially connected in series; meanwhile, a second output end of the receiving end polarization beam splitter is connected with a second input end of the receiving end beam splitter; the receiving end polarization beam splitter is used for separating the received signal into local oscillation light and signal light; the signal light is directly sent to a receiving end beam splitter, and the local oscillation light is uploaded to a receiving end electro-optical phase modulator; the receiving end electro-optical phase modulator is used for randomly selecting a measuring base from the received local oscillation light, measuring the measuring base and uploading the measured local oscillation light to the receiving end beam splitter; the receiving end beam splitter is used for coupling the received processed local oscillation light with the original signal light and inputting a coupled signal to a receiving end homodyne detector; the receiving end homodyne detector is used for carrying out homodyne detection on the received signals and uploading the detection result to the receiving end attack sensing and defending module; the receiving end attack perception and defense module is used for adopting the continuous variable quantum key communication method based on attack perception and defense to perform perception recognition and processing on the received signals, so that the receiving end obtains the final data sent by the sending end.
The sending end pulse laser adopts a picosecond optical pulse generator with the model number of Thorlabs OPG 1015; the electro-optical intensity modulator at the transmitting end adopts an electro-optical intensity modulator with the model number of Photoline MX-LN-10; the electro-optical phase modulator at the transmitting end and the electro-optical phase modulator at the receiving end both adopt the electro-optical phase modulators with the model number of MPZ-LN-10; the transmitting end polarization coupler adopts a polarization beam coupler with the model number of Thorlabs PBC980 PM-FC; the receiving end homodyne detector adopts a balanced amplification photoelectric detector with the model number of Thorlabs PDA 435A.
According to the attack perception and defense-based continuous variable quantum key communication method and system, the equalized samples are used for training the convolutional neural network, the trained model can mark and identify corresponding abnormal parts in a bit stream under the condition of limited samples, corresponding data packets are selectively discarded according to the marking result, and the remaining normal data packets are reconnected into the bit stream; therefore, the invention reduces the average access noise of the quantum key distribution system, saves the resource waste caused by discarding the whole string of bit streams in the prior art, can sense and identify the attack of the continuous variable quantum key communication process, and carries out corresponding communication bit stream processing, and has high identification accuracy, high communication efficiency, stability and reliability.
Drawings
FIG. 1 is a schematic process flow diagram of the process of the present invention.
FIG. 2 is a functional block diagram of the system of the present invention.
Detailed Description
FIG. 1 is a schematic flow chart of the method of the present invention: the continuous variable quantum key communication method based on attack perception and defense provided by the invention comprises the following steps:
s1, in a normal communication state and a specific attacked communication state, a sender sends data to a receiver and calibrates the communication state of the data when sending the data; the communication state under the specific attack specifically includes local oscillator optical attack (LO intensity attack), Calibration attack (Calibration attack), and Saturation attack (Saturation attack).
S2, a receiving party receives data sent by a sending party and divides the received data into a plurality of data packets according to a set length;
s3, dividing the data packet obtained in the step S2 into preliminary training data and test data;
s4, carrying out data equalization processing on the preliminary training data obtained in the step S3 to obtain training data; specifically, the data equalization processing is carried out by adopting the following steps:
A. an oversampling algorithm based on the mahakil algorithm: for a few classes of samplesFor each minority class sample, according to the formulaCalculating a mahalanobis distance, where μ is the mean of the sample distribution and S is the covariance matrix of the sample distribution; the samples are then sorted according to mahalanobis distance and divided into two parts:andthe new data of the n +1 th generation is composed of the parent data of the n-th generation andorObtaining an average value; performing the process in a loop until the ratio of the minority samples and the majority samples reaches 1: N, wherein N is an odd number, and adding the generated data into the data set to obtain a balanced data setThe same flow is adopted for each kind of attack to carry out oversampling processing;
B. an undersampling algorithm based on bagging voting: for the data set after the oversampling processing, equally dividing most types of samples into N groups, wherein N is an odd number; respectively matching with minority samples to obtain N groups of 1:1 sample sets, respectively training N neural network models by using the N groups of 1:1 sample sets, wherein the final prediction result is the voting result of the N models;
s5, constructing an attack perception preliminary identification model based on a convolutional neural network; the specific structure is convolution layer 1 (convolution kernel size is 4 x 1, channel number is 1, number is 8, padding is same); pooling layer 1 (pooling window size 2 x 1, step size 2 x 1, padding same name); convolution layer 2 (convolution kernel size 4 × 1, number of channels 8, number of channels 16, padding same name); pooling layer 2 (pooling window size 2 x 1, step size 2 x 1, padding same name); fully connected layer 1 (1024 in size); fully connected layer 2 (size 4); the adopted activation function is leak _ relu; the adopted loss function is a cross entropy loss function; the adopted optimizer is Adadeltaoptimizer (the learning _ rate parameter is 1); selecting 0.5 for the keep _ prob parameter of the neural network; meanwhile, the Adadelta optimizer can automatically adjust the learning rate, and other parameters which are not described are default parameters;
s6, training the initial attack perception recognition model based on the convolutional neural network constructed in the step S5 by adopting the training data obtained in the step S4, and testing by adopting the test data obtained in the step S3 to obtain a final attack perception recognition model based on the convolutional neural network;
s7, carrying out attack perception recognition on the communication between the sender and the receiver by adopting the attack perception recognition model based on the convolutional neural network obtained in the step S6;
s8, according to the attack perception identification result of the step S7, the receiver recombines the received data, so as to obtain the final data sent by the sender; specifically, the receiver deletes the data identified as abnormal from the received original data, and directly connects the remaining normal data to be the final recombined data.
