首页 | 本学科首页   官方微博 | 高级检索  
     

基于恶意攻击的多用户量子信令损伤模型及 诱骗态修复策略
引用本文:李超,聂敏,刘晓慧. 基于恶意攻击的多用户量子信令损伤模型及 诱骗态修复策略[J]. 光子学报, 2014, 41(3): 339-342. DOI: 10.3788/gzxb20124103.0339
作者姓名:李超  聂敏  刘晓慧
作者单位:1. 西安邮电学院 通信与信息工程学院, 西安 710061;
2. 西安电子科技大学 ISN国家重点实验室, 西安 710071
基金项目:国家自然科学基金(No. 61172071)、陕西省自然科学基础研究计划(No. 2010JM8021)、陕西省教育厅自然科学研究项目(No. 2010JK834)和西安邮电学院青年教师科研基金(No. ZL2010-05)资助
摘    要:本文提出了一个多用户量子信令传输系统,并详细阐述了信令在信道中的传输过程.研究了传输过程中信令受到第三方恶意攻击的损伤模型,并将诱骗态的思想引入量子信令安全的直接通信中,分析了采用不同光强来发送光脉冲,以克服光子数分裂攻击的问题,从而提高了信令传输的安全性.仿真结果表明,本文所提出的对多用户信令攻击的修复策略可有效地检测到光子数分裂数攻击,并增加了安全传输距离,从而保证信令传输过程安全有效的进行.

关 键 词:多用户量子信令  信令传输  安全性  光子数分裂攻击  诱骗态
收稿时间:2011-11-22

The Damage Model of Quantun Signaling of Multi-user Based on Malicious Attack and Repair Strategy
LI Chao,NIE Min,LIU Xiao-hui. The Damage Model of Quantun Signaling of Multi-user Based on Malicious Attack and Repair Strategy[J]. Acta Photonica Sinica, 2014, 41(3): 339-342. DOI: 10.3788/gzxb20124103.0339
Authors:LI Chao  NIE Min  LIU Xiao-hui
Affiliation:1. School of Communication and Information Engineering, Xi'an University of Post and Telecommunication, Xi'an 710061, China;
2. State Key Laboratory of ISN, Xidian University, Xi'an 710071, China
Abstract:A quantum signaling transmission system of multi-user is presented, and the transmission process signaling channel is introduced. The damage model maliciously attacked by the third party is analyzed in the transmission process, and the idea of decoy state is introduced to the safety of quantum signaling in direct communication. To overcome photon number splitting(PNS) attack, light pulses are sent using different light intensities, which also improve the safety of the signal transmission. The simulation result shows that repair strategy of multi-user quantum signaling transmission system being attacked can effective detect the PNS attack,and increase distance of security transmission, to ensure the signaling transmission process safely and effectively.
Keywords:Multi-user quantum signaling  Signaling transfer  Security  Photon number splitting attack  Decoy state
点击此处可从《光子学报》浏览原始摘要信息
点击此处可从《光子学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号