期刊文献+

电力光纤专网量子密钥分配系统实际安全性分析 被引量:1

Practical security analysis of the quantum key distribution system over electric power optical fiber private network
下载PDF
导出
摘要 结合现有主要攻击方法,从非理想光源、非理想编解码模块和非理想探测器三个方面分析了该量子密钥分配系统的实际安全性,同时提出了四相位调制、接收单元和探测器改造等增强实际安全性的具体要求。 Combing with existing main attacking methods, the paper analyzed the practical security of the Faraday-Michelson QKD system in three ways - nonideal sources, nonideal encoding and decoding modules, and nonideal detectors. Specific requirements, such as four-phase demodulation, reform of the receiver unit and detectors, were proposed to improve its practical security.
出处 《光通信技术》 CSCD 北大核心 2014年第6期42-45,共4页 Optical Communication Technology
基金 国家电网公司纵向科技基金项目(xx71-13-004)资助
关键词 电力架空光缆 量子密钥分配 实际安全性 Faraday-Michelson干涉环 electric aerial optical cable quantum key distribution practical security Faraday-Michelson interferometer
  • 相关文献

参考文献17

  • 1XU FangXing,CHEN Wei,WANG Shuang,YIN ZhenQiang,ZHANG Yang,LIU Yun,ZHOU Zheng,ZHAO YiBo,LI HongWei,LIU Dong,HAN ZhengFu,GUO GuangCan.Field experiment on a robust hierarchical metropolitan quantum cryptography network[J].Chinese Science Bulletin,2009,54(17):2991-2997. 被引量:40
  • 2周静,陈希.量子技术提升电力信息通信安全水平[N].国家电网报,2012-9-25(10).
  • 3MULLER A, HERZOG T, HUTTNER B, et al. "Plug and play" systems for quantum cryptography [J]. Applied Physics Letters, 1997,70 (7): 793- 795.
  • 4MO X F, ZHU B, HAN Z F, et al. Faraday-Michelson system for quan- tum cryptography[J]. Optics Letters, 2005, 30(19): 2632-2634.
  • 5HAN Z F, MO X F, GUI Y Z, et al. Stability of phase-modulated quan- tum key distribution systems[J]. Applied Physics Letters, 2005, 86(22): 1 - 3.
  • 6SCARANI V, BECHMANN-Pasquinucci H, CERF N J, et al. The secu- rity of practical quantum key distribution [J]. Reviews of modem physics, 2009, 81(3): 1301-1350.
  • 7李宏伟,陈巍,黄靖正,姚尧,刘东,李芳毅,王双,银振强,何德勇,周政,李玉虎,俞能海,韩正甫.量子密码安全性研究[J].中国科学:物理学、力学、天文学,2012,42(11):1237-1255. 被引量:16
  • 8WANG X B. Beating the photon-number-splitting attack in practical quantum cryptography[J]. Physical review letters, 2005, 94(23): 230503.
  • 9WANG S, CHEN W, YIN Z Q, et al. Field test of wavelength-saving quantum key distribution network [J]. Optics letters, 2010, 35 (14): 2454- 2456.
  • 10HUANG J Z, YIN Z Q, WANG S, et al. Effect of intensity modulator extinction on practical quantum key distribution system [J]. The European Physical Journal D, 2012, 66(6): 1-5.

二级参考文献16

  • 1YAN FengLi1, GAO Ting2 & LI YouCheng1 1 College of Physics and Information Engineering, Hebei Normal University, Shijiazhuang 050016, China,2 College of Mathematics and Information Science, Hebei Normal University, Shijiazhuang 050016, China.Quantum secret sharing between multiparty and multiparty with four states[J].Science China(Physics,Mechanics & Astronomy),2007,50(5):572-580. 被引量:18
  • 2蔡庆宇,吕桦.Quantum Key Distribution against Trojan Horse Attacks[J].Chinese Physics Letters,2007,24(5):1154-1157. 被引量:2
  • 3Chen K,,Lo H K.Multi-partite quantum cryptographic protocols with noisy GHZ states[].Quant Inform Comput.2007
  • 4Townsend P D,Phoenix S J D,Blow K J, et al.Quantum cryptography for multi-user passive optical networks[].Electronics Letters.1994
  • 5Chen W,Han Z F,Zhang T, et al.Field experimental "star type" metropolitan quantum key distribution network[].IEEE Photonics Technology Letters.2009
  • 6Poppe A,Peev M,Maurhart O.Outline of the SECOQC quantum- key-distribution network in Vienna[].Int J Quantum Inf.2008
  • 7Chen T Y,,Liang H,Liu Y, et al.Field test of a practical secure com- munication network with decoy-state quantum cryptography[].Optics Express.2009
  • 8Subacius D,Zavriyev A,Trifonov A.Backscattering limitation for fiber-optic quantum key distribution systems[].Applied Physics Letters.2005
  • 9Zhang T,Mo X F,Han Z F, et al.Extensible router for a quantum key distribution network[].Physics Letters A.2008
  • 10Wen H,Han Z F,Guo G C, et al.The queuing model for quantum key distribution network[].Chin Phys B.2009

共引文献54

同被引文献12

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部