首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 78 毫秒
1.
实际量子密钥分配扩展BB84协议窃听下的安全性分析   总被引:10,自引:10,他引:0  
考虑强衰减激光脉冲技术实现的准单光子源和量子信道损耗以及窃听者Eve窃听能力有限等实际情况, 提出了一种窃听装置;同时对扩展BB84协议的各种窃听做了全面分析,计算得出发送者Alice/窃听者Eve所获得的交互信息量和发送者Alice/接收者Bob所能容忍的误码率上限,以此作为检测量子信道安全性的标准,同时得出Breidbart基/分束攻击相结合的方法是比截取/重发更为有效的窃听方案.  相似文献   

2.
拥有强大破密功能的量子计算机的出现预示着传统的RSA密码算法最终将被淘汰.要对付量子计算机惊人的密码破译功能,唯一途径就是运用量子密码技术.作为量子密码术中最基本的协议,BB84协议有其独特的优势.尽管我们是一年级学生,但在《双语物理导论》课程教育理念的鼓励下,带着对量子密码的兴趣,我们小组展开了对它的初步研究,阐述了量子密码学原理及BB84协议,并就此分析了其安全性及制约因素.  相似文献   

3.
给出了窃听者采用各种窃听策略,使用最先进的仪器(段-郭概率量子克隆机)的条件下BB84协议的非一般安全性分析,推导出Eve使用段-郭概率量子克隆机时,Alice和Bob间的码差错率下降为20.7%,这说明BB84协议的安全性仍然有效.最后用BB84协议对量子密钥生成与分发进行了程序模拟.  相似文献   

4.
基于BB84量子保密通信协议,利用光子的偏振态传输信息.发送方和接收方通过量子信道来传输量子态,同时双方通过一条经典信道进行基矢比对和其他信息交互,进而两边同时安全地获得和共享一份相同的密钥.  相似文献   

5.
焦荣珍  张文翰 《物理学报》2009,58(4):2189-2192
采用包含两个伪态和一个信号态的双伪态协议分析了量子密钥分配系统的性能,比较了双伪态(真空态—弱伪态)和单伪态协议条件下密钥生成率与通信距离的关系,分析了信号态的强度、量子比特误码率、单光子的增益和单光子的误码率对系统密钥生成率的影响,得出密钥生成率的最优化条件,为实现实用安全的量子密钥分配系统奠定理论基础. 关键词: 伪态协议 量子密钥生成率 量子比特误码率  相似文献   

6.
从信息论的角度分析了一个典型的两步量子直接通信方案的安全性,计算了该量子直接通信过程中攻击者Eve所能获得的信息量及在Eve进行攻击后合法通信者所能接收的信息量,为合法者对量子直接通信的安全性判定和对敌手的检测提供了一定的依据和标准.  相似文献   

7.
研究了一个联合远程制备任意三量子比特态的方案。该方案利用广义的Bell态作为量子信道,两个发送者分别选择合适的测量基进行测量,然后利用经典信道把测量结果传送出去,接收者根据测量结果对自己手中的粒子采取适当的幺正操作,然后引入辅助粒子并进行选择性测量,就能概率性的得到想要制备的量子态。研究结果表明:利用不同形式的广义Bell态信道成功实现联合远程制备一个任意三量子比特态的概率是一样的,当量子信道处于最大纠缠态时,可以得到最大的成功概率。  相似文献   

8.
结合验证Berry几何相因子的Tycko旋转样品核四极共振实验,针对简并情况进一步发展并完善了作者之一最近提出的量子绝热微扰理论.应用这个理论,详细分析了任意自旋情况下具有核四极矩的旋转样品在射频场中的共振吸收,指出了可能的新的实验现象. 关键词:  相似文献   

9.
为研究海冰对水下量子通信信道性能的影响,基于海冰在不同的密度、盐度下的吸收与散射特性,建立了海冰参数与消光系数之间的关系、光量子信号衰减模型;根据海冰在不同密度、盐度下的消光特性,分别建立海冰参数与信道利用率、量子密钥分配系统误码率、系统成码率之间的关系并进行数据仿真。理论分析与仿真结果可为海冰环境下的水下量子通信设计提供参考。  相似文献   

10.
张秀再  刘邦宇  徐茜 《光学学报》2021,41(19):208-214
海洋矿物质颗粒是影响光子在水下传输的重要因素之一.为了研究海洋矿物质颗粒对水下量子通信信道性能的影响,建立了海洋矿物质颗粒群密度、传输距离与链路衰减的关系模型并进行了仿真.针对退极化信道,研究了矿物质颗粒群密度和传输距离与信道容量、信道误码率的关系并进行了仿真.仿真结果表明,当传输距离为50 m时,随着矿物质颗粒群密度...  相似文献   

11.
We investigate the effect of collective-rotation noise on the security of the six-state quantum key distribution. We study the case where the eavesdropper, Eve, performs an intercept-resend attack on the quantum communication between Alice, the sender, and Bob, the receiver. We first derive the collective-rotation noise model for the six-state protocol and then parameterize the mutual information between Alice and Eve. We then derive quantum bit error rate for three interceptresend attack scenarios. We observe that the six-state protocol is robust against intercept-resend attacks on collective rotation noise channels when the rotation angle is kept within certain bounds.  相似文献   

