期刊文献+

量子密钥分发技术在希尔加密中的可行性研究 被引量:2

Feasibility Study of Quantum Key Distribution Technology in Hill Encryption
下载PDF
导出
摘要 信息安全关乎人们生活的方方面面,随着金融、科技、政务、军事等重要领域的信息化快速发展,它甚至关系到国家安全,信息加密被认定为是现代通信最重要的技术之一。论文主要讨论了量子加密算法在传统希尔加密技术中的可行性,并给出了安全性证明。 Information security relates to all aspects of people's lives, as an important field of science and technology, finance, government, military and the rapid development of information technology, and even related to national security, information encryption has been identified as one of the most important technologies in modern communication, this paper mainly discusses the feasibility of quantum encryption algorithm in the traditional Hill encryption technology, and give a security proof.
出处 《网络空间安全》 2017年第10期21-26,共6页 Cyberspace Security
基金 2016年国家自然科学基金项目"认证加密算法的设计和分析" 2017年国家自然科学基金项目"面向网络空间的大数据安全和隐私保护研究"的支持
关键词 量子加密 密钥分发 希尔加密 quantum cryptography key distribution Hill encryption
  • 相关文献

参考文献5

二级参考文献72

  • 1NIELSEN M A, CHUANG I L. Quantum Computation and Quantum Information[M]. Cambridge: Cambridge University Press,2000.
  • 2GISIN N,RIBORDY G. TITTEL W. et al. Ouantum cryptography[EB/OL], http://xxx.lanl.gov/quant-ph/0101098,2001-01-19.
  • 3BOUWMEESTER D,EKERT A. ZEILINGER A. The Physics of Quantum Information[M]. Berlin: Springer-Verlag, 2000.15-47.
  • 4LO H K, CHAU H F. Unconditional security of quantum key distribution over arbitrarily long distance[J]. Science, 1999, 283:2050-2056.
  • 5EKERT A. Quantum cryptography based on Bell's theorem[J]. Phys Rev Lett, 1991,67:661-663.
  • 6BIHAM E, BOYER M, OSCAR BOYKIN P, et al. A proof of the security of quantum key distribution[A]. Proceedings of the 32nd Annual ACM Symposium on the Theory of Comouting (STOC'00)[C]. Oregon Portland, 2000.715-724.
  • 7INAMORI H,Security of EPR-based quantum key distribution [EB/OL]. htto://xxx.lanl.gov/quant-ph/0008064,2000-08-14.
  • 8DUAN L M, GUO G C. A probabilistic cloning machine for replicating two non-orthogonal states[Y]. Phys Lett A 1998, 243,261-264 .
  • 9BENNETT C H, BRASSARD G, CREPEAU C, et al. Generalized privacy amplification[J]. IEEE Trans Inform Theory,1995(41):1915-1923.
  • 10DEUTSCH D, EKERT A, JOZSA R, et al. Quantum privacy amplification and the security of quantum cryptography over noisy channels[J]. Phys Rev Lett, 1996,77(13) : 2818-2821.

共引文献18

同被引文献16

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部