FIG. 2 is a functional block diagram of the system of the present invention: the invention also provides a system for realizing the continuous variable quantum key communication method based on attack perception and defense, which comprises a sending end and a receiving end; the transmitting end comprises a transmitting end pulse laser, a transmitting end beam splitter, a transmitting end electro-optic intensity modulator, a transmitting end electro-optic phase modulator, a transmitting end adjustable attenuator and a transmitting end polarization coupler; the transmitting end pulse laser, the transmitting end beam splitter, the transmitting end electro-optic intensity modulator, the transmitting end electro-optic phase modulator, the transmitting end adjustable attenuator and the transmitting end polarization coupler are sequentially connected in series; meanwhile, a second output end of the beam splitter at the sending end is connected with a second input end of the polarization coupler at the sending end; the output end of the polarization coupler of the transmitting end is the output end of the transmitting end; a sending end pulse laser generates a coherent light pulse signal and transmits the coherent light pulse signal to a sending end beam splitter; the transmitting end beam splitter is used for separating the received coherent optical pulse signal into a local oscillation optical signal and a signal optical signal, uploading the signal optical signal to the transmitting end electric light intensity modulator, and uploading the local oscillation optical signal to the transmitting end polarization coupler; the transmitting end electro-optical intensity modulator is used for carrying out amplitude modulation on the separated signal optical signals and uploading the signal optical signals to the transmitting end electro-optical phase modulator; the transmitting end electro-optical phase modulator is used for carrying out phase modulation on the received signal under randomly generated 0 or pi and uploading the modulated result to the transmitting end adjustable attenuator; the transmitting end adjustable attenuator is used for attenuating the received signal energy to quantum level and inputting the signal energy to the transmitting end polarization coupler; the transmitting end polarization coupler is used for coupling the received processed signal optical signal with an original local oscillation optical signal and transmitting the coupled signal to a receiving end through a quantum channel; the receiving end comprises a receiving end polarization beam splitter, a receiving end electro-optic phase modulator, a receiving end beam splitter, a receiving end homodyne detector and a receiving end attack perception and defense module; the receiving end polarization beam splitter, the receiving end electro-optic phase modulator, the receiving end beam splitter, the receiving end homodyne detector and the receiving end attack sensing and defense module are sequentially connected in series; meanwhile, a second output end of the receiving end polarization beam splitter is connected with a second input end of the receiving end beam splitter; the receiving end polarization beam splitter is used for separating the received signal into local oscillation light and signal light; the signal light is directly sent to a receiving end beam splitter, and the local oscillation light is uploaded to a receiving end electro-optical phase modulator; the receiving end electro-optical phase modulator is used for randomly selecting a measuring base from the received local oscillation light, measuring the measuring base and uploading the measured local oscillation light to the receiving end beam splitter; the receiving end beam splitter is used for coupling the received processed local oscillation light with the original signal light and inputting a coupled signal to a receiving end homodyne detector; the receiving end homodyne detector is used for carrying out homodyne detection on the received signals and uploading the detection result to the receiving end attack sensing and defending module; the receiving end attack perception and defense module is used for adopting the continuous variable quantum key communication method based on attack perception and defense to perform perception recognition and processing on the received signals, so that the receiving end obtains the final data sent by the sending end.
