期刊文献+

抗特洛伊木马攻击的量子密钥多播通信协议 被引量:2

Multicast communication protocol based on quantum key distribution against trojan horse attacking
下载PDF
导出
摘要 提出在一个源量子节点与M个目的量子节点组成的网络中抗量子特洛伊木马攻击的多播通信协议,源量子节点构建2n+δ个EPR纠缠对,并用发送序列标记;在发送序列中随机选取n个作为检测纠缠对,利用CHSH不等式进行信道检测;发送序列中剩余n+δ个EPR纠缠对变形为非正交的量子态作为密钥,将广播明文信息分组编码成密文,利用量子态的不精确克隆复制M份发送给每个目的节点;目的节点接收密文逆向解密。分析了通信的吞吐量、信道的利用率、协议的安全性等问题。通过分析,证明该协议能有效防止特洛伊木马攻击,保证多播信息的安全。 A multicast communication protocol over quantum channel against Trojan horse attacking was proposed, in the network with one source quantum node and Mtarget quantmn nodes. The source quantum node is to build 2n+δ quantum EPR state, and to send sequence tags. In the sending sequence, n are selected randomly as the test states. Channel test is carried out with the inequality of CHSH. The rest n+δ of sending sequence transform into non-Orthogonal gtate as the key. The key is block encoded as cipher text which is to he copied into Mwith optimal universal quantum cloning and sent to each target quantum node. After target quantum node receiving cipher text, decoding is conducted. The communication protocols of throughput, channel utilization, security proof were analyzed theoretically. By analyzing, the protocol can effectively counter Trojan horse attacking, guarantee the multicast communication information safely.
出处 《通信学报》 EI CSCD 北大核心 2014年第7期193-198,共6页 Journal on Communications
基金 山东省高等学校科技计划基金资助项目(J11LG07) 青岛市科技计划基础研究基金资助项目(12-1-4-4-(6)-JCH) 国家自然科学基金资助项目(61173056 11304174)~~
关键词 量子信道 多播 特洛伊木马 量子网络 quantum channel multicast Trojan horse quantum network
  • 相关文献

参考文献15

二级参考文献81

  • 1陈志新,唐志列,廖常俊,刘颂豪.实际量子密钥分配扩展BB84协议窃听下的安全性分析[J].光子学报,2006,35(1):126-129. 被引量:14
  • 2王宇,卢均,吴忠望.空间信息网络的组密钥管理[J].宇航学报,2006,27(3):553-555. 被引量:10
  • 3周小清,邬云文.利用三粒子纠缠态建立量子隐形传态网络的探讨[J].物理学报,2007,56(4):1881-1887. 被引量:34
  • 4Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., 1994.
  • 5Bennett CH, Brassard G. An update on quantum cryptography. In: Advances in Cryptology: Proc. of Crypto'84. Springer-Verlag, 1984. 475-478.
  • 6Lo H-K, Chau HF. Unconditional security of quantum key distribution over arbitrary long distances. Science, 1999,283:2050-2056.
  • 7Gisin N, Ribordy G, Tittel W, Zbinden H. Quantum cryptography. Review Modern Physics, 2002,74:145-195.
  • 8Zeng G, Zhang W. Identity verification in quantum cryptography. Physical Review A, 2000,61:032303/1-5.
  • 9Larsson J. A practical Trojan horse for bell-inequality-based quantum cryptography. arXiv: quant-ph/0111073, 13 Nov 2001.
  • 10Zhang Y, Li C, Guo G. Quantum key distribution via quantum encryption. Physical Review A, 2001,64:024302/1-4.

共引文献40

同被引文献5

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部