共查询到19条相似文献,搜索用时 78 毫秒
1.
2.
3.
给出了窃听者采用各种窃听策略,使用最先进的仪器(段-郭概率量子克隆机)的条件下BB84协议的非一般安全性分析,推导出Eve使用段-郭概率量子克隆机时,Alice和Bob间的码差错率下降为20.7%,这说明BB84协议的安全性仍然有效.最后用BB84协议对量子密钥生成与分发进行了程序模拟. 相似文献
4.
基于BB84量子保密通信协议,利用光子的偏振态传输信息.发送方和接收方通过量子信道来传输量子态,同时双方通过一条经典信道进行基矢比对和其他信息交互,进而两边同时安全地获得和共享一份相同的密钥. 相似文献
5.
6.
7.
8.
9.
10.
11.
Intercept-resend attack on six-state quantum key distribution over collective-rotation noise channels 下载免费PDF全文
We investigate the effect of collective-rotation noise on the security of the six-state quantum key distribution. We study the case where the eavesdropper, Eve, performs an intercept-resend attack on the quantum communication between Alice, the sender, and Bob, the receiver. We first derive the collective-rotation noise model for the six-state protocol and then parameterize the mutual information between Alice and Eve. We then derive quantum bit error rate for three interceptresend attack scenarios. We observe that the six-state protocol is robust against intercept-resend attacks on collective rotation noise channels when the rotation angle is kept within certain bounds. 相似文献
12.
In the original BB84 quantum key distribution protocol, the states are prepared and measured randomly, which lose the unmatched detection results. To improve the sifting efficiency, biased bases selection BB84 protocol is proposed. Meanwhile, a practical quantum key distribution protocol can only transmit a finite number of signals, resulting in keys of finite length. The previous techniques for finite-key analysis focus mainly on the statistical fluctuations of the error rates and yields of the qubits. However, the prior choice probabilities of the two bases also have fluctuations by taking into account the finite-size effect. In this paper, we discuss the security of biased decoy state BB84 protocol with finite resources by considering all of the statistical fluctuations. The results can be directly used in the experimental realizations. 相似文献
13.
YUAN Hao LIU Yin-Min ZHANG Wen ZHANG Zhan-Jun 《理论物理通讯》2008,49(1):103-106
Security of the quantum secure direct communication protocol (i.e., the C-S QSDC protocol) recently proposed by Cao and Song [Chin. Phys. Lett. 23 (2006) 290] is analyzed in the case of considerable quantum channel noise. The eavesdropping scheme is presented, which reveals that the C-S QSDC protocol is not secure if the quantum bit error rate (QBER) caused by quantum channel noise is higher than 4.17%. Our eavesdropping scheme induces about 4.17% QBER for those check qubits. However, such QBER can be hidden in the counterpart induced by the noisy quantum channel if the eavesdropper Eve replaces the original noisy channel by an ideal one. Furthermore, if the QBER induced by quantum channel noise is lower than 4.17%, then in the eavesdropping scheme Eve still can eavesdrop part of the secret messages by safely attacking a fraction of the transmitted qubits. Finally, an improvement on the C-S QSDC protocol is put forward. 相似文献
14.
Youn-Chang Jeong Se-Wan Ji Changho Hong Hee Su Park Jingak Jang 《Entropy (Basel, Switzerland)》2020,22(11)
In this paper, we propose a deterministic secure quantum communication (DSQC) protocol based on the BB84 system. We developed this protocol to include quantum entity authentication in the DSQC procedure. By first performing quantum entity authentication, it was possible to prevent third-party intervention. We demonstrate the security of the proposed protocol against the intercept-and-re-send attack and the entanglement-and-measure attack. Implementation of this protocol was demonstrated for quantum channels of various lengths. Especially, we propose the use of the multiple generation and shuffling method to prevent a loss of message in the experiment. 相似文献
15.
YE TianYu 《中国科学:物理学 力学 天文学(英文版)》2014,57(12):2266-2275
In this paper,two information leakage resistant quantum dialogue(QD)protocols over a collective-noise channel are proposed.Decoherence-free subspace(DFS)is used to erase the influence from two kinds of collective noise,i.e.,collective-dephasing noise and collective-rotation noise,where each logical qubit is composed of two physical qubits and free from noise.In each of the two proposed protocols,the secret messages are encoded on the initial logical qubits via two composite unitary operations.Moreover,the single-photon measurements rather than the Bell-state measurements or the more complicated measurements are needed for decoding,making the two proposed protocols easier to implement.The initial state of each logical qubit is privately shared between the two authenticated users through the direct transmission of its auxiliary counterpart.Consequently,the information leakage problem is avoided in the two proposed protocols.Moreover,the detailed security analysis also shows that Eve’s several famous active attacks can be effectively overcome,such as the Trojan horse attack,the intercept-resend attack,the measure-resend attack,the entangle-measure attack and the correlation-elicitation(CE)attack. 相似文献
16.
An improved quantum secure direct communication (QSDC) protocol is proposed in this paper.Blocks of entangled photon pairs are transmitted in two steps in which secret messages are transmitted directly.The single logical qubits and unitary operations under decoherence free subspaces are presented and the generalized Bell states are constructed which are immune to the collective noise.Two steps of qubit transmission are used in this protocol to guarantee the security of communication.The security of the protocol against various attacks are discussed. 相似文献
17.
We introduce an attack scheme for eavesdropping freely the ping-pong
quantum communication protocol proposed by Bostr\"{o} m and Felbinger
[Phys. Rev. Lett. 89, 187902 (2002)] in a noise channel.
The vicious eavesdropper, Eve, intercepts and measures the travel
photon transmitted between the sender and the receiver. Then she
replaces the quantum signal with a multi-photon signal in the same
state, and measures the returned photons with the measuring basis,
with which Eve prepares the fake signal except for one photon. This
attack increases neither the quantum channel losses nor the error
rate in the sampling instances for eavesdropping check. It works for
eavesdropping the secret message transmitted with the ping-pong
protocol. Finally, we propose a way for improving the security of
the ping-pong protocol. 相似文献
18.
提出和研究了噪声情况下的量子网络直接通信. 通信过程中所有量子节点共享多粒子Greenberger-Horne-Zeilinger (GHZ)量子纠缠态; 发送节点将手中共享的GHZ态的粒子作为控制比特、传输秘密信息的粒子作为目标比特, 应用控制非门(CNOT)操作; 每个接收节点将手中共享GHZ 态的粒子作为控制比特、接收到的秘密信息粒子作为目标比特, 再次应用CNOT门操作从而获得含误码的秘密信息. 每个接收节点从秘密信息中提取部分作为检测比特串, 并将剩余的秘密信息应用奇偶校验矩阵纠正其中存在的比特翻转错误, 所有接收节点获得纠正后的秘密信息. 对协议安全、吞吐效率、通信效率等进行了分析和讨论. 相似文献
19.
为了研究非线性相位噪声对差分正交相移键控(DQPSK)调制系统性能的影响,在理论推导非线性相位噪声数学模型的基础上,通过固定接收端信噪比不变,仿真分析了40Gb/s速率时DQPSK调制系统误码率随输入信噪比的变化情况。结果表明:与二进制差分相移键控(DPSK)调制相比,DQPSK调制对非线性相位噪声的影响更为敏感,当非线性效应较大时,非线性相位噪声将使系统误码率显著增大,严重影响系统通信质量。因此,当采用DQPSK调制时,必须考虑非线性相位噪声对系统性能的影响。 相似文献