In specific implementation, the sending end pulse laser adopts a picosecond optical pulse generator with the model number of Thorlabs OPG 1015; the electro-optical intensity modulator at the transmitting end adopts an electro-optical intensity modulator with the model number of Photoline MX-LN-10; the electro-optical phase modulator at the transmitting end and the electro-optical phase modulator at the receiving end both adopt the electro-optical phase modulators with the model number of MPZ-LN-10; the transmitting end polarization coupler adopts a polarization beam coupler with the model number of Thorlabs PBC980 PM-FC; the receiving end homodyne detector adopts a balanced amplification photoelectric detector with the model number of Thorlabs PDA 435A.
Claims (4)
1. A continuous variable quantum key communication method based on attack perception and defense comprises the following steps:
s1, in a normal communication state and a specific attacked communication state, a sender sends data to a receiver and calibrates the communication state of the data when sending the data; the communication state under the specific attack specifically comprises local oscillator light attack, calibration attack and saturation attack;
s2, a receiving party receives data sent by a sending party and divides the received data into a plurality of data packets according to a set length;
s3, dividing the data packet obtained in the step S2 into preliminary training data and test data;
s4, carrying out data equalization processing on the preliminary training data obtained in the step S3 to obtain training data; specifically, the data equalization processing is carried out by adopting the following steps:
A. an oversampling algorithm based on the mahakil algorithm: for a few classes of samplesbin ∈ (LO, Cal, Sat), for each of a few class samples, according to the formulaCalculating a mahalanobis distance, where μ is the mean of the sample distribution and S is the covariance matrix of the sample distribution; the samples are then sorted according to mahalanobis distance and divided into two parts:andthe new data of the n +1 th generation is composed of the parent data of the n-th generation andorObtaining an average value; performing the process in a loop until the ratio of the minority samples and the majority samples reaches 1: N, wherein N is an odd number, and adding the generated data into the data set to obtain a balanced data setThe same flow is adopted for each kind of attack to carry out oversampling processing;
B. an undersampling algorithm based on bagging voting: for the data set after the oversampling processing, equally dividing most types of samples into N groups, wherein N is an odd number; respectively matching with minority samples to obtain N groups of 1:1 sample sets, respectively training N neural network models by using the N groups of 1:1 sample sets, wherein the final prediction result is the voting result of the N models;
s5, constructing an attack perception preliminary identification model based on a convolutional neural network; the concrete structure is that the convolution layer 1: the size of a convolution kernel is 4 x 1, the number of channels is 8, and padding is same; a pooling layer 1: the size of the pooling window is 2 × 1, the step size is 2 × 1, and the padding is same; and (3) convolutional layer 2: the convolution kernel size is 4 x 1, the number of channels is 8, the number of channels is 16, and the padding is same; and (3) a pooling layer 2: the size of the pooling window is 2 × 1, the step size is 2 × 1, and the padding is same; full connection layer 1: a size of 1024; full connection layer 2: a size of 4; the adopted activation function is leak _ relu; the adopted loss function is a cross entropy loss function; the adopted optimizer is Adadeltaoptimizer, and the learning _ rate parameter is 1; selecting 0.5 for the keep _ prob parameter of the neural network;
s6, training the initial attack perception recognition model based on the convolutional neural network constructed in the step S5 by adopting the training data obtained in the step S4, and testing by adopting the test data obtained in the step S3 to obtain a final attack perception recognition model based on the convolutional neural network;
s7, carrying out attack perception recognition on the communication between the sender and the receiver by adopting the attack perception recognition model based on the convolutional neural network obtained in the step S6;
and S8, according to the attack perception identification result in the step S7, the receiver recombines the received data, thereby obtaining the final data sent by the sender.
2. The attack awareness and defense-based continuous variable quantum key communication method according to claim 1, wherein the receiving party performs reassembly on the received data, specifically, the receiving party deletes the data identified as abnormal from the received original data, and directly connects the remaining normal data to serve as the final reassembled data.
