期刊文献+

量子密钥分发技术的机遇与挑战 被引量:1

The Opportunity and Challenge On Quantum Key Distribution
下载PDF
导出
摘要 量子密钥分发(QKD,quantum key distribution)具有理想的理论安全性,近十年来得到了快速发展。但是,理论上被证明完美的技术并不意味着一定能够实现完美的应用。一方面,越来越多的研究表明,旁路攻击将是QKD系统的一个主要威胁,而且针对实际QKD系统的旁路攻击才刚刚开始。另一方面,由于量子信号的传输不像经典电磁波那样具有很大的灵活性,致使QKD很难与传统通信网络进行无缝对接,也很难在广域网中得到广泛作用。另外,QKD也不能解决身份识别和数据存储安全等问题。因此,构建一个完善的QKD系统安全及其测评体系将是QKD得到实际应用的重要因素,而构建一个完善的抗量子计算的新型密码理论体系将是确保未来信息安全的关键。 In last decade, many important results on quantum key distribution( QKD)have been achieved. QKD is physically secure in theory, however, it is not easy to realize an ideal QKD system in practice. On the one hand, side channel attack on QKD system will be a main threat which cannot be eliminated in the predictable future. On the other hand, QKD system does not have a full compatibility with conventional network because quantum signal is transmitted by fiber or free-space in point to point mode. Besides, the security of identification and data storage still cannot be solved by QKD. However, an integrated system on how to evaluate the security of QKD systemstill will play an important role in practical QKD system. Espe- cially, new cryptography system is still the key factor toward the bright future of information security.
作者 陈晖 张文政
出处 《中国电子科学研究院学报》 2014年第1期27-31,共5页 Journal of China Academy of Electronics and Information Technology
基金 国家保密通信重点实验室基金(9140C11010111C1104)
关键词 量子密钥分发 信息安全 密码 旁路攻击 quantum key distribution information security cryptography side channel attack
  • 相关文献

参考文献19

  • 1WANG X Y,FENG D G,et al.collisions for hash functions MD4,MD5,HAVAL-128 and RIPRMD[C]//In Proc.Crypto ' 04,Santa Barbara,CA,USA,2004.
  • 2WANG X Y,YU H B,et al.Efficient Collision Search Attacks on SHA-0[C]//In Proc.Crypto'05,Santa Barbara,CA,USA,2005.
  • 3SHOR P W.Algorithms for Quantum Computation,Discrete Log and Factoring[C]//FOCS' 35,Santa Fe,NM,1994:124-134.
  • 4GROVER L K.A Fast Quantum Mechanical Algorithm for Database Search[C]//Proceedings,28th Annual ACM Symposium on the Theory of Computing,Philadelphia,Pennsylvania,1996:212-219.
  • 5BENNETT C H,BRASSARD G.Quantum Cryptography:Public Key Distribution And Coin Tossing[C]//International Conference on Computers,Systems &Signal Processing,Bagalore,India,1984:175-179.
  • 6KOCHER P,JAFFE J,JUN B.Differential Power Analysis[C]//Proc.of the Advances in Cryptology-CRYPTO'99,Berlin:Springer-Verlag,1999,1666:388-397.
  • 7POPPE A,PEEVANDO M.Maurhart.Outline of the SECOQC quantum Key Distribution Network in Vienna[J].International Journal of Quantum Information,2008,6 (2):209-218.
  • 8CHEN W,HAN Z F,ZHANG T,et al.Field Experimental "Star Type" Metropolitan Quantum Key Distribution Network[J].IEEE Photonics Technology Letters,2009,21 (9):575-577.
  • 9CHEN T Y,LIANG H,LIU Y,et al.Field Experiment of a Practical Secure Communication Network with Decoy-State Quantum Cryptography[J].Optics Express,2009,17 (8):6 548-6 549.
  • 10杨帆,王海霞,韩淋.量子通信知识产权态势分析报告[R/OL].2011,http://ir.las.ac.cn/handle/12502/4507.

二级参考文献6

共引文献16

同被引文献6

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部