期刊文献+

基于BB84协议的实际QKD系统的窃听问题研究 被引量:6

Eavesdropping of Practical QKD System Based on BB84 Protocol
下载PDF
导出
摘要 基于实际量子密钥分配系统中所使用的强衰减的激光脉冲并不是单光子,量子密钥分配的信道不是无损耗的,窃听者的技术能力也不是无限的这些具体问题。 Practical implementations of quantum key distribution systems use attenuated laser pulses as the signal source rather than single photons. The channels used to transmit are lossy. On the basis of above two points, a combining eavesdropping strategy of intercept resend and beamsplitting is discussed in terms of eavesdropper′s technology requirement. At last, a maximum disturbance bound is derived for a given mean photon number and transmission length. Eavesdropper can be detected with the bound.
出处 《光子学报》 EI CAS CSCD 北大核心 2004年第11期1356-1359,共4页 Acta Photonica Sinica
基金 国家973(2001CB309300)项目 广州市(1999Z03501)资助项目
关键词 量子密钥 BB84协议 光子数统计分布 窃听策略 Quantum key BB84 protocol Photon number statistics distributing Eavesdropping strategy
  • 相关文献

参考文献6

  • 1Bennett C, Brassard G. Quantum cryptography: Public-key distribution and coin tossing.In proceedings of the IEEE International Conference on Computers,Systems and Signal Processing, Bangalore,India, New York:IEEE , 1984 .175~179
  • 2Bennett C.Quantum cryptography using any two nonorthogonal states.Phys Rev Lett,1992,68(21):3121-3124
  • 3Ekert A.Quantum cryptography based on Bell's theorem. Phys Rev Lett,1991,67(6):661-663
  • 4Ekert A, Huttner B, Peres A,et al. Eavesddropping on quantum-cryptographical systems.Phys Rev(A),1994,50(2):1047-1056
  • 5Fuchs A, Gisin N, Peres A,et al.Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy.Phys Rev(A),1997,56(2):1163-1172
  • 6Bennett C, Brassard G,Smolin J,et al. Experimental quantum cryptography.J Crypto,1992,5(1):3-28

同被引文献70

引证文献6

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部