3. A system for implementing the attack awareness and defense-based continuous variable quantum key communication method according to claim 1 or 2, which is characterized by comprising a sending end and a receiving end; the transmitting end comprises a transmitting end pulse laser, a transmitting end beam splitter, a transmitting end electro-optic intensity modulator, a transmitting end electro-optic phase modulator, a transmitting end adjustable attenuator and a transmitting end polarization coupler; the transmitting end pulse laser, the transmitting end beam splitter, the transmitting end electro-optic intensity modulator, the transmitting end electro-optic phase modulator, the transmitting end adjustable attenuator and the transmitting end polarization coupler are sequentially connected in series; meanwhile, a second output end of the beam splitter at the sending end is connected with a second input end of the polarization coupler at the sending end; the output end of the polarization coupler of the transmitting end is the output end of the transmitting end; a sending end pulse laser generates a coherent light pulse signal and transmits the coherent light pulse signal to a sending end beam splitter; the transmitting end beam splitter is used for separating the received coherent optical pulse signal into a local oscillation optical signal and a signal optical signal, uploading the signal optical signal to the transmitting end electric light intensity modulator, and uploading the local oscillation optical signal to the transmitting end polarization coupler; the transmitting end electro-optical intensity modulator is used for carrying out amplitude modulation on the separated signal optical signals and uploading the signal optical signals to the transmitting end electro-optical phase modulator; the transmitting end electro-optical phase modulator is used for carrying out phase modulation on the received signal under randomly generated 0 or pi and uploading the modulated result to the transmitting end adjustable attenuator; the transmitting end adjustable attenuator is used for attenuating the received signal energy to quantum level and inputting the signal energy to the transmitting end polarization coupler; the transmitting end polarization coupler is used for coupling the received processed signal optical signal with an original local oscillation optical signal and transmitting the coupled signal to a receiving end through a quantum channel; the receiving end comprises a receiving end polarization beam splitter, a receiving end electro-optic phase modulator, a receiving end beam splitter, a receiving end homodyne detector and a receiving end attack perception and defense module; the receiving end polarization beam splitter, the receiving end electro-optic phase modulator, the receiving end beam splitter, the receiving end homodyne detector and the receiving end attack sensing and defense module are sequentially connected in series; meanwhile, a second output end of the receiving end polarization beam splitter is connected with a second input end of the receiving end beam splitter; the receiving end polarization beam splitter is used for separating the received signal into local oscillation light and signal light; the signal light is directly sent to a receiving end beam splitter, and the local oscillation light is uploaded to a receiving end electro-optical phase modulator; the receiving end electro-optical phase modulator is used for randomly selecting a measuring base from the received local oscillation light, measuring the measuring base and uploading the measured local oscillation light to the receiving end beam splitter; the receiving end beam splitter is used for coupling the received processed local oscillation light with the original signal light and inputting a coupled signal to a receiving end homodyne detector; the receiving end homodyne detector is used for carrying out homodyne detection on the received signals and uploading the detection result to the receiving end attack sensing and defending module; the receiving end attack perception and defense module is used for adopting the continuous variable quantum key communication method based on attack perception and defense to perform perception recognition and processing on the received signals, so that the receiving end obtains the final data sent by the sending end.
4. The system of claim 3, wherein said transmitting side pulse laser employs a picosecond optical pulse generator model Thorlabs OPG 1015; the electro-optical intensity modulator at the transmitting end adopts an electro-optical intensity modulator with the model number of Photoline MX-LN-10; the electro-optical phase modulator at the transmitting end and the electro-optical phase modulator at the receiving end both adopt the electro-optical phase modulators with the model number of MPZ-LN-10; the transmitting end polarization coupler adopts a polarization beam coupler with the model number of Thorlabs PBC980 PM-FC; the receiving end homodyne detector adopts a balanced amplification photoelectric detector with the model number of Thorlabs PDA 435A.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110160921.4A CN112787815B (en) | 2021-02-05 | 2021-02-05 | Continuous variable quantum key communication method and system based on attack perception and defense |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110160921.4A CN112787815B (en) | 2021-02-05 | 2021-02-05 | Continuous variable quantum key communication method and system based on attack perception and defense |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112787815A CN112787815A (en) | 2021-05-11 |
