CN114531227B - Compression-state-based wide signal-to-noise ratio continuous variable QKD data coordination method and system - Google Patents

Compression-state-based wide signal-to-noise ratio continuous variable QKD data coordination method and system Download PDF

Info

Publication number
CN114531227B
CN114531227B CN202111627903.9A CN202111627903A CN114531227B CN 114531227 B CN114531227 B CN 114531227B CN 202111627903 A CN202111627903 A CN 202111627903A CN 114531227 B CN114531227 B CN 114531227B
Authority
CN
China
Prior art keywords
bob
alice
key
quantum
signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111627903.9A
Other languages
Chinese (zh)
Other versions
CN114531227A (en
Inventor
郭邦红
范啸东
胡敏
杨帆
张锐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Yukopod Technology Development Co ltd
Original Assignee
South China Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by South China Normal University filed Critical South China Normal University
Priority to CN202111627903.9A priority Critical patent/CN114531227B/en
Publication of CN114531227A publication Critical patent/CN114531227A/en
Application granted granted Critical
Publication of CN114531227B publication Critical patent/CN114531227B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Optical Communication System (AREA)

Abstract

The invention discloses a method and a system for coordinating wide signal-to-noise ratio continuous variable QKD data based on a compression state, wherein the method comprises the following steps that a sender Alice performs information interaction with a receiver Bob through a quantum channel and performs identity authentication through a classical channel to obtain an original key; and obtaining the screened secret key through the basis vector comparison, taking a small amount of secret keys to calculate the error rate, judging whether the error rate is higher than a set threshold value, if not, carrying out m-level quantization, judging whether the SNR is higher than 1, and finally obtaining the safety secret key through confidentiality enhancement. Aiming at the characteristics of a time-varying channel distributed by a continuous variable quantum key based on a compression state, the invention designs a data coordination scheme capable of smoothly transiting between high and low signal to noise ratios based on spline coordination mainly used in high signal to noise ratio and multidimensional coordination used in low signal to noise ratio, thereby improving the data processing capacity when the channel is affected and further improving the quantum key generation rate.

