共查询到19条相似文献,搜索用时 343 毫秒
1.
2.
由于重要的应用需求牵引,量子密码技术在最近的两年内取得了长足的进步,传输距离延长了近100公里,稳定性和安全性也都有大幅度的提高.本文基于国内外的最新报道和作者的实际体会,对量子密码术研究的关键性进展进行了评述.鉴于量子密码技术已近实用化,作者提出了建立我国量子密码系统安全评价标准的建议.最后,本文还讨论了量子密码技术目前面临的问题和可能的发展方向. 相似文献
3.
4.
5.
6.
7.
8.
9.
光纤耦合对量子密钥分配系统光子探测的影响 总被引:1,自引:1,他引:0
借助量子密码术和卫星可以实现全球性的保密通信网络。但使用现有的单光子探测模块搭建星地量子密钥分配(QKD)系统,接收端就面临着空间光-多模光纤耦合的技术挑战。空间光-多模光纤耦合条件对星地量子密钥分配系统的跟瞄精度提出了严格要求。理论分析和定量计算表明,跟瞄精度ε与光束发散角θdiv的比值ε/dθiv≤0.5时,星地量子密钥分配系统的光子探测概率较高,系统可以正常工作;ε/dθiv≤0.1时,系统处于量子密钥产生速率为几kb/s的更理想状况。采用短波长更有利于满足空间光-多模光纤耦合条件,同时有利于系统获得更高的密钥产生速率。 相似文献
10.
量子密码技术开辟通信安全新时代 总被引:1,自引:0,他引:1
2004年6月3日,世界上第一个量子密码通信网络在美国马萨诸塞州剑桥城正式投入运行。主持这套网络建设的是美国BBN技术公司。新的量子密码通信网络已成功地实现了该公司与哈佛大学之间的连接,不久将延伸至波士顿大学。新的量子密码通信网络与现有因特网技术完全兼容,网络传输距离约为10千米。这个由美国BBN技术公司研发的量子密码通信网络和现有的宽带网并没有太大的不同---采用普通光纤传输数据,并且与普通网络完全兼容。与普通网络不同的是,该网络中传输的数据采用了量子密码技术进行加密。 相似文献
11.
Quantum key distribution enables unconditionally secure key distribution between two legitimate users.The information-theoretic security is guaranteed by the fundamental laws of quantum physics.Initially,the quantum key distribution protocol was proposed based on the qubits.Later on,it was found that quantum continuous variables can also be exploited for this target.The continuous variable quantum key distribution can build upon standard telecommunication technology and exhibits a higher secret key rate per pulse at a relatively short distance due to the possibility of encoding more than 1 bit per pulse.In this article,we review the current status of the continuous variable quantum key distribution research,including its basic principle,experimental implementations,security and future directions;the experimental progress in this field made by our group is also presented. 相似文献
12.
In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noneloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical devices used in the system are imperfect, which can be exploited by the eavesdropper to partially or totally spy the secret key between the legitimate parties. In this article, we first briefly review the recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally, then we will present our recent hacking works in details, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Those quantum attack reminds people to improve the security existed in practical QKD systems due to imperfect devices by simply adding countermeasure or adopting a totally different protocol such as measurement-device independent protocol to avoid quantum hacking on the imperfection of measurement devices [Lo, et al., Phys. Rev. Lett., 2012, 108: 130503]. 相似文献
13.
14.
Uncertainty relations take a crucial and fundamental part in the frame of quantum theory, and are bringing on many marvelous applications in the emerging field of quantum information sciences. Especially, as entropy is imposed into the uncertainty principle, entropy‐based uncertainty relations lead to a number of applications including quantum key distribution, entanglement witness, quantum steering, quantum metrology, and quantum teleportation. Herein, the history of the development of the uncertainty relations is discussed, especially focusing on the recent progress with regard to quantum‐memory‐assisted entropic uncertainty relations and dynamical characteristics of the measured uncertainty in some explicit physical systems. The aims are to help deepen the understanding of entropic uncertainty relations and prompt further explorations for versatile applications of the relations on achieving practical quantum tasks. 相似文献
15.
量子保密通信包括量子密钥分发、量子安全直接通信和量子秘密共享等主要形式.在量子密钥分发和秘密共享中,传输的是随机数而不是信息,要再经过一次经典通信才能完成信息的传输.在量子信道直接传输信息的量子通信形式是量子安全直接通信.基于量子隐形传态的量子通信(简称量子隐形传态通信)是否属于量子安全直接通信尚需解释.构造了一个量子隐形传态通信方案,给出了具体的操作步骤.与一般的量子隐形传态不同,量子隐形传态通信所传输的量子态是计算基矢态,大大简化了贝尔基测量和单粒子操作.分析结果表明,量子隐形传态通信等价于包含了全用型量子密钥分发和经典通信的复合过程,不是量子安全直接通信,其传输受到中间介质和距离的影响,所以不比量子密钥分发更有优势.将该方案与量子密钥分发、量子安全直接通信和经典一次性便笺密码方案进行对比,通过几个通信参数的比较给出各个方案的特点,还特别讨论了各方案在空间量子通信方面的特点. 相似文献
16.
Subhash Kak 《Foundations of Physics Letters》2006,19(3):293-296
We present a three-stage quantum cryptographic protocol based on public key cryptography in which each party uses its own
secret key. Unlike the BB84 protocol, where the qubits are transmitted in only one direction and classical information exchanged
thereafter, the communication in the proposed protocol remains quantum in each stage. A related system of key distribution
is also described. 相似文献
17.
Lower bound for the security of differential phase shift quantum key distribution against a one-pulse-attack
下载免费PDF全文
![点击此处可从《中国物理 B》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Quantum key distribution is the art of sharing secret keys between two distant parties, and has attracted a lot of attention due to its unconditional security. Compared with other quantum key distribution protocols, the differential phase shift quantum key distribution protocol has higher efficiency and simpler apparatus. Unfortunately, the unconditional security of differential phase shift quantum key distribution has not been proved. Utilizing the sharp continuity of the von Neuman entropy and some basic inequalities, we estimate the upper bound for the eavesdropper Eve's information. We then prove the lower bound for the security of the differential phase shift quantum key distribution protocol against a one-pulse attack with Devatak-Winter's secret key rate formula. 相似文献
18.
基于量子远程通信的原理, 本文借助双模压缩真空态和相干态, 提出一种连续变量量子确定性密钥分配协议. 在利用零差探测法的情况下协议的传输效率达到了100%. 从信息论的角度分析了协议的安全性, 结果表明该协议可以安全传送预先确定的密钥. 在密钥管理中, 量子确定性密钥分配协议具有量子随机性密钥分配协议不可替代的重要地位和作用. 与离散变量量子确定性密钥分配协议相比, 该协议分发密钥的速率和效率更高, 又协议中用到的连续变量量子态易于产生和操控、适于远距离传输, 因此该协议更具有实际意义. 相似文献