12.
In the original BB84 quantum key distribution protocol, the states are prepared and measured randomly, which lose the unmatched detection results. To improve the sifting efficiency, biased bases selection BB84 protocol is proposed. Meanwhile, a practical quantum key distribution protocol can only transmit a finite number of signals, resulting in keys of finite length. The previous techniques for finite-key analysis focus mainly on the statistical fluctuations of the error rates and yields of the qubits. However, the prior choice probabilities of the two bases also have fluctuations by taking into account the finite-size effect. In this paper, we discuss the security of biased decoy state BB84 protocol with finite resources by considering all of the statistical fluctuations. The results can be directly used in the experimental realizations.  相似文献   

13.
Security of the quantum secure direct communication protocol (i.e., the C-S QSDC protocol) recently proposed by Cao and Song [Chin. Phys. Lett. 23 (2006) 290] is analyzed in the case of considerable quantum channel noise. The eavesdropping scheme is presented, which reveals that the C-S QSDC protocol is not secure if the quantum bit error rate (QBER) caused by quantum channel noise is higher than 4.17%. Our eavesdropping scheme induces about 4.17% QBER for those check qubits. However, such QBER can be hidden in the counterpart induced by the noisy quantum channel if the eavesdropper Eve replaces the original noisy channel by an ideal one. Furthermore, if the QBER induced by quantum channel noise is lower than 4.17%, then in the eavesdropping scheme Eve still can eavesdrop part of the secret messages by safely attacking a fraction of the transmitted qubits. Finally, an improvement on the C-S QSDC protocol is put forward.  相似文献   

14.
In this paper, we propose a deterministic secure quantum communication (DSQC) protocol based on the BB84 system. We developed this protocol to include quantum entity authentication in the DSQC procedure. By first performing quantum entity authentication, it was possible to prevent third-party intervention. We demonstrate the security of the proposed protocol against the intercept-and-re-send attack and the entanglement-and-measure attack. Implementation of this protocol was demonstrated for quantum channels of various lengths. Especially, we propose the use of the multiple generation and shuffling method to prevent a loss of message in the experiment.  相似文献   

15.
In this paper,two information leakage resistant quantum dialogue(QD)protocols over a collective-noise channel are proposed.Decoherence-free subspace(DFS)is used to erase the influence from two kinds of collective noise,i.e.,collective-dephasing noise and collective-rotation noise,where each logical qubit is composed of two physical qubits and free from noise.In each of the two proposed protocols,the secret messages are encoded on the initial logical qubits via two composite unitary operations.Moreover,the single-photon measurements rather than the Bell-state measurements or the more complicated measurements are needed for decoding,making the two proposed protocols easier to implement.The initial state of each logical qubit is privately shared between the two authenticated users through the direct transmission of its auxiliary counterpart.Consequently,the information leakage problem is avoided in the two proposed protocols.Moreover,the detailed security analysis also shows that Eve’s several famous active attacks can be effectively overcome,such as the Trojan horse attack,the intercept-resend attack,the measure-resend attack,the entangle-measure attack and the correlation-elicitation(CE)attack.  相似文献   

16.
杨静  王川  张茹 《中国物理 B》2010,19(11):110311-110311
An improved quantum secure direct communication (QSDC) protocol is proposed in this paper.Blocks of entangled photon pairs are transmitted in two steps in which secret messages are transmitted directly.The single logical qubits and unitary operations under decoherence free subspaces are presented and the generalized Bell states are constructed which are immune to the collective noise.Two steps of qubit transmission are used in this protocol to guarantee the security of communication.The security of the protocol against various attacks are discussed.  相似文献   

17.
We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostr\"{o} m and Felbinger [Phys. Rev. Lett. 89, 187902 (2002)] in a noise channel. The vicious eavesdropper, Eve, intercepts and measures the travel photon transmitted between the sender and the receiver. Then she replaces the quantum signal with a multi-photon signal in the same state, and measures the returned photons with the measuring basis, with which Eve prepares the fake signal except for one photon. This attack increases neither the quantum channel losses nor the error rate in the sampling instances for eavesdropping check. It works for eavesdropping the secret message transmitted with the ping-pong protocol. Finally, we propose a way for improving the security of the ping-pong protocol.  相似文献   

18.
马鸿洋  秦国卿  范兴奎  初鹏程 《物理学报》2015,64(16):160306-160306
提出和研究了噪声情况下的量子网络直接通信. 通信过程中所有量子节点共享多粒子Greenberger-Horne-Zeilinger (GHZ)量子纠缠态; 发送节点将手中共享的GHZ态的粒子作为控制比特、传输秘密信息的粒子作为目标比特, 应用控制非门(CNOT)操作; 每个接收节点将手中共享GHZ 态的粒子作为控制比特、接收到的秘密信息粒子作为目标比特, 再次应用CNOT门操作从而获得含误码的秘密信息. 每个接收节点从秘密信息中提取部分作为检测比特串, 并将剩余的秘密信息应用奇偶校验矩阵纠正其中存在的比特翻转错误, 所有接收节点获得纠正后的秘密信息. 对协议安全、吞吐效率、通信效率等进行了分析和讨论.  相似文献   

19.
为了研究非线性相位噪声对差分正交相移键控(DQPSK)调制系统性能的影响,在理论推导非线性相位噪声数学模型的基础上,通过固定接收端信噪比不变,仿真分析了40Gb/s速率时DQPSK调制系统误码率随输入信噪比的变化情况。结果表明:与二进制差分相移键控(DPSK)调制相比,DQPSK调制对非线性相位噪声的影响更为敏感,当非线性效应较大时,非线性相位噪声将使系统误码率显著增大,严重影响系统通信质量。因此,当采用DQPSK调制时,必须考虑非线性相位噪声对系统性能的影响。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号