Description

Compression-state-based wide signal-to-noise ratio continuous variable QKD data coordination method and system
Technical Field
The invention relates to the technical field of quantum information and optical communication, in particular to a data coordination method and a system in continuous variable quantum key post-distribution processing based on a wide signal-to-noise ratio of a compressed state.
Background
The existing key system based on computational complexity is challenged by development of quantum computing technology, and quantum key distribution (Quantum Key Distribution, QKD) technology capable of guaranteeing absolute security of information is the best way to solve the problem. Quantum key distribution is largely divided into two types: continuous variable quantum key distribution (Continuous Variable Quantum Key Distribution, CV-QKD) and discrete variable quantum key distribution (Discrete Variable Quantum Key Distribution, DV-QKD). The detection mode based on the energy response of DV-QKD is low in efficiency, the system is complex to realize, and the practical feasibility of the DV-QKD is reduced. Compared with DV-QKD, CV-QKD adopts detection modes of homodyne detection and heterodyne detection, and the technology is more mature and can be used in combination with the existing classical optical communication system.
CV-QKD mainly comprises a coherent state and a compressed state, and is mainly divided into two phases, namely a quantum communication phase and a classical communication phase. Due to imperfections of the quantum channel, it is susceptible to noise and interference by eavesdroppers and the like. Therefore, both data only have correlation and have errors, and therefore, error correction by classical communication is required. In order to convert the gaussian states generated by quantum communication into binary numbers, a data coordination scheme is required. The current mainstream coherent data coordination scheme is divided into two types, spline coordination (Slice reconciliation) used when the Signal-to-Noise Ratio (SNR) is high (about 1-15) and multidimensional coordination (Multi reconciliation) used when the Signal-to-Noise Ratio is low (about 0.01-1). The coherent signal is distributed near the origin at low signal-to-noise ratios, and therefore a spline-tuning scheme is used at low signal-to-noise ratios. Whereas the compressed state signal, because it compresses only one direction, enables it to match the spline harmonization scheme at low signal-to-noise ratios.
Unlike classical communication, when a quantum channel encounters an external environment mutation or is attacked by an eavesdropper Eve, the SNR of the QKD system changes irregularly, and the signal-to-noise ratio interval to which the two algorithms of spline coordination and multidimensional coordination are applied is excessive and not smooth. Therefore, in order to combat channel distortion, it is necessary to propose a data coordination algorithm applicable to all signal-to-noise ratio intervals simultaneously for compressed signals, so as to effectively reduce the complexity of post-processing and improve the efficiency of post-processing.
"prior art patent: (CN 112769558A) provides a method and system for adaptive QKD post-processing of code rate, but only provides a coding matrix under the condition of wide signal-to-noise ratio, and the complexity of data processing is still high, so that a data coordination scheme with wide signal-to-noise ratio is needed. "
Disclosure of Invention
The invention aims to solve the problems of adapting to various signal-to-noise ratio states and reducing the processing complexity after quantum key distribution under the time-varying channel condition, and provides a wide signal-to-noise ratio continuous variable QKD data coordination method and system based on a compression state, so as to ensure that data coordination in the quantum key distribution post-processing process can be completed in real time and high efficiency, further improve the data throughput and improve the code rate.
In order to achieve the above purpose, the technical scheme adopted by the invention is as follows:
a wide signal-to-noise ratio continuous variable QKD data coordination method based on compression state, comprising the steps of:
s1: the sender Alice generates a quantum signal in a compressed state through an optical system and records an original secret key K a1 The quantum signal is sent to the receiving party Bob through the quantum channel, after the receiving party Bob receives the quantum signal, the quantum signal is detected, and the optical signal is converted into an electric signal, so that an original secret key K is obtained b1
S2, the receiver Bob publishes the moment of detecting the quantum signal, the sender and the receiver 'S base vector comparison unit perform time comparison, the key bit corresponding to the moment that the receiver Bob' S base vector comparison unit does not receive the quantum signal is discarded, the correct measurement base and the correct signal arrival time are selected according to the selected quantum key distribution protocol content, and the available key is reserved; the key bits reserved by the sender Alice and the receiver Bob in the process respectively form a sender post-screening key K a2 Post-screening key K for receiver b2
S3: the sender Alice and the receiver Bob sift through the key K a2 、K b2 A small part of the key is randomly selected to carry out public key comparison in a classical channel, and the quantum error rate of the key is calculated according to the proportion of the same signal to the total signal;
if the quantum error rate is higher than or equal to the set threshold value, discarding all information bits transmitted at this time; if the quantum error rate is smaller than the set threshold, the quantum error rate is calculated according to the signal-to-noise ratio SNR and the formula C=0.5 log 2 (1+SNR) calculating the channel capacity C of the transmission channel, wherein the SNR represents the signal-to-noise ratio, and calling an error correction unit to perform error correction on the rest information bits;
s4: the error correction units of the sender Alice and the receiver Bob correct the error codes of the residual screened keys in a classical channel through an error correction algorithm, so that the sender and the receiver hold consistent key strings;
s5: and the confidentiality enhancement units of the sender Alice and the receiver Bob shorten the information quantity acquired by an eavesdropper on the quantum channel and the authenticated classical channel through a hash function algorithm according to the upper rate limit obtained in the error correction process executed in the error correction unit, so as to obtain the final security key bit.
Preferably, the S4 further includes:
s41, two communication parties Alice and Bob respectively have a group of associated Gaussian sequence codes X and Y; while step S3 is being performed, the gaussian sequence codes X and Y are quantized by multi-level encoding and multi-level decoding at the sender Alice side and the receiver Bob side, respectively, assuming that the number of quantization levels is m (m=4, 5, … and m is an integer), and the real number axis is divided into 2 m Dividing the Gaussian number distributed in each interval into m binary numbers to generate m binary sequences L 1 ,L 2 ,…,L m And L' 1 ,L′ 2 ,…,L′ m
