共查询到16条相似文献,搜索用时 62 毫秒
1.
给出了六态扩展BB84协议的Breidbart基窃听方案,分析并计算了各种截取重发策略下的AliceEve平均交互信息量和施行QKD标准纠错手续后的有效平均交互信息量,结果显示Breidbart基窃听Breidbart基重发策略(BB策略)最为有效.考虑到Alice和Bob可以在公开讨论阶段利用废弃数据检验是否存在BB窃听以降低秘密性增强算法的强度,减少量子密钥的损失,提出了修改BB84协议的建议.给出了可能较QKD标准纠错手续更为安全的量子密钥二次生成纠错方法
关键词:
量子密码
BB84协议
Breidbart基窃听 相似文献
2.
3.
4.
提出一种新的相位编码方案,使用差分和高效BB84协议实现量子密钥分发.在保留差分编码优势的同时,此方案进一步增加系统的安全性.Alice端随机选择{0,π/2,π,3π/2}中的相位对信号脉冲进行调制,Bob端随机选择{0,π/2}中的相位对信号脉冲进行调制.为了提高成码率和简化系统,以η(η→1)的概率选取{0,π} 基对相位进行调制,此时系统运行差分编码,用于生成密钥;以(1-η)的概率选取{π/2,3π/2}基中的相位对脉冲信号进行调制.{π/2,3π/2}基的选用是为了增加系统维度和进行安全性评估,不用于生成密钥.设计相应的系统,利用微弱相干光脉冲在该新协议下进行编码,在接收端采用法拉第-迈克尔逊方式进行解码,在实验上实现了长期稳定的密钥分发,误码率<5%,传输距离达85 km. 相似文献
5.
为了改善BB84协议防窃听的能力,在BB84协议的基础上提出用M(M=3,4,5…)对量子态实现量子密钥分配。为了检测其安全性,用截获-重发的方式对量子密钥分配过程进行窃听,窃听者分别采用两种检测光子状态的方法:在M组基中随机选取一种基和用Breidbart基测量,并在这两种窃听方法下分别通过计算机仿真探究M值与安全性能的关系。仿真结果表明:用多对量子态实现量子密钥分配时,发现窃听者的能力与BB84协议相同,而窃听者可以获取的正确信息要比窃听BB84协议获取的正确信息少。从而提高了量子密钥分配的安全性。 相似文献
6.
基于BB84量子保密通信协议,利用光子的偏振态传输信息.发送方和接收方通过量子信道来传输量子态,同时双方通过一条经典信道进行基矢比对和其他信息交互,进而两边同时安全地获得和共享一份相同的密钥. 相似文献
7.
8.
9.
给出了窃听者采用各种窃听策略,使用最先进的仪器(段-郭概率量子克隆机)的条件下BB84协议的非一般安全性分析,推导出Eve使用段-郭概率量子克隆机时,Alice和Bob间的码差错率下降为20.7%,这说明BB84协议的安全性仍然有效.最后用BB84协议对量子密钥生成与分发进行了程序模拟. 相似文献
10.
11.
This work presents a quantum key agreement (QKA) based on the BB84 protocol. The newly proposed QKA protocol enables two involved parties to jointly establish a shared secret key in such a way that the shared secret key cannot be fully determined by one party alone. In contrast to the traditional key agreement protocols that must be based on some mathematical difficulties, the security of the newly proposed protocol is based on the quantum phenomena, which allows unconditional security as well as detection of eavesdroppers. With the technique of delayed measurement, the proposed protocol has 50% qubit efficiency. Therefore, it is very efficient and feasible for practical applications. 相似文献
12.
Quantum key distribution transmitter chip based on hybrid-integration of silica and lithium niobates 下载免费PDF全文
A quantum key distribution transmitter chip based on hybrid-integration of silica planar light-wave circuit (PLC) and lithium niobates (LN) modulator PLC is presented. The silica part consists of a tunable directional coupler and 400-ps delay line, and the LN part is made up of a Y-branch, with electro-optic modulators on both arms. The two parts are facet-coupled to form an asymmetric Mach-Zehnder interferometer. We successfully encode and decode four BB84 states at 156.25-MHz repetition rate. Fast phase-encoding of 0 or $\pi $ is achieved, with interference fringe visibilities 78.53% and 82.68% for states $|+\rangle$ and $|-\rangle$, respectively. With the aid of an extra off-chip LN intensity modulator, two time-bin states are prepared and the extinction ratios are 18.65 dB and 15.46 dB for states $|0\rangle$ and $|1\rangle$, respectively. 相似文献
13.
D. A. Kronberg S. N. Molotkov 《Bulletin of the Russian Academy of Sciences: Physics》2010,74(7):912-918
A quantum scheme for an optimal attack on protocol BB84, the most studied protocol of quantum cryptography, is constructed.
The physical implementation of this scheme on the basis of linear fiber-optical elements and the two-particle “controlled
NOT” quantum transformation is proposed. 相似文献
14.
15.
To guarantee the security of communication in the public channel,many key agreement protocols have been proposed.Recently,Gong et al.proposed a key agreement protocol based on chaotic maps with password sharing.In this paper,Gong et al.’s protocol is analyzed,and we find that this protocol exhibits key management issues and potential security problems.Furthermore,the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems.Through our analysis,our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks,but also solve the problems of key management and security issues existing in Gong et al.’s protocol. 相似文献
16.
提出了一种在双马赫-曾德尔干涉仪量子保密通信系统上同时实现时间编码和相位编码的混合量子密钥分发方案.提出的方案将原来相位编码方案中丢弃的脉冲进行时间编码,因此成码率是原方案的二倍.系统同时获得时间编码密钥和相位编码密钥,既可以一组用于通信,另一组用于监视窃听,又可以将两组密钥组合成新密钥.系统具有良好的应用前景.
关键词:
量子保密通信
量子密钥分发
相位编码
时间编码 相似文献