期刊文献+

量子纠错码在安全性证明中的应用研究 被引量:2

Application Analysis of Quantum Error Correcting-Codes in Security Proving
下载PDF
导出
摘要 针对BB84协议,简要介绍3类量子密码安全性证明方法,深入研究了基于纠缠提纯和基于量子CSS码的安全性证明方法。重点分析量子纠错码在Lo-Chau和Shor-Preskill两类代表性方案中的应用,同时研究了两类等价性:单向纠缠提纯和量子纠错以及纠相位错和去窃听者纠缠。通过举例具体分析并实现了量子纠错码在安全性证明中的作用,验证了基于纠缠的量子密钥分配协议与标准BB84协议安全性分析之间的等价性,证明了纠比特错和纠相位错的可分离性,充分体现了量子纠错码在安全性证明中的重要作用。 Based on BB84 protocols,three classes of security proving for quantum cryptography are briefly introduced,and a deep research on security proving methods is provided based upon entanglement purification and quantum CSS code. The research mainly analyzes the application of quantum error correcting-codes in two representative schemes called Lo-Chau and Shor-Preskill protocol.Meanwhile,it investigates two classes of equivalence,one is the one-way entanglement purification and quantum error correction,the other is the phase error correction and removing of listener-in entanglement. Through concrete examples,it analyzes and implements the function of quantum error correcting-codes in security proving,validates the equivalence between quantum key distribution protocols based on entanglement and standard BB84 protocols,and testifies the separability between bit error correction and phase error correction,which shows the great importance of quantum error correcting-codes in security proving.
出处 《信息工程大学学报》 2015年第1期5-14,共10页 Journal of Information Engineering University
基金 国家自然科学基金资助项目(U1204602) 国家高科技研究和发展项目(2011AA010803) 数学工程与先进计算国家重点实验室开放课题资助项目(2013A14)
关键词 量子密钥分配 BB84 安全性证明 量子纠错码 纠缠提纯 量子CSS码 quantum key distribution BB84 security proof quantum error correcting-codes entanglement purification quantum CSS code
  • 相关文献

参考文献23

  • 1Bennett C H, Brassard G. Quantum cryptography: Public-key distribution and coin tossing. [ C ]//Proceedings of IEEE Inter- national Conference on Computers, Systems and Signal Processing. 1984:175-179.
  • 2Mayers D. Quantum key distribution and string oblivious transfer in noisy channels[ C ]//CRYPTO'96. 1996:343-357.
  • 3Mayers D. Unconditional security in quantum cryptography[ J]. J ACM, 2001, 48:351.
  • 4Mayers D, Yao A. Quantum cryptography with imperfect apparatus[ EB/OL]. [2013-05-14]. http: arxiv, org/abs/quant- ph/9809039vl.
  • 5Bennett C H, DiVincenzo D P, Smolin J A, et al. Mixed-state entanglement and quantum error correction[J]. Phys. Rev. A, 1996, 54:3824.
  • 6Lo H K, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances [ J]. Science, 1999, 283:2050.
  • 7Shor P, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol[ J]. Phys Rev Lett, 2000, 85:441.
  • 8Gottesman D, Lo H K, Ltitkenhaus N, Preskill J. Security of quantum key distribution with imperfect devices [ EB/OL]. [ 2013-07-08 ]. http : arxiv, org/abs/quant-ph/0212066v3.
  • 9Renner R. Security of quantum key distribution[ EB/OL]. [2013-06-181. http:arxiv, org/obs/guant-ph/05122581/2.
  • 10Horodecki K, Horodecki M, Horodecki P, et al. Secure key from bound entanglement[J]. Phys Rev Lett, 2005, 94:160502.

同被引文献20

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部