期刊文献+

量子密码与公钥密码体制

Quantum Cryptography and Public Key Cryptosystem
下载PDF
导出
摘要 现今普遍应用的公钥密码体系,其安全性建立在数学函数问题的计算复杂性基础上。随着量子计算的发展,这种密码体制的安全隐患越来越突出。量子密码安全性基于物理基本原理,具有无条件的安全性,能够实现真正意义上的保密通信。 Now widely used public key cryptosystems are based their securities on the difficulties of algebraic problems.With the development of quantum computation,the security of the public key cryptosystem has been threatened.The security of quantum cryptography is based on the laws of quantum physics and thus provides a unconditional safe way to communication.
作者 陈婕
出处 《微计算机信息》 2011年第9期179-180,共2页 Control & Automation
关键词 量子密码 公钥密码 RSA公钥密码 quantum cryptography public key cryptosystem RSA
  • 相关文献

参考文献10

  • 1朱文余,孙琦.计算机密码应用基础[M].科学出版社,2003.
  • 2Shor P W.Algorithms for Quantum Computation:Discrete Log and Factoring [J]. Proceedings of the 35th Symposium on Foundations of Computer Science.1994,124-134.
  • 3管海明.公钥密码如何应对量子计算的挑战?[J].信息安全与通信保密,2007,29(8):53-54. 被引量:2
  • 4左锋.基于多量子态的量子密钥分配[J].微计算机信息,2010,26(30):63-65. 被引量:1
  • 5Scarani V , Acin A , Robordy G,et al.Quantum Cryptography Protocols Robust against Photon Number Splitting Attacks for Weak Laser Pulse Implementations [J]. Phys Rev Lett,2004, 92 : 057901.
  • 6Koashi M. Unconditional Security of Coherent-State Quantum Key Distribution with a Strong Phase-Reference Pulse [J]. Phys Rev Lett ,2004,93:120501.
  • 7Hwang W Y. Quantum Key Distribution with High Loss: toward Global Secure Communication [J]. Phys Rev Lett,2003, 91: 057901.
  • 8Wang X B. Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography [J]. Phys Rev Lett,2005,94 : 230503.
  • 9Rosenberg D,Harrington J W, Rice P R,et al.Long-Distance Decoy-State Quantum Key Distribution in Optical Fiber[J]. Phys Rev Lett,2007,98:010503.
  • 10Manderbach T S,Weier H,Furst M,et al.Experimental Demon-stration of Free-Space Decoy-State Quantum Key Distribution over 144 km[J].Phys Rev Lett, 2007,95:010504.

二级参考文献8

  • 1陆晓亮,胡苏太.量子计算机的发展现状及趋势[J].高性能计算发展与应用,2006,(1):7-11.
  • 2唐川.16量子位量子计算机问世[J].中国科学院国家科学图书馆《科学研究动态监测快报》,2007,(4):1-3.
  • 3[4]Hoffstein J,Pipher J,Silverman J H.NTRU:ARing based Public Key Cryptosystem.Proc.of ANTS Ⅲ,LNCS 1423,pp.267-288.Springer-Verlag,1998.Crypto' 96.
  • 4[5]Okamoto T,Tanaka K,Uchiyama S.Quantum Public-Key Cryptosystems[A].CRYPT02000[C].LNCS 1880,,2000.147-165.
  • 5[6]Christopher Wolf.Multivariate Quadratic Polynomials in Public Key Cryptography.Katholieke Universiteit Leuven,Belgium,ISBN 90-5682-649-2,2005.
  • 6[1]Shor P W.Algorithms for Quantum Computation:Discrete Log and Factoring.Proceedings of the 35th Symposium on Foundations of Computer Science[C].1994,124~134.
  • 7邵博闻,欧海文.基于量子单向函数的量子门限签名方案[J].微计算机信息,2007(18):60-61. 被引量:3
  • 8陈志新,唐志列,廖常俊,刘景锋,魏正军,刘颂豪.量子保密术和保密通信[J].量子电子学报,2003,20(4):385-390. 被引量:10

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部