期刊文献+

量子密钥分配协议在概率克隆/重发攻击下的安全性 被引量:4

The Security of Quantum Key Distribution under Probabilistic Clone/Resend Attack
下载PDF
导出
摘要 该文基于概率克降理论提出了一种量子密钥分配协议的攻击策略,密钥攻击者通过概率克隆机将发送端发送的量子态进行概率克隆,并根据自已的结果重新产生一个新的量子态发送给接收端。理论计算证明了量子密钥分配协议在这种攻击策略下仍具有足够的安全性。在经典计算机上设计并仿真量子密钥分配过程,仿真结果与理论分析相吻合。 In this paper, an attack scheme based on probabilistic cloning machine is proposed, where the eavesdropper measures the quantum state from sender with a probabilitstic cloning machine, and resends the receiver a new result. It is shown that there is still an asymptotic perfect security of quantum key distribution under this attack strategy. The simulation results on classical computer are consistent with the theoretic ones.
出处 《电子与信息学报》 EI CSCD 北大核心 2005年第10期1639-1642,共4页 Journal of Electronics & Information Technology
基金 国家自然科学基金(60272066)江苏省高校自然科学基金(03KJB510091)资助课题
关键词 攻击策略 量子密钥分配协议 不可克隆理论 概率克隆机 Attack strategy, Quantum key distribution, No-clone theorem, Probabilistic cloning machine
  • 相关文献

参考文献12

  • 1Gottesman D, Lo Hoi-Kwong. Proof of security of quantum key distribution with two-way classical communications [J]. IEEE Trans. on Info. Theory, 2003, 49(2): 457 - 475.
  • 2Bennett C H, Brassard G. Quantum cryptography: public-key distribution and coin tossing [A], Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing[C]. Bangalore, India. 1984: 175- 179.
  • 3BruB D. Optimal eavesdropping in quantum cryptography with six states [J]. Phy. Rev. Lett., 1998, 32(14): 3018 - 3021.
  • 4Gisin N, et al.. Quantum cryptography[J]. Rev. Mod. Phys, 2002,74(1): 145 - 195.
  • 5Bihan E, et al.. Security of quantum key distribution against all collective attacks[EB/OL], available at http:∥xxx.lanl.gov/quant ph/ 9801022, 1998.
  • 6Duan Lu-Ming, Guo Guang-Can. A probabilistic cloning machine for replicating two non-orthogonal states [J], Phys. Lett., 1998, A 243:26 - 264.
  • 7Duan Lu-Ming, Guo Guang-Can. Probabilistic cloning and identification of linearly independent quantum states [J]. Phy. Rev.Lett., 1998, 80(22): 4999 - 5002.
  • 8Volovich I V, Volovich Ya I. On classical and quantum cryptography [EB/OL], available at http:∥xxx.lanl.gov/quant-ph/0108133, 2001.
  • 9Bennett C H, et al.. Generalized privacy amplification [J]. IEEE Trans. on Info. Theory, 1995, 41(6): 1915- 1923.
  • 10Lo Hoi-Kwong. Proof of unconditional security of six-state quantum key distribution scheme [EB/OL], available at http:∥xxx.anl.gov/quant-ph/0102138, 2001.

二级参考文献16

  • 1JAN C A, VAN DER LUBBE. Information theory[M]. Cambridge UK: Cambridge University Press, 1997,334-337.
  • 2VOLOVICH I V, VOLOVICH YA I. On classical and quantum cryptography[EB/OL]. ArXiv:quant-ph/0108133,2001-08-29.
  • 3SHOR P W. Algorithms for quantum computation: discrete logarithms and factoring [A]. Proc of the 35th Annual Symp on Foundations of Computer Science [C]. New Mexico: IEEE Computer Society Press. 1994, 124-134.
  • 4SHOR P W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer[J]. SIAM Journal on Computing, 1997, 26(5) : 1484-1509.
  • 5BENNETT C H, BRASSARD G. Quantum cryptography: public key distribution and coin tossing[A]. Proc IEEE Int Conf Computers, Systems and Signal Processing[C]. Bangalore(India): 1984, 175-179.
  • 6BENNETT C H. Quantum cryptography using any two non-orthogonal states[J]. Phys Rev Lett, 1992, 68: 3121-3124.
  • 7DAGMAR BRU. Optimal eavesdropping in quantum cryptography with six states[J]. Phy Rev Lett, 1998, 32 (14) : 3018-3021.
  • 8EKERT A. Quantum cryptography based on Bell's theorem[J]. Phys Rev Lett, 1991, 67: 661-663.
  • 9BENNETT C H, BESSETTE F, BRASSARD G, et al. Experimental quantum cryptography[J]. Journal Cryptology, 1992, 5:3-28.
  • 10HUGHES R J, et al. Practical free-space quantum cryptography [A]. Quantum Computing and Quantum Communications (QCQC'98) [C]. 1998, 200-213.

共引文献4

同被引文献26

引证文献4

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部