期刊文献+

量子密码中的新型时移攻击 被引量:1

New-type time-shift attack in quantum cryptography
下载PDF
导出
摘要 为提升量子密码时移攻击效果,提出了一种新型时移攻击方法。根据时移攻击的技术原理,对其具体步骤进行了分析,指出攻击可操作空间是时移攻击的重要参数,对比了已有的两类时移攻击方法。在此基础上,提出了新型时移攻击的基本流程与具体方法,并对实际参数进行了求解。计算结果表明,该方法可以显著扩展攻击可操作空间并降低时移攻击被发现的概率。 To promote the effect of time-shift attack in quantum cryptography, a new-type time-shift attack is put forward. Based on the technical rationale, the concrete steps of time-shift attack are analyzed. It is pointed out that the operational space is an important parameter of attack. And, two known time-shift attack methods are compared with each other. Based on that, the procedure and steps of the new-type time-shift attack are provided and actual parameters are solved. The calculation results are presented to prove that the new-type time-shift attack can significantly expand the operational space and reduce the chances that this attack is exposed.
出处 《计算机工程与设计》 CSCD 北大核心 2013年第12期4162-4166,共5页 Computer Engineering and Design
关键词 量子密钥分发 时移攻击 探测效率 误码率 可操作空间 quantum key distribution time-shift attack detection efficiency bit-error rate the operational space
  • 相关文献

参考文献10

  • 1Makarov V,Anisimov A,Skaar J.Effects of detector efficiencymismatch on security of quantum cryptosystems[J].Phys RevA,2006,74(2):2313-2323.
  • 2Bing Qi,Chi hang Fred Fung,Hoi kwong Lo,et al.Time-shiftattack in practical quantum cryptosystems[J].Quantum InfComput,2007(7):73-82.
  • 3Zhao Yi,Vhi-Hang Fred Fung,Qi Bing,et al.Quantum hac-king:Experimental demonstration of time-shift attack againstpractical quantum key distribution systems[J].Phys Rev A,2008,78(4):333-337.
  • 4Li H W,Yin Z Q,Han Z F,et al.Security of practical phase-coding quantum key distribution[J].Quantum Inf Comput,2010,10(9-10):771-779.
  • 5Scarani V,Bechmann-Pasquinucci H,Cerf N J,et al.The secu-rity of practical quantum key distribution[J].Rev Mod Phys,2009,81(3):I 301-1 350.
  • 6Sun S H,Jiang M S,Liang L M.Passive Faraday-mirror attackin a practical two-way quantum-key-distribution system[J].Phys Rev A,2011,83(6):2331-2337.
  • 7Li H W,Wang S,Huang J Z,et al.Attacking a practical quan-tum-key-distribution system with wavelength-dependent beam-splitter and multi-wavelength sources[J].Phys Rev A,2011,84(6):2308-2312.
  • 8Lydersen L,Wiechers C,Wittmann C,et al.Hacking commer-cial quantum cryptography systems by tailored bright illumina-tion[J].Nat Photonics,2010(4):686-689.
  • 9Lo H K,Curty M,Qi B.Measurement-device-independentquantum key distribution[J].Phys Rev Lett,2012,108:(13):503-507.
  • 10Li H W,Marcin P,Yin Z Q,et al.Semi-device independent ran-dom number expansion protocol with n to I quantum random accesscodes[J].Phys Rev A,2012,85(5):2308-2311.

同被引文献4

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部