期刊文献+

连续变量量子密钥分发协商过程的优化实现 被引量:1

原文传递
导出
摘要 连续变量量子密钥分发中的协商效率一直是限制安全密钥分发速率的主要因素,而协商效率的高低取决于所用算法的计算复杂度.文中分别对连续变量协商过程的两个主要方面区间划分方法和比特判断函数进行优化,采用Gauss近似明显提高了最优区间划分迭代算法的收敛速度,设计了高效的判断函数作为主流比特判断算法-SEC(sliced error correction)算法的估计器,明显降低了计算复杂度,极大地简化了协商算法的核心问题,提高了连续变量协商过程的效率,进而提高了连续变量安全密钥分发速率.
出处 《中国科学(F辑:信息科学)》 CSCD 2009年第10期1027-1033,共7页
基金 国家自然科学基金(批准号:60773085)资助项目
  • 相关文献

参考文献11

  • 1Cardinal J,Assche G V.Construction of a shared secret key using continuous variables. Proceedings of 2003 IEEE Information Theory Workshop(ITW2003) . 2003
  • 2Nicolas Gisin,Gregoire Ribordy,Wolfgang Tittel et al.Quantum Cryptography. Reviews of Modern Physics . 2002
  • 3Bennett CH,Brassard G.Quantum cryptography: public key distribution and coin tossing. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing . 1984
  • 4Shor P W,Preskill J.Simple proof of security of the BB84 quantum key distribution protocol. Physical Review . 2000
  • 5Lo H K,Chau H F.Unconditional security of quantum key distribution over arbitrarily long distances. Science . 1999
  • 6Maurer U M.Secret key agreement by public discussion from common information. IEEE Transactions on Information Theory . 1993
  • 7Mayers,D.Unconditional security in quantum cryptography. Journal of the ACM . 2001
  • 8Grosshans F,Grangier P.Continuous variable quantum cryptography using coherentstates. Physical Review Letters . 2002
  • 9F.Grosshans,G.Van Assche,J.Wenger,R.Brourl,N.J.Cerf,P.Grangier."Quantum key distribution using Gaussian-modulated coherent states,". Nature . 2003
  • 10Gilles Van Assche,,Jean Cardinal,Nicolas J Cerf.Reconciliation of a Quantum-Distributed Gaussian Key. IEEE Transactions on Information Theory . 2004

同被引文献13

  • 1Hershey J E, Hassan A A, Yarlagadda R. Unconventional cryptographic keying variable management. IEEE Trans Commun, 1995, 43:3-6.
  • 2Wilson R. Tse D, Scholtz R A. Channel identification: secret sharing using reciprocity in UWB channels. IEEE Trans Inform Foren Sec, 2007, 9:17-30.
  • 3Maurer U M. Secret key agreement by public discussion from common information. IEEE Trans Inform Theory, 1993, 39:733-742.
  • 4Ye C, Narayan P. Secret key and private key constructions for simple multiterminal source models. IEEE Trans Inform Theory, 2012, 58:639-651.
  • 5Khisti A, Diggavi S N, Wornel G W. Secret-key generation using correlated sources and channels. IEEE Trans Inform Theory, 2012, 58:652-670.
  • 6Chou R A, Bloch M R. One-way rate-limited sequential key-distillation. In: Proceedings of ISIT 2012-IEEE Interna- tional Symposium on Information Theory Proceedings, Cambridge, 2012. 1777-1781.
  • 7Wang Q, Xu K, Ren K. Cooperative secret key generation from phase estimation in narrow band fading channels. IEEE J Sel Area Commun, 2012. 30:1666-1674.
  • 8Xiao L, Greenstein L J, Mandayam N B, et al. Channel-based detection of Sybil attacks in wireless networks. IEEE Trans Inform Foren Sec, 2009, 4:492-503.
  • 9Polak A C, Dolatshahi S, Goeckel D L. Identifying wireless users via transmitter imperfections. IEEE J Sel Area Commun, 2011, 29:1469 -1479.
  • 10Zeng K, Govindan K, Wu D, et al. Identity-based attack detection in mobile wireless networks. In: Proceedings of INFOCOM, Shanghai, 2011. 1880-1888.

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部