期刊文献+

连续变量量子密钥分配的量化预处理 被引量:2

Quantization preprocessing of Continuous Variable Quantum Key Distribution
原文传递
导出
摘要 从连续变量中提取出便于通信双方共享的离散值是连续变量量子密钥分配的关键技术之一,Slice量化是一种有效可行的方案。该方案能够让通信双方共享高度一致的二进制数据,为接下来进一步的数据协调和隐私放大做完善的前期工作。论文实现了Slice量化的预处理程序,该程序可以根据信道条件和实际要求计算出量化所必需的参考数据。 A critical problem in continuous variable quantum key distribution is, how to extract discrete data from continuous variables for both communication sides. Slice is an effective and feasible scheme, making both sides share highly consistent binary data, which are prepared for the following step, reconciliation and privacy amplification. This paper presents preprocessing of quantization, which can obtain useful data by inputting channel parameters and actual requirements.
出处 《信息安全与通信保密》 2009年第6期105-107,共3页 Information Security and Communications Privacy
基金 福建省自然科学基金资助项目(Z0512003)
关键词 连续变量 量子密钥分配 量化 continuous variable quantum key distribution quantization
  • 相关文献

参考文献5

  • 1Ralph T C.Continuous variable quantum cryptography[J].Phys.Rev.A,2000,61(01).
  • 2Ralph T C.Security of continuous-variable quantum cryptography[J].Phys.Rev.A 62,2000.
  • 3Iblisdir S,Assche Van G,Cerf J N.Security of quantum key distribution with coherent states and homodyne detection[J].Phys.Rev.Lett.93(2004).
  • 4Grosshans F,Grangier P.Continuous variable quantum cryptography using coherent states[J].Phys.Rev.Lett.2002,vol.88.
  • 5Van Assche G,Cardinal J,Nicolas J Cerf.Reconciliation of a quantum distributed Gaussian keyD[J].IEEE,Feb.2002,50(02) 394-400.

同被引文献14

  • 1SHANNON C E.Communication Theory of Secrecy Systems[J].Bell Syst.Tech.J.,1949,28:656-715.
  • 2MAURER U.Secret Key Agreement by Public Discussion from Common Information[J].IEEE Trans.Inf.Theory,1993,39:733-742.
  • 3AHLSWEDE R,CSISZ'AR I.Common Randomness in Information Theory and Cryptography,Part I:Secret Sharing[J].IEEE Trans.Inf.Theory,1993,39:1121-1132.
  • 4BENNETT C H,BESSETIE F,BRASSARD G,et al.Experimental Quantum Cryptography[J].J.Cryptol.,1992,05:03-28.
  • 5HERSHEY J E,HASSAN A A,YARLAGADDA R.Unconventional Cryptographic Keying Variable Management[J].IEEE Trans.Commun.,1995,43:03-06.
  • 6SASAOKA H,IWAI H.Secret Key Agreement Techniques Based on Multipath Propagation Characteristics[M].[s.l.]:Springer,2009.
  • 7YE C,REZNIK A,SHAH Y.Extracting Secrecy from Jointly Gaussian Random Variables[C].IEEE Int.Syup.Inf.Theory.Seattle,WA:IEEE ComputerSociety,2006:2593-2597.
  • 8WILSON R,TSE D,SCHOLTZ R.Channel Identification:Secret Sharing Using Reciprocity in Ultrawideband Channels[J].IEEE Trans.Inf.Foren.and Secu.,2007,02:364-375.
  • 9MATHUR S,TRAPPE W,MANDAYAM N,et al.Radiotelepathy:Extracting a Secret Key from an Unauthenticated Wireless Channel[C].14th ACM International Conference on Mobile Computing and Networking.San Francisco,CA:ACM,2008:128-139.
  • 10LIU K J,SADEK A K.Cooperative Communications and Networking[M].[s.1.]:Cambridge University Press,2009.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部