期刊文献+

基于多量子态的量子密钥分配 被引量:1

Quantum Key Distribution Based on Multi-state
下载PDF
导出
摘要 给出了量子密钥分配的基本原理,介绍了一个量子密钥分配协议,六态测量基加密量子密钥分配方案,总结了量子密钥分配协议的国内外实验成果。 The basic principle of quantum key distribution is given.A scheme called six-state quantum key distribution scheme with measuring-basis encryption is introduced.Some experimental results of quantum key distribution scheme are summarised.
作者 左锋
出处 《微计算机信息》 2010年第30期63-65,共3页 Control & Automation
关键词 量子密码 量子密钥分配 六态测量基加密量子密钥分配方案 quantum cryptography quantum key distribution six-state quantum key distribution scheme with measuring-basis encryption
  • 相关文献

参考文献2

二级参考文献15

  • 1吕欣,马智,冯登国.量子消息认证协议[J].通信学报,2005,26(5):44-49. 被引量:3
  • 2张声雷.基于量子计算机的数据库搜索[J].微计算机信息,2006(01X):184-186. 被引量:2
  • 3Wiesner S.Conjugate coding[J].Sigact News,1983,15(1):78-88.
  • 4Bennett C H,Brassard G.An update on quantum cryptography[A].Advances in Cryptology:Proceedings of Crypto 84[C].Springer-Ver-lag,1984,475-480.
  • 5D.Gottesman,I.Chuang,Quantum digital signatures,Technical report,available at http://arxiv.org/abs/quant-ph/0105032,2001.
  • 6G.Zeng and K.Christoph,An arbitrated quantum signature scheme[J],Physical review A,Vol.65,pp.042312,2002.
  • 7Xin Lü,Deng-guo Feng,Quantum digital signature based on quantum one-way functions,Technical report,available at http://arxiv.org/abs/quant-ph/0403046,2003.
  • 8M.Nielson,I.Chuang,Quantum computation and quantum Information[A],Cambridge university press2000.
  • 9H.Buhrman,R.Cleve,J.Watrous and R.Wolf,Quantum fingerprinting,Physical Review letters[J],Vol.87,pp.167902-167904,2001.
  • 10P.Boykin,V.Roychowdury,Optimal encryption of quantum bits,Physical review A,Vol.67,pp.0423171-0423175,2003.

共引文献11

同被引文献9

  • 1管海明.公钥密码如何应对量子计算的挑战?[J].信息安全与通信保密,2007,29(8):53-54. 被引量:2
  • 2朱文余,孙琦.计算机密码应用基础[M].科学出版社,2003.
  • 3Shor P W.Algorithms for Quantum Computation:Discrete Log and Factoring [J]. Proceedings of the 35th Symposium on Foundations of Computer Science.1994,124-134.
  • 4Scarani V , Acin A , Robordy G,et al.Quantum Cryptography Protocols Robust against Photon Number Splitting Attacks for Weak Laser Pulse Implementations [J]. Phys Rev Lett,2004, 92 : 057901.
  • 5Koashi M. Unconditional Security of Coherent-State Quantum Key Distribution with a Strong Phase-Reference Pulse [J]. Phys Rev Lett ,2004,93:120501.
  • 6Hwang W Y. Quantum Key Distribution with High Loss: toward Global Secure Communication [J]. Phys Rev Lett,2003, 91: 057901.
  • 7Wang X B. Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography [J]. Phys Rev Lett,2005,94 : 230503.
  • 8Rosenberg D,Harrington J W, Rice P R,et al.Long-Distance Decoy-State Quantum Key Distribution in Optical Fiber[J]. Phys Rev Lett,2007,98:010503.
  • 9Manderbach T S,Weier H,Furst M,et al.Experimental Demon-stration of Free-Space Decoy-State Quantum Key Distribution over 144 km[J].Phys Rev Lett, 2007,95:010504.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部