S42: the receiver Bob extracts the first n-level information L 1 ,L 2 ,…,L n Using a check matrix and a residual bit string L n+1 ,…,L m Respectively act to generate syndrome S n+1 ,…,S m And sends to sender Alice via classical channel;
s43: the sender Alice uses the bare code X of itself as side information to combine with the received L 1 ,L 2 ,…,L n And syndrome S n+1 ,…,S m And (5) performing iterative decoding to recover the key.
Preferably, the step S42 further includes step S42a, and the step S42a includes the steps of:
s42a1 the receiver Bob discloses the information L of the first three stages 1 ,L 2 ,L 3 And uses the check matrix and the last two bit strings L 4 ,L 5 Respectively act to generate two syndromes S 4 ,S 5
S42a2 the receiver Bob transmits the first three bit strings L via classical channel 1 ,L 2 ,L 3 And syndrome S 4 ,S 5 Sending to sender Alice;
s42a3, the sender Alice uses the bare code X of itself as side information, according to the received L 1 ,L 2 ,L 3 And S is 4 Calculating the initial probability of the 4 th level decoding message, and performing 4 th level iterative decoding;
s42a4 the sender Alice successfully recovers the level 4 Key L 4 Then reuse X, L 1 ,L 2 ,L 3 ,L 4 ,S 4 Calculating initial probability of 5 th level decoding message, performing 5 th level iterative decoding, and recovering 5 th level key L 5
Preferably, the step S42 further includes step S42b, and the step S42b includes the steps of:
s42b1 the receiver Bob discloses the information L of the first two stages 1 ,L 2 Using check matrix and last two bit strings L 3 ,L 4 Respectively act to generate two syndromes S 3 ,S 4
S42b2, the receiving party Bob respectively checks the syndromes S 3 ,S 4 Every d elements of a vector, denoted X i And X' i The method comprises the steps of carrying out a first treatment on the surface of the Sender Alice will be L 'respectively' 3 ,L′ 4 Every d elements constitute a vector Y i And Y' i
S42b3, both sides first need to normalize the Gaussian vector, i.e
Figure BDA0003440407300000031
In |X i |、|Y i The i represents modulo the vector;
in the same way, the processing method comprises the steps of,
Figure BDA0003440407300000041
in the formula of |X' i |、|Y′ i The i represents modulo the vector;
s42b4 the receiving party Bob generates a set of random bit strings of length d and obeying a uniform distribution (b 1 ,b 2 ,…,b d (ii) and then willThe random bit string is converted into d-dimensional spherical vector
Figure BDA0003440407300000042
S42b5 the receiver Bob rotates to calculate the function M (y, u) to satisfy
M(y,u)y=u;
And S42b6, the receiver Bob sends information of a function M (y, u) to Alice, and Alice calculates M (y, u) x=v by using the received function information, wherein y is information held by the receiver Bob, x is information held by the sender Alice, and v is a d-dimensional spherical vector obtained by converting the held information x according to the function M by the sender Alice.
Preferably, the step S42 further includes:
the quantization level number n is selected according to the signal-to-noise ratio (n is more than or equal to 4 and less than or equal to m, n is an integer), and the specific mode is as follows:
when the SNR is more than 1 and less than or equal to 100, selecting n=5, and adopting the data coordination scheme in the step S42 a;
at 0 < snr.ltoreq.1, n=4 is selected, and the data coordination scheme as presented in step S42b is employed.
The invention also provides a wide signal-to-noise ratio continuous variable QKD data coordination system based on a compression state, which applies the wide signal-to-noise ratio continuous variable QKD data coordination method based on the compression state, and the system comprises the following steps: the method comprises the steps that a sender Alice and a receiver Bob are connected through a quantum channel and a classical channel;
the sender Alice comprises an Alice optical system, an Alice upper computer and an Alice processor;
the Alice optical system, the Alice upper computer and the Alice processor are sequentially connected; the Alice optical system comprises an optical system signal transmitting unit; the Alice upper computer comprises an Alice base vector comparison unit and an Alice parameter estimation unit; the Alice processor comprises an Alice error correction unit and an Alice confidentiality enhancement unit;
the receiver Bob comprises a Bob optical system, a Bob upper computer and a Bob processor; the Bob optical system, the Bob upper computer and the Bob processor are sequentially connected; the receiver Bob upper computer comprises a Bob base vector comparison unit and a Bob parameter estimation unit; the Bob processor comprises a Bob error correction unit and a Bob confidentiality enhancement unit;
the Alice optical system is connected with the Bob optical system through a quantum channel; the Alice upper computer is connected with the Bob upper computer through a classical channel; the Alice processor is connected with the Bob processor through a classical channel;
the optical system signal transmitting unit of the sender Alice is used for generating and transmitting the quantum bit and informing the upper computer of recording the initial key K a1
The optical system signal receiving unit of the receiver Bob is used for receiving the quantum bit and notifying the upper computer to acquire the original key K b1
The sender Alice obtains the key K after screening through an Alice basis vector comparison unit a2
The receiver Bob obtains the key K after screening through a Bob base vector comparison unit b2
The sender Alice calculates the channel capacity through an Alice parameter estimation unit;
the receiving party Bob obtains channel parameters through a Bob parameter estimation unit;
the Alice error correction unit of the sender Alice and the Bob error correction unit of the receiver Bob are used for correcting the error code of the residual screened secret key, so that the sender Alice and the receiver Bob hold a consistent secret key string;
the Alice confidentiality enhancement unit of the sender Alice and the Bob confidentiality enhancement unit of the receiver Bob are used for compressing the ratio according to the quantum error rate obtained in the corresponding error correction unit
Figure BDA0003440407300000051
R is the quantum error rate, Q is the photon number, Q u And obtaining the final security key bit after the total system gain is processed by a hash function algorithm.
Preferably, when the sender Alice and the receiver Bob use classical channels to perform information interaction, the identity information is confirmed in a digital signature mode, the correctness of the information is confirmed, and the fact that the information is not tampered is ensured.
Preferably, the Alice base vector comparison unit and the Bob base vector comparison unit perform information interaction through a classical channel;
the Alice parameter estimation unit and the Bob parameter estimation unit perform information interaction through a classical channel;
