期刊文献+

B92量子密钥分配协议的变形及其无条件安全性证明 被引量:5

Modification of B92 protocol and the proof of its unconditional security
原文传递
导出
摘要 分析了Shor和Preskill证明BB84量子密钥分配协议无条件安全性的方法 ,指出不能用Shor Preskill方法直接证明B92量子密钥分配协议的无条件安全性。同时借鉴Shor Preskill方法 ,引入一种将B92协议转化为BB84协议的变换 ,通过证明该变换过程不会泄漏密钥信息给窃听者 ,以此证明B92协议的无条件安全性 .也解决了Lo等人提出的关于用Shor Preskill方法证明B92协议的困难 . Shor and Preskill's method with which thy proved the unconditional security of BB84 quantum key distribution protocol was analyzed first. We also indicated that their method could not be applied to prove the unconditional security of B92 scheme directly. In order to take advantage of Shor Preskill's techniques in their proof of the unconditional security of BB84, we have introduced in this paper a transformation that can exchange between BB84 and B92. By proving that the transformed B92 protocol leaks no more information to eavesdropper, we demonstrate the unconditional security of B92. We also solve the problem how to prove the unconditional security of B92 with Shor Preskill's method.
出处 《物理学报》 SCIE EI CAS CSCD 北大核心 2002年第7期1439-1447,共9页 Acta Physica Sinica
关键词 变形 无条件安全性 证明 B92协议 CSS码 量子密钥分配 量子信息 B92 protocal, CSS code, QKD, quantum information
  • 相关文献

同被引文献18

  • 1Bennett C.H. Quantum information and computation [J]. Physics Today, 1995,48 (10):24-30.
  • 2Mark Williamson, Vlatkovedral. Eavesdropping on practical quantum cryptography [J]. Journal of Modem Optics, 2003,50 (13):1989-2011.
  • 3Ekert A K, Huttner B, Palma G M, et al. Eavesdropping on quantum cryptographical systems[J]. Phys. Rev. A, 1994, 50 (02): 1047-1056.
  • 4Bennett C H, Brassard G. Quantum cryptography: Public-key distribution and coin tossing. Proceedings of IEEE International Conference on Computers[M].Bangalore:Systems and signal Processing,India,1984,175.
  • 5Ekert A K. Quantum cryptography based on Bell's theorem[J].Phys Rev lett,1991,67(6):661~663.
  • 6Bennett C H. Quantum cryptography using two non-orthogonal states[J].Phys Rev lett,1992, 68(21) :3121~3124.
  • 7Lo H K, Chau H F.Unconditional security of quantum key distribution over arbitrary long distances[J].Science,1999,283(5410) : 2050~2056.
  • 8Mayers D. On the security of the quantum oblivious transfer and key distribution protocol [J].Proc Crypto, 1995 ,LNCS 96:124~135.
  • 9Shor P W, Preskill J.Simple proof of security of the BB84 quantum key distribution protocol[J] . Phys Rev Lett,2000, 85(2): 441~444
  • 10Hughes R J, Morgan G L, Peterson C G . Quantum key distribution over 48km optical fibre network[J].J Mod Opt,2000, 47(2/3) : 533~536.

引证文献5

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部