期刊文献+

The security of decoy state protocol in the partial photon number splitting attack 被引量:1

The security of decoy state protocol in the partial photon number splitting attack
原文传递
导出
摘要 The decoy state protocol was proposed to overcome the primitive photon number splitting attack.When using a better strategy,the attacker can ensure that the ratio of the overall gain of the signal state pulse against the decoy state pulse changes very little,even to keep the overall gain of the signal state pulses equal to that obtained without attacker.In this paper we first give a model of the partial photon number splitting attack which contains the original one,and then find that the decoy state protocol still works effectively under the partial photon number splitting attack. The decoy state protocol was proposed to overcome the primitive photon number splitting attack. When using a better strategy, the attacker can ensure that the ratio of the overall gain of the signal state pulse against the decoy state pulse changes very little, even to keep the overall gain of the signal state pulses equal to that obtained without attacker. In this paper we first give a model of the partial photon number splitting attack which contains the original one, and then find that the decoy state protocol still works effectively under the partial photon number splitting attack.
出处 《Chinese Science Bulletin》 SCIE EI CAS 2013年第31期3859-3862,共4页
基金 supported by the National Basic Research Program of China(2011CBA00200 and 2011CB921200) the National Natural Science Foundation of China(60921091 and 61101137) China Postdoctoral Science Foundation(2012M511419) Technology projects funded of State Grid Corporation(XX17201200028)
关键词 攻击者 光子数 诱骗 分束 协议 安全性 脉冲信号 无信号 photon number splitting attack, quantum key distribution, decoy state, overall gain, security
  • 相关文献

参考文献4

二级参考文献50

  • 1YAN FengLi1, GAO Ting2 & LI YouCheng1 1 College of Physics and Information Engineering, Hebei Normal University, Shijiazhuang 050016, China,2 College of Mathematics and Information Science, Hebei Normal University, Shijiazhuang 050016, China.Quantum secret sharing between multiparty and multiparty with four states[J].Science China(Physics,Mechanics & Astronomy),2007,50(5):572-580. 被引量:18
  • 2LU ZhiXin 1,2 , YU Li 1,2 , LI Kang 1,2 , LIU BingCan 1,2,3 , LIN JianGui 1,2 , JIAO RongZhen 1,2 & YANG BoJun 1,21 School of Science, Beijing University of Posts and Telecommunications, Beijing 100876, China,2 Key Laboratory of Information Photonics and Optical Communication, Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876, China,3 Department of Fundamental Courses, Academy of Armored Force Engineering, Beijing 100072, China.Reverse reconciliation for continuous variable quantum key distribution[J].Science China(Physics,Mechanics & Astronomy),2010,53(1):100-105. 被引量:12
  • 3Bennett C H and Brassard G 1984 Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India (New York: IEEE) p 175
  • 4Ekert A K 1991 Phys. Rev. Lett. 67 661
  • 5Gisin N, Ribordy G, Tittel W and Zbinden H 2002 Rev. Mod. Phys. 74 145
  • 6Bourennane Met al 1999 Opt. Express 4 383
  • 7Stucki D et al 2002 New. J. Phys. 4 41
  • 8Kosaka H et al 2003 Electron. Lett. 39 1199
  • 9Gobby C, Yuan Z L and Shields A J 2004 Appl. Phys. Lett. 84 3762
  • 10Mo X F, Zhu B, Han Z F, Gui Y Z and Guo G C 2005 Opt. Lett. 30 2632

共引文献48

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部