the Alice error correction unit and the Bob error correction unit perform information interaction through a classical channel;
and the Alice privacy enhancement unit and the Bob privacy enhancement unit conduct information interaction through a classical channel.
Compared with the prior art, the invention has the beneficial effects that:
according to the characteristic that the compressed state signal only compresses one orthogonal component, the invention provides a data coordination method suitable for a wide signal-to-noise ratio (0.01-15) based on the compressed state on the basis of original spline coordination and multidimensional coordination, thereby improving the data processing capability when a channel is affected, reducing the processing complexity, improving the utilization rate of the generated quantum signal and finally improving the key generation rate.
Description of the drawings:
FIG. 1 is a general block diagram of a wide signal-to-noise ratio continuous variable QKD data coordination method based on a compressed state of the present invention;
FIG. 2 is a flow chart of a wide signal-to-noise ratio continuous variable QKD data coordination method based on a compressed state of the present invention;
FIG. 3 is a functional architecture diagram of a wide signal-to-noise ratio continuous variable QKD data coordination system based on a compressed state of the present invention;
fig. 4 is a hardware architecture diagram of a wide signal-to-noise ratio continuous variable QKD data coordination system based on a compressed state in accordance with the present invention.
The specific embodiment is as follows:
the present invention will be further described in detail with reference to the following examples, for the purpose of making the objects, technical solutions and advantages of the present invention more apparent, but the scope of the present invention is not limited to the following specific examples.
After the quantum key distribution is transmitted, received and measured through the physical layer, the sender and the receiver generate corresponding information. Since these information do not correspond exactly equally, and there are situations where there is leakage information and errors, further processing of the erroneous information by data coordination is required, and finally a shared security key is obtained. Compared with classical communication, quantum key distribution is limited by a physical layer, so that the key generation rate is low, the influence degree of a channel is high, and therefore, all data are processed efficiently in other links.
Taking a compressed quantum key distribution system as an example, the signal to noise ratio of the system is normally distributed by taking 2 as a center.
As shown in fig. 1 and 2, a wide signal-to-noise ratio continuous variable QKD data coordination method based on compressed state, the method includes the steps of:
s1: the sender Alice generates a quantum signal in a compressed state through an optical system and records an original secret key K a1 The quantum signal is sent to the receiving party Bob through the quantum channel, after the receiving party Bob receives the quantum signal, the quantum signal is detected, and the optical signal is converted into an electric signal, so that an original secret key K is obtained b1
S2, the receiver Bob publishes the moment of detecting the quantum signal, the sender and the receiver 'S base vector comparison unit perform time comparison, the key bit corresponding to the moment that the receiver Bob' S base vector comparison unit does not receive the quantum signal is discarded, the correct measurement base and the correct signal arrival time are selected according to the selected quantum key distribution protocol content, and the available key is reserved; the key bits reserved by the sender Alice and the receiver Bob in the process respectively form a sender post-screening key K a2 Post-screening key K for receiver b2
S3: the sender Alice and the receiver Bob sift through the key K a2 、K b2 A small part of the key is randomly selected to carry out public key comparison in a classical channel, and the quantum error rate of the key is calculated according to the proportion of the same signal to the total signal;
if the quantum error rate is higher than or equal to the set threshold value, discarding all information bits transmitted at this time; if the quantum error rate is smallAt a set threshold, the signal-to-noise ratio SNR is calculated according to equation c=0.5 log 2 (1+SNR) calculating the channel capacity C of the transmission channel, and calling an error correction unit to perform error correction on the rest information bits;
s4: the error correction units of the sender Alice and the receiver Bob correct the error codes of the residual screened keys in a classical channel through an error correction algorithm, so that the sender and the receiver hold consistent key strings;
s41, two communication parties Alice and Bob respectively have a group of associated Gaussian sequence codes X and Y; in the step S3, the Gaussian sequence codes X and Y are quantized by multi-stage coding and multi-stage decoding at the Alice end of the sender and the Bob end of the receiver respectively, so that the waiting time of the subsequent steps is saved, and the processing time is reduced;
assuming that the number of quantization steps is m (m=4, 5, … and m is an integer), the real number axis is divided into 2 m Dividing the Gaussian number distributed in each interval into m binary numbers to generate m binary sequences L 1 ,L 2 ,…,L m And L' 1 ,L′ 2 ,…,L′ m
S42: the receiver Bob extracts the first n-level information L 1 ,L 2 ,…,L n Using a check matrix and a residual bit string L n+1 ,…,L m Respectively act to generate syndrome S n+1 ,…,S m And sends to sender Alice via classical channel;
the sender Alice uses the bare code X of itself as side information to combine with the received L 1 ,L 2 ,…,L n And syndrome S n+1 ,…,S m And (5) performing iterative decoding to recover the key.
In the S42, a quantization level n (n is more than or equal to 4 and less than or equal to m, and n is an integer) is selected according to the SNR;
when 1 < SNR is less than or equal to 100, selecting a quantization level n=5, and adopting step S42a, wherein the step S42a includes the following steps:
s42a1 the receiver Bob discloses the information L of the first three stages 1 ,L 2 ,L 3 And uses the check matrix and the last two bit strings L 4 ,L 5 Acting respectively, generatingInto two syndromes S 4 ,S 5
S42a2 the receiver Bob transmits the first three bit strings L via classical channel 1 ,L 2 ,L 3 And syndrome S 4 ,S 5 Sending to sender Alice;
s42a3, the sender Alice uses the bare code X of itself as side information, according to the received L 1 ,L 2 ,L 3 And S is 4 Calculating the initial probability of the 4 th level decoding message, and performing 4 th level iterative decoding;
s42a4 the sender Alice successfully recovers the level 4 Key L 4 Then reuse X, L 1 ,L 2 ,L 3 ,L 4 ,S 4 Calculating initial probability of 5 th level decoding message, performing 5 th level iterative decoding, and recovering 5 th level key L 5
The steps S42a1-S42a4 are classical spline coordination schemes, and the scheme has better processing effect and higher processing speed under the condition of high signal-to-noise ratio.
When 0 < SNR is less than or equal to 1, selecting a quantization level n=4, and adopting step S42b, wherein the step S42b includes the steps of:
s42b1 the receiver Bob discloses the information L of the first two stages 1 ,L 2 Using check matrix and last two bit strings L 3 ,L 4 Respectively act to generate two syndromes S 3 ,S 4
S42b2, the receiving party Bob respectively checks the syndromes S 3 ,S 4 Every d elements of a vector, denoted X i And X' i The method comprises the steps of carrying out a first treatment on the surface of the Sender Alice will be L 'respectively' 3 ,L′ 4 Every d elements constitute a vector Y i And Y' i
S42b3, the two parties first need to normalize the Gaussian vector
Figure BDA0003440407300000071
In |X i |、|Y i The i represents modulo the vector;
in the same way, the processing method comprises the steps of,
Figure BDA0003440407300000081
in the formula of |X' i |、|Y′ i The i represents modulo the vector;
s42b4 the receiving party Bob generates a set of random bit strings of length d and obeying a uniform distribution (b 1 ,b 2 ,…,b d (ii) and then converting this random bit string into a d-dimensional spherical vector:
Figure BDA0003440407300000082
s42b5 the receiver Bob rotates to calculate the function M (y, u) to satisfy
M(y,u)y=u;
S42b6, the receiving party Bob sends the information of the function M (y, u) to Alice, and Alice calculates M (y, u) x=v by using the received information of the function; wherein y is Bob holding information, x is Alice holding information, and v is d-dimensional spherical vector obtained by Alice converting the held information x according to a function M;
the steps S4b1-S4b6 are optimized on the original data coordination scheme, and the method combines partial spline coordination steps according to the characteristics of the compression state, so that the processing complexity is reduced, the storage space of a processor is saved, the code rate is improved, and meanwhile, the problem that an excessive interval is not smooth when the data coordination scheme is adopted under the conditions of high signal to noise ratio and low signal to noise ratio is effectively solved.
S5: and the confidentiality enhancement units of the sender Alice and the receiver Bob shorten the information quantity acquired by an eavesdropper on the quantum channel and the authenticated classical channel through a hash function algorithm according to the upper rate limit obtained in the error correction process executed in the error correction unit, so as to obtain the final security key bit.
As shown in fig. 3 and 4, the present invention further provides a wide signal-to-noise ratio continuous variable QKD data coordination system based on a compressed state, the system applying a wide signal-to-noise ratio continuous variable QKD data coordination method based on a compressed state as described in any one of the above, the system comprising: the method comprises the steps that a sender Alice and a receiver Bob are connected through a quantum channel and a classical channel;
the sender Alice comprises an Alice optical system, an Alice upper computer and an Alice processor;
the Alice optical system, the Alice upper computer and the Alice processor are sequentially connected; the Alice optical system comprises an optical system signal transmitting unit; the Alice upper computer comprises an Alice base vector comparison unit and an Alice parameter estimation unit; the Alice processor comprises an Alice error correction unit and an Alice confidentiality enhancement unit;
the receiver Bob comprises a Bob optical system, a Bob upper computer and a Bob processor; the Bob optical system, the Bob upper computer and the Bob processor are sequentially connected; the receiver Bob upper computer comprises a Bob base vector comparison unit and a Bob parameter estimation unit; the Bob processor comprises a Bob error correction unit and a Bob confidentiality enhancement unit;
the Alice optical system is connected with the Bob optical system through a quantum channel; the Alice upper computer is connected with the Bob upper computer through a classical channel; the Alice processor is connected with the Bob processor through a classical channel;
the Alice base vector comparison unit and the Bob base vector comparison unit perform information interaction through a classical channel;
the Alice parameter estimation unit and the Bob parameter estimation unit perform information interaction through a classical channel;
the Alice error correction unit and the Bob error correction unit perform information interaction through a classical channel;
and the Alice privacy enhancement unit and the Bob privacy enhancement unit conduct information interaction through a classical channel.
The optical system signal transmitting unit of the sender Alice is used for generating and transmitting quantum bits and notifying an upper computer to acquire the original key K a1
The optical system signal receiving unit of the receiver Bob is used for receiving the quantum bit and notifying the upper computer to acquire the original key K b1
The sender Alice acquires the key K after screening through the Alice base vector comparison unit and the Bob base vector comparison unit a2
The receiver Bob acquires the key K after screening through the Bob base vector comparison unit and the Alice base vector comparison unit b2
The sender Alice calculates the channel capacity by combining an Alice parameter estimation unit with a Bob parameter estimation unit;
the receiver Bob obtains channel parameters from the Alice parameter estimation unit through the Bob parameter estimation unit;
the Alice error correction unit of the sender Alice and the Bob error correction unit of the receiver Bob are used for correcting the error code of the residual screened secret key, so that the sender Alice and the receiver Bob hold a consistent secret key string;
the Alice confidentiality enhancement unit of the sender Alice and the Bob confidentiality enhancement unit of the receiver Bob calculate the compression ratio according to the quantum error rate obtained in the corresponding error correction unit
Figure BDA0003440407300000091
R is the quantum error rate, Q is the photon number, Q u And obtaining the final security key bit after the total system gain is processed by a hash function algorithm.
When the sender Alice and the receiver Bob use classical channels to conduct information interaction, identity information is confirmed in a digital signature mode, information correctness is confirmed, and the fact that the information is not tampered is guaranteed.
Variations and modifications to the above would be obvious to persons skilled in the art to which the invention pertains from the foregoing description and teachings. Therefore, the invention is not limited to the specific embodiments disclosed and described above, but some modifications and changes of the invention should be also included in the scope of the claims of the invention. In addition, although specific terms are used in the present specification, these terms are for convenience of description only and do not constitute any limitation on the invention.

Claims (7)

1. A wide signal-to-noise ratio continuous variable QKD data coordination method based on compression state is characterized by comprising the following steps:
s1: the sender Alice generates a quantum signal in a compressed state through an optical system and records an original secret key K a1 The quantum signal is sent to the receiving party Bob through the quantum channel, after the receiving party Bob receives the quantum signal, the quantum signal is detected, and the optical signal is converted into an electric signal, so that an original secret key K is obtained b1
S2, the receiver Bob publishes the moment of detecting the quantum signal, the sender and the receiver 'S base vector comparison unit perform time comparison, the key bit corresponding to the moment that the receiver Bob' S base vector comparison unit does not receive the quantum signal is discarded, the correct measurement base and the correct signal arrival time are selected according to the selected quantum key distribution protocol content, and the available key is reserved; the key bits reserved by the sender Alice and the receiver Bob in the process respectively form a sender post-screening key K a2 Post-screening key K for receiver b2
S3: the sender Alice and the receiver Bob sift through the key K a2 、K b2 A small part of the key is randomly selected to carry out public key comparison in a classical channel, and the quantum error rate of the key is calculated according to the proportion of the same signal to the total signal;
if the quantum error rate is higher than or equal to the set threshold value, discarding all information bits transmitted at this time; if the quantum error rate is smaller than the set threshold, the quantum error rate is calculated according to the signal-to-noise ratio SNR and the formula C=0.5 log 2 (1+SNR) calculating the channel capacity C of the transmission channel, and calling an error correction unit to perform error correction on the rest information bits;
s4: the error correction units of the sender Alice and the receiver Bob correct the error codes of the residual screened keys in a classical channel through an error correction algorithm, so that the sender and the receiver hold consistent key strings;
s5: and the confidentiality enhancement units of the sender Alice and the receiver Bob shorten the information quantity acquired by an eavesdropper on the quantum channel and the authenticated classical channel through a hash function algorithm according to the upper rate limit obtained in the error correction process executed in the error correction unit, so as to obtain the final security key bit.
2. The wide signal-to-noise ratio continuous variable QKD data coordination method based on compressed state of claim 1, wherein S4 further comprises:
s41, two communication parties Alice and Bob respectively have a group of associated Gaussian sequence codes X and Y; while step S3 is being performed, the gaussian sequence codes X and Y are quantized by multi-level encoding and multi-level decoding at the sender Alice end and the receiver Bob end, respectively, assuming that the number of quantization levels is m, m=4, 5, … and m is an integer, and the real number axis is divided into 2 m Dividing the Gaussian number distributed in each interval into m binary numbers to generate m binary sequences L 1 ,L 2 ,…,L m And L' 1 ,L′ 2 ,…,L′ m
S42: the receiver Bob extracts the first n-level information L 1 ,L 2 ,…,L n Using a check matrix and a residual bit string L n+1 ,…,L m Respectively act to generate syndrome S n+1 ,…,S m And sends to sender Alice via classical channel;
the sender Alice uses the bare code X of itself as side information to combine with the received L 1 ,L 2 ,…,L n And syndrome S n+1 ,…,S m And (5) performing iterative decoding to recover the key.
3. The wide signal-to-noise ratio continuous variable QKD data coordination method according to claim 2, wherein S42 further includes S42a, said S42a including the steps of:
s42a1 the receiver Bob discloses the information L of the first three stages 1 ,L 2 ,L 3 And uses the check matrix and the last two bit strings L 4 ,L 5 Respectively act to generate two syndromes S 4 ,S 5
S42a2 the receiver Bob transmits the first three bit strings L via classical channel 1 ,L 2 ,L 3 And syndrome S 4 ,S 5 Sending to sender Alice;
s42a3, the sender Alice uses the bare code X of itself as side information, according to the received L 1 ,L 2 ,L 3 And S is 4 Calculating the initial probability of the 4 th level decoding message, and performing 4 th level iterative decoding;
s42a4 the sender Alice successfully recovers the level 4 Key L 4 Then reuse X, L 1 ,L 2 ,L 3 ,L 4 ,S 4 Calculating initial probability of 5 th level decoding message, performing 5 th level iterative decoding, and recovering 5 th level key L 5
4. The wide signal-to-noise ratio continuous variable QKD data coordination method according to claim 2, wherein S42 further includes S42b, said S42b including the steps of:
s42b1 the receiver Bob discloses the information L of the first two stages 1 ,L 2 Using check matrix and last two bit strings L 3 ,L 4 Respectively act to generate two syndromes S 3 ,S 4
S42b2, the receiving party Bob respectively checks the syndromes S 3 ,S 4 Every d elements of a vector, denoted X i And X i 'A'; sender Alice will be L 'respectively' 3 ,L′ 4 Every d elements constitute a vector Y i And Y i ′;
S42b3, both sides first need to normalize the Gaussian vector, i.e
Figure FDA0004223581160000021
In |X i |、|Y i The i represents modulo the vector;
in the same way, the processing method comprises the steps of,
Figure FDA0004223581160000022
in |X i ′|、|Y i ' i denotes modulo the vector;
s42b4 the receiving party Bob generates a set of random bit strings of length d and obeying a uniform distribution (b 1 ,b 2 ,…,b d (ii) and then converting the random bit string into a d-dimensional spherical vector
Figure FDA0004223581160000023
S42b5 the receiver Bob rotates to calculate the function M (y, u) to satisfy
M(y,u)y=u;
And S42b6, the receiver Bob sends information of a function M (y, u) to Alice, and Alice calculates M (y, u) x=v by using the received function information, wherein y is information held by the receiver Bob, x is information held by the sender Alice, and v is a d-dimensional spherical vector obtained by converting the held information x according to the function M by the sender Alice.
5. A wide signal-to-noise ratio continuous variable QKD data coordination system based on a compressed state, wherein a wide signal-to-noise ratio continuous variable QKD data coordination method based on a compressed state as claimed in any one of claims 1 to 4 is applied, the system comprising: the method comprises the steps that a sender Alice and a receiver Bob are connected through a quantum channel and a classical channel;
the sender Alice comprises an Alice optical system, an Alice upper computer and an Alice processor;
the Alice optical system, the Alice upper computer and the Alice processor are sequentially connected; the Alice optical system comprises an optical system signal transmitting unit; the Alice upper computer comprises an Alice base vector comparison unit and an Alice parameter estimation unit; the Alice processor comprises an Alice error correction unit and an Alice confidentiality enhancement unit;
the receiver Bob comprises a Bob optical system, a Bob upper computer and a Bob processor; the Bob optical system, the Bob upper computer and the Bob processor are sequentially connected; the receiver Bob upper computer comprises a Bob base vector comparison unit and a Bob parameter estimation unit; the Bob processor comprises a Bob error correction unit and a Bob confidentiality enhancement unit;
the Alice optical system is connected with the Bob optical system through a quantum channel; the Alice upper computer is connected with the Bob upper computer through a classical channel; the Alice processor is connected with the Bob processor through a classical channel;
the optical system signal transmitting unit of the sender Alice is used for generating and transmitting quantum bits and informing the upper computer to record the original key K a1
The optical system signal receiving unit of the receiver Bob is used for receiving the quantum bit and notifying the upper computer to acquire the original key K b1
The sender Alice obtains the key K after screening through an Alice basis vector comparison unit a2
The receiver Bob obtains the key K after screening through a Bob base vector comparison unit b2
The sender Alice calculates the channel capacity through an Alice parameter estimation unit;
the receiving party Bob obtains channel parameters through a Bob parameter estimation unit;
the Alice error correction unit of the sender Alice and the Bob error correction unit of the receiver Bob are used for correcting the error code of the residual screened secret key, so that the sender Alice and the receiver Bob hold a consistent secret key string;
the Alice confidentiality enhancement unit of the sender Alice and the Bob confidentiality enhancement unit of the receiver Bob calculate the compression ratio according to the quantum error rate obtained in the corresponding error correction unit
Figure FDA0004223581160000041
R is the quantum error rate, Q is the photon number, Q u And obtaining the final security key bit after the total system gain is processed by a hash function algorithm.
6. The continuous variable QKD data coordination system of claim 5, wherein when the sender Alice and the receiver Bob use classical channels to perform information interaction, the identity information is confirmed in a digital signature manner, the correctness of the confirmed information is ensured, and the information is not tampered.
7. The wide signal-to-noise ratio continuous variable QKD data coordination system of claim 5, wherein said Alice's basis vector alignment unit and Bob's basis vector alignment unit interact information via classical channels;
the Alice parameter estimation unit and the Bob parameter estimation unit perform information interaction through a classical channel;
the Alice error correction unit and the Bob error correction unit perform information interaction through a classical channel;
and the Alice privacy enhancement unit and the Bob privacy enhancement unit conduct information interaction through a classical channel.
CN202111627903.9A 2021-12-28 2021-12-28 Compression-state-based wide signal-to-noise ratio continuous variable QKD data coordination method and system Active CN114531227B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111627903.9A CN114531227B (en) 2021-12-28 2021-12-28 Compression-state-based wide signal-to-noise ratio continuous variable QKD data coordination method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111627903.9A CN114531227B (en) 2021-12-28 2021-12-28 Compression-state-based wide signal-to-noise ratio continuous variable QKD data coordination method and system

Publications (2)

Publication Number Publication Date
CN114531227A CN114531227A (en) 2022-05-24
CN114531227B true CN114531227B (en) 2023-06-30

Family

ID=81621232

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111627903.9A Active CN114531227B (en) 2021-12-28 2021-12-28 Compression-state-based wide signal-to-noise ratio continuous variable QKD data coordination method and system

Country Status (1)

Country Link
CN (1) CN114531227B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115378582B (en) * 2022-07-20 2024-05-10 中国电子科技集团公司第三十研究所 Method and system for eliminating residual error code of continuous variable quantum key distribution

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777969A (en) * 2010-01-12 2010-07-14 浙江大学 Encoding and decoding method for quasi-orthogonal STBC based on four transmitting antennas
CN105553572A (en) * 2015-12-14 2016-05-04 中国海洋大学 Underwater communication system
CN106211149A (en) * 2016-07-08 2016-12-07 东南大学 Channel reciprocity enhancement method based on principal component analysis

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9620202B2 (en) * 2013-11-01 2017-04-11 Seagate Technology Llc Reduction or elimination of a latency penalty associated with adjusting read thresholds for non-volatile memory

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777969A (en) * 2010-01-12 2010-07-14 浙江大学 Encoding and decoding method for quasi-orthogonal STBC based on four transmitting antennas
CN105553572A (en) * 2015-12-14 2016-05-04 中国海洋大学 Underwater communication system
CN106211149A (en) * 2016-07-08 2016-12-07 东南大学 Channel reciprocity enhancement method based on principal component analysis

Also Published As

Publication number Publication date
CN114531227A (en) 2022-05-24

Similar Documents

Publication Publication Date Title
CN106161012B (en) A kind of quantum key distribution after-treatment system and method based on polarization code error correction
US7941726B2 (en) Low dimensional spectral concentration codes and direct list decoding
Ekert et al. Eavesdropping on quantum-cryptographical systems
CN110011792B (en) Single-step quantum key distribution post-processing method, system, medium and equipment based on polar code
CN112769558B (en) Code rate self-adaptive QKD post-processing method and system
US20040190719A1 (en) Decoupling error correction from privacy amplification in quantum key distribution
CN111447056B (en) Configurable decoy state quantum digital signature method
CN111200493B (en) Post-processing system and method for phase polarization joint modulation QKD
US20210351936A1 (en) Qds-based mail system and transceiving method
Tung et al. Deep joint source-channel and encryption coding: Secure semantic communications
US8213616B2 (en) Systems and methods for providing opportunistic security for physical communication channels
CN114422081B (en) QKD post-processing system and method based on CRC-SCL decoding algorithm
CN109743155B (en) Physical layer secure transmission method based on antenna selection differential chaos keying
CN106027230A (en) Method for carrying out Hamming error correction for error code in quantum secret key distribution postprocessing
CN114531227B (en) Compression-state-based wide signal-to-noise ratio continuous variable QKD data coordination method and system
CN116506232B (en) High-capacity Internet of things hidden channel construction method based on channel coding
US20230370494A1 (en) Quantum secure direct communication with mutual authentication via rotation of an arbitrary basis
Harun et al. Hybrid m-ary in braided single stage approach for multiphoton quantum secure direct communication protocol
EP4270862A1 (en) Computer-implemented methods for post-quantum protection of information and for post-quantum secure information matching and cryptographic systems to perform the computer-implemented methods
Shen et al. Golay code based bit mismatch mitigation for wireless channel impulse response based secrecy generation
Gao et al. A lightweight and efficient physical layer key generation mechanism for manets
Korzhik et al. Performance evaluation of keyless authentication based on noisy channel
CN114389805A (en) Post-processing method of CV-QKD based on Gaussian modulation coherent state
US20050201563A1 (en) Quantum cryptography with fewer random numbers
Wu et al. A channel coding approach for physical-layer authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240115

Address after: 510663 room A105, first floor, ladder a, No. 11, panglv Road, Science City, Guangzhou high tech Industrial Development Zone, Guangdong Province

Patentee after: Guangdong Yukopod Technology Development Co.,Ltd.

Address before: School of information and optoelectronics, South China Normal University, 378 Waihuan West Road, Panyu District, Guangzhou, Guangdong 510000

Patentee before: SOUTH CHINA NORMAL University

TR01 Transfer of patent right