首页 | 本学科首页   官方微博 | 高级检索  
     

基于弱相干光的实际QKD系统的安全性研究
引用本文:张东升,权菊香,周春源,丁良恩. 基于弱相干光的实际QKD系统的安全性研究[J]. 量子光学学报, 2006, 12(3): 135-138
作者姓名:张东升  权菊香  周春源  丁良恩
作者单位:光谱学与波谱学教育部重点实验室,华东师范大学,物理系,上海,200062;光谱学与波谱学教育部重点实验室,华东师范大学,物理系,上海,200062;光谱学与波谱学教育部重点实验室,华东师范大学,物理系,上海,200062;光谱学与波谱学教育部重点实验室,华东师范大学,物理系,上海,200062
基金项目:上海市重点学科项目,国家重点基础研究发展规划(973)项目(001CB309301)
摘    要:实际量子密钥分发系统使用的单光子源主要是由弱激光脉冲经衰减得到。它不是理想单光子源而是服从泊松分布的准单光子源。每个非空光脉冲中包含多光子的概率不为零,强大的窃听者可利用此获得一些关于最终密钥的信息。因此,有必要研究实际QKD系统的安全性。采用对多光子进行分束窃听、单光子最佳攻击相结合的方案,用Shannon信息理论分析了基于弱相干光的实际QKD系统的安全性。研究结果表明实际QKD系统对于分束窃听和最佳攻击是安全的,并给出合法通信双方在该攻击方案下所容忍的误码率上限。

关 键 词:量子密钥  分束窃听  最佳攻击  保密增强
文章编号:1007-6654(2006)03-0135-04
收稿时间:2005-08-20
修稿时间:2005-08-20

Security Research of Practical QKD System Based on Weak Coherent Light
ZHANG Dong-sheng,QUAN Ju-xiang,ZHOU Chun-yuan,DING Liang-en. Security Research of Practical QKD System Based on Weak Coherent Light[J]. Acta Sinica Quantum Optica, 2006, 12(3): 135-138
Authors:ZHANG Dong-sheng  QUAN Ju-xiang  ZHOU Chun-yuan  DING Liang-en
Affiliation:Key Laboratory of Optics and Magnetic Resonance Spectroscopy and Department of Physics, East China Normal University, Shanghai 200062, China
Abstract:The single-photon sources used in most of the practical QKD systems are obtained through attenuating the weak laser pulse. It is not a perfect single-photon source,but is a quasi-single-photon source which follows the Poissonian distribution. The probability of every nonempty light pulse containing multiphoton is nonzero,the powerful eavesdropper(Eve)can take advantage of this to obtain some information about the final key. So it is necessary to study the security of the practical QKD system. Supposing,Eve launches photon-number-splitting(PNS)attack on multiphoton signals,and optimal attack(OA)on single-photon signals,adopting Shannon's information theory to analyze the security of the practical QKD system based on weak coherent light. The result shows that the practical QKD system is secure against the attacks of PNS and OA,and the upper bound of the error rate that the legitimate users(Alice and Bob)can tolerate is also derived from are study.
Keywords:quantum key  photon-number-splitting (PNS)  optimal attack(OA)  privacy amplification
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号