CN112787815B true CN112787815B (en) | 2021-11-30 |
Family
ID=75760941
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110160921.4A Active CN112787815B (en) | 2021-02-05 | 2021-02-05 | Continuous variable quantum key communication method and system based on attack perception and defense |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112787815B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114499861B (en) * | 2022-03-30 | 2022-07-12 | 浙江九州量子信息技术股份有限公司 | Quantum key cloud security situation sensing method based on machine learning |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101010899A (en) * | 2004-08-31 | 2007-08-01 | 松下电器产业株式会社 | Data communication apparatus |
US10891555B2 (en) * | 2018-08-07 | 2021-01-12 | Nxgen Partners Ip, Llc | Universal quantum computer, communication, QKD security and quantum networks using OAM Qu-dits with digital light processing |
GB201720063D0 (en) * | 2017-12-01 | 2018-01-17 | Cambridge Entpr Ltd | Quantum security systems |
CN110011786B (en) * | 2019-03-20 | 2022-03-18 | 中国电子科技集团公司第三十研究所 | High-safety IP secret communication method |
CN110190959B (en) * | 2019-06-28 | 2021-05-07 | 中南大学 | Encryption and decryption method based on continuous variable quantum neural network |
CN110719128A (en) * | 2019-09-30 | 2020-01-21 | 安徽问天量子科技股份有限公司 | Device and method for detecting sensible positioning of optical fiber eavesdropping |
CN110880971B (en) * | 2019-11-22 | 2021-01-08 | 中南大学 | Chirp-based continuous variable quantum key distribution method and system |
CN111988130B (en) * | 2020-08-18 | 2022-06-07 | 中南大学 | Attack detection method for device defects in discrete quantum key distribution |
CN111970280B (en) * | 2020-08-18 | 2022-05-06 | 中南大学 | Attack detection method of continuous variable quantum key distribution system |
CN111970279B (en) * | 2020-08-18 | 2022-06-07 | 中南大学 | Continuous variable quantum key distribution attack detection method and detection system thereof |
CN112134683B (en) * | 2020-09-22 | 2022-02-15 | 中南大学 | Attack detection method of discrete variable quantum key distribution system |
-
2021
- 2021-02-05 CN CN202110160921.4A patent/CN112787815B/en active Active
Non-Patent Citations (2)
Title |
---|
"Security of post-selection based continuous variable quantum key distribution against arbitrary attacks";Nathan Walk et al.;《CLEO: 2011 - Laser Science to Photonic Applications》;20110506;全文 * |
基于等效信道的物理层认证和密钥分发机制;戴峤等;《中国科学:信息科学》;20141220(第12期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN112787815A (en) | 2021-05-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111970279B (en) | Continuous variable quantum key distribution attack detection method and detection system thereof | |
CN109039604B (en) | Passive decoy state quantum digital signature method | |
CN106788706B (en) | Continuous variable quantum key distribution method capable of resisting actual attack | |
Dixon et al. | Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate | |
CN106850196B (en) | Improved continuous variable quantum key distribution method capable of resisting practical attack | |
CN109687964B (en) | Novel data coordination method for continuous variable quantum key distribution | |
CN113225184A (en) | Passive decoy state modulation reference system-independent quantum key distribution system and method | |
CN112953973B (en) | Hybrid attack detection method for continuous variable quantum key distribution system | |
CN112787815B (en) | Continuous variable quantum key communication method and system based on attack perception and defense | |
Yang et al. | Measurement-device-independent entanglement-based quantum key distribution | |
Liu et al. | Source-independent quantum random number generator against tailored detector blinding attacks | |
CN112929163B (en) | Measuring device-independent continuous variable quantum key distribution method and system | |
CN112187442A (en) | Telemetry data analysis system and method based on privacy protection | |
CN116319010B (en) | Method for detecting QKD system defect and hacking based on machine learning | |
CN113452523B (en) | Abnormal communication detection method for continuous variable quantum key distribution process | |
RU2496239C1 (en) | Method for steganographic transmission of information through main optical channel and apparatus for implementing said method | |
CN115361118A (en) | Loss tolerant reference frame and measuring device independent quantum key distribution method | |
CN114268433A (en) | Nonlinear compensation method of high-speed continuous variable quantum key distribution system | |
Li et al. | Effects of measurement dependence on generalized Clauser-Horne-Shimony-Holt Bell test in the single-run and multiple-run scenarios | |
Paglierani et al. | A primer on underwater quantum key distribution | |
CN117714057B (en) | Multi-field measurement device independent quantum conference key negotiation method and system | |
CN106789036B (en) | Quantum key distribution system physical modeling method oriented to security analysis | |
CN114124544B (en) | Quantum attack detection method and quantum key distribution method based on clustering algorithm | |
Chapman et al. | Entanglement-based quantum digital signatures over a deployed campus network | |
CN219394858U (en) | Quantum secret sharing system based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |