首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
We introduce a new sophisticated attack with a Hong-Ou-Mandel interferometer against quantum key distribution (QKD) and apply the attack to the QKD protocol with blind polarization. We also discuss how efficient our attack protocol is to ping-pong type protocols. The text was submitted by the authors in English.  相似文献   

2.
基于随机相位编码的确定性量子密钥分配   总被引:3,自引:0,他引:3       下载免费PDF全文
提出一种新的随机相位编码的确定性量子密钥分配(QKD)方案.在该方案中,通信双方不需要公布测量基,就可以共享秘密信息,提高了密钥生成效率.因为传输的量子比特是随机编码的,即便光源非严格为单光子,该方案仍旧是安全的.理论分析显示出,对于光子数分裂攻击,中间人攻击和特洛伊木马等攻击手段,本方案比之前的QKD方案具有更强的安全性.  相似文献   

3.
A new quantum key expansion scheme is proposed. The protocol of quantum key expansion proposed by Hwang is analyzed and the eavesdropping scheme is presented. We found that the using of the basis sequence shared by communicating parties is the weakness of the protocol. Hence we propose a ‘purification attack’ for the eavesdropper to steal partial information of the raw key and the new key between communicating parties. In view of this defect, we propose a new protocol of quantum key expansion, where the shared key is encrypted into a sequence of unitary operators which can be used securely against the presented attack.  相似文献   

4.
《Physics letters. A》2006,356(6):406-410
We provide a security analysis of the Y-00 protocol under heterodyne measurement and correlation attack. We show that the secrecy of the data encryption scheme is extremely sensitive to the running-key generation process. In many situations our simple attack succeeds in recovering the initial shared secret key. Our simulation results suggest that a truly secure implementation of the protocol should take into account the effective key generation method.  相似文献   

5.
Using the single-photon nonlocality, we propose a quantum novel overloading cryptography scheme, in which a single photon carries two bits information in one-way quantum channel. Two commutative modes of the single photon, the polarization mode and the spatial mode, are used to encode secret information. Strict time windows are set to detect the impersonation attack. The spatial mode which denotes the existence of photons is noncommutative with the phase of the photon, so that our scheme is secure against photon-number-splitting attack. Our protocol may be secure against individual attack.  相似文献   

6.
在差分法基础上提出了一种改进的差分相位编码量子密钥分发(QKD)方案.Alice采用脉冲激光光源,通过两个串联光纤延迟环产生四个均匀的相干脉冲,并对脉冲进行差分调制,补偿了传输过程中环境对偏振的扰动.Bob采用双FM干涉仪,在窄脉冲门控模式下进行单光子探测.单程传输避免了木马攻击,增强了方案的安全性.实验结果表明,系统可以长期稳定运转(大于24h),误码率为3%.改进的系统具有高效、稳定、低成本的优点,实施方便,有很好的实用价值. 关键词: 量子保密通信 量子密钥分发 差分相位编码  相似文献   

7.
Quantum Key Distribution Network Based on Differential Phase Shift   总被引:4,自引:0,他引:4       下载免费PDF全文
Using a series of quantum correlated photon pairs, we propose a theoretical scheme for any-to-any multi-user quantum key distribution network based on differential phase shift. The differential phase shift and the different detection time slots ensure the security of our scheme against eavesdropping. We discuss the security under the intercept-resend attack and the source replacement attack.  相似文献   

8.
We present a continuous variable quantum communication protocol based on bright continuous-wave twin-beams generated by a type-II OPO. Intensity correlation between the beams is used in conjunction with a binary randomization of polarization to guarantee security and reveal eavesdropping actions. The scheme presented is asymmetric. Bob (the receiver) retains one of the beams and sends the other one to Alice after a random rotation of its polarization. The cryptographic key elements are encoded through amplitude modulation by Alice, who sends back her beam to Bob after a second rotation of the polarization. Eventually, the beams are detected by Bob after a further random polarization rotation. The security of the system and the possibility of revealing the eavesdropping action in the case of an individual attack are demonstrated by evaluating the bit error rates.  相似文献   

9.
We present a scheme that is capable of detecting photon numbers during the quantum key distribution (QKD) based on an improved differential phase shift (DPS) system without Trojan horse attack. A time-multiplexed detector (TMD) is set in for the photon-number resolution. Two fibre loops are used for detecting photon numbers as well as distributing keys. The long-term stabilization is guaranteed by two Faraday mirrors (FM) at Bob's site to automatically compensate for polarization defect. Our experimental study (90km QKD is completed) indicates that such a system is stable and secure which nearly reaches the performance of a single photon scheme.  相似文献   

10.
We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct communication scheme proposed by Cao et at. [H.J. Cao and H.S. Song, Chin. Phys. Lett. 23 (2006) 290], in our scheme, the detection probability for an eavesdropper's attack increases from 8.3% to 25%. We also show that our scheme is secure for a noise quantum channel.  相似文献   

11.
Known-plaintext attack on a joint transform correlator encrypting system   总被引:1,自引:0,他引:1  
We demonstrate in this Letter that a joint transform correlator shows vulnerability to known-plaintext attacks. An unauthorized user, who intercepts both an object and its encrypted version, can obtain the security key code mask. In this contribution, we conduct a hybrid heuristic attack scheme merge to a Gerchberg-Saxton routine to estimate the encrypting key to decode different ciphertexts encrypted with that same key. We also analyze the success of this attack for different pairs of plaintext-ciphertext used to get the encrypting code. We present simulation results for the decrypting procedure to demonstrate the validity of our analysis.  相似文献   

12.
We propose a prepare-and-measure scheme for quantum key distribution with two-qubit quantum codes. The protocol is unconditionally secure under all types of intercept-and-resend attack. Given the symmetric and independent errors to the transmitted qubits, our scheme can tolerate a bit of an error rate up to 26% in four-state protocol and 30% in six-state protocol, respectively. These values are higher than all currently known threshold values for the prepare-and-measure protocols. Moreover, we give a practically implementable linear optics realization for our scheme.  相似文献   

13.
We propose a distribution scheme of polarization states of a single photon over a collective-noise channel. By adding one extra photon with a fixed polarization, we can protect the state against collective noise via a parity-check measurement and postselection. While the scheme succeeds only probabilistically, it is simpler and more flexible than the schemes utilizing decoherence-free subspace. An application to the Bennett-Brassard 1984 protocol through a collective-noise channel, which is robust to the Trojan horse attack, is also given.  相似文献   

14.
We propose a novel quantum key distribution scheme by using the SAM-OAM hybrid entangled state as the physical resource.To obtain this state,the polarization entangled photon pairs are created by the spontaneous parametric down conversion process,and then,the q-plate acts as a SAM-to-OAM transverter to transform the polarization entangled pairs into the hybrid entangled pattern,which opens the possibility to exploit the features of the higher-dimensional space of OAM state to encode information.In the manipulation and encoding process,Alice performs the SAM measurement by modulating the polarization stateπ lθx on one photon,whereas Bob modulates the OAM sector state lx' on the other photon to encode his key elements using the designed holograms which is implemented by the computer-controlled SLM.With coincidence measurement,Alice could extract the key information.It is showed that N-based keys can be encoded with each pair of entangled photon,and this scheme is robust against Eve’s individual attack.Also,the MUBs are not used.Alice and Bob do not need the classical communication for the key recovery.  相似文献   

15.
We propose a quantum error-rejection scheme for direct communication with three-qubit quantum codes based on the direct communication of secret messages without any secret key shared in advance. Given the symmetric and independent errors of the transmitted qubits, our scheme can tolerate a bit of error rate up to 33.1%, thus the protocol is deterministically secure against any eavesdropping attack even in a noisy channel.  相似文献   

16.
We present a robust (n, n)-threshold scheme for multiparty quantum secret sharing of key over two collectivenoise channels (i.e., the collective dephasing channel and the collective rotating channel) via three-photon mixed states, In our scheme, only if all the sharers collaborate together can they establish a joint key with the message sender and extract the secret message from the sender's encrypted message. This scheme can be implemented using only a Bell singlet, a one-qubit state and polarization identification of single photon, so it is completely feasible according to the present-day technique.  相似文献   

17.
In 1998, M.S. Baptista proposed a chaotic cryptosystem using the ergodicity property of the simple low-dimensional and chaotic logistic equation. Since then, many cryptosystems based on Baptista's work have been proposed. However, over the years research has shown that this cryptosystem is predictable and vulnerable to attacks and is widely discussed. Among the weaknesses are the non-uniform distribution of ciphertexts and succumbing to the one-time pad attack (a type of chosen plaintext attack). In this Letter, our objective is to modify the chaotic cryptographic scheme proposed previously. We use a matrix secret key such that the cryptosystem would no longer succumb to the one-time pad attack.  相似文献   

18.
基于Q-plate提出了一种对两幅图像做非对称偏振加密的新方法.在该方法中,首先,将待加密的两幅图像通过干涉分解成两块纯相位板;其次,将这两块纯相位板分别编码到偏振光的两个正交分量中;最后,利用Q-plate和像素化的偏振片改变这束光的偏振分布,达到对图像的加密效果,用电荷耦合器件接收输出面的强度分布图作为最终的密文.其中一块纯相位板作为解密密钥.算法的解密密钥不同于加密密钥,由此实现了非对称加密.由于Q-plate是电调控的,它的每个像素点的光轴各不相同,所以能够根据描述变面结构空间旋转率的常数q来改变每个像素的偏振态.加密过程中用Q-plate的q值和像素化的偏振片的偏振角度作为加密密钥,这两个加密密钥具有很高的敏感性,极大地提高了算法的安全性.数值模拟结果验证了该方法的可行性和有效性.  相似文献   

19.
An improved quantum key distribution scheme via single-photon two-qubit states is proposed. The input–output model of the polarization state is established. And the influence of the interferometers to the polarization state is analyzed. Quantum bit error rate of polarization coding caused by birefringent and coordinate system difference between incident light and the fast and slow axes in fiber interferometer is simulated. Furthermore, maintaining conditions of polarization state are given on this basis.  相似文献   

20.
Measurement-device-independent quantum key distribution(MDI-QKD) eliminates all loopholes on detection.Previous experiments of time-bin phase-encoding MDI-QKD allow a factor of 3/4 loss in the final key for the incapability of identifying two successive detection events by a single photon detector.Here we propose a new scheme to realize the time-bin phase-encoding MDI-QKD.The polarization states are used to generate the time bins and the phase-encoding states.The factor of loss in the final key is eliminated by using four single photon detectors at the measurement site.We show the feasibility of our scheme with a proof-of-principle experimental demonstration.The phase reference frame is rotated extremely slowly with only passive stabilization measures.The quantum bit error rate can reach 0.8% in the Z-basis and 26.2% in the X-basis.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号