期刊文献+

BB84协议中测量转发攻击的侦测方法及其分析

DETECTION METHOD AND ANALYSIS OF MEASUREMENT FORWARDING ATTACK IN BB84 PROTOCOL
下载PDF
导出
摘要 目前实用的量子密钥分发(Quantum key distribution,QKD)系统使用的是BB84协议或诱骗态BB84协议,在用此协议进行密钥分发的过程中若有窃听者实施攻击,便会引起误码率的显著变化,若误码率超过某一阈值便可认为存在窃听者。但实际使用中误码率与理论值存在偏差,仅按理论阈值来判断是否存在窃听者将会出现两类差错。通过对量子密钥分发及对BB84协议进行测量转发攻击原理的分析,利用假设检验的原理来对两类差错进行具体分析,并计算出相关数据。 The current practical quantum key distribution(QKD)system uses the BB84 protocol or the decoy state BB84 protocol.If an eavesdropper performs an attack during the key distribution processwith this protocol,it causes a significant change in the bit error rate.If the bit error rate exceeds a certain threshold,the eavesdropper can be noticed.However,in practice,the bit error rate deviates from the theoretical value.Only according to the theoretical threshold to judge whether there is an eavesdropper,it leads to two types of errors.Through the analysis of the quantum key distribution and the measurement forwarding attack principle of the BB84 protocol,the principle of hypothesis testing was used to analyze the two types of errors,and the relevant data was calculated.
作者 卿爽 陈小明 Qing Shuang;Chen Xiaoming(Beijing Electronic Science and Technology Institute,Beijing 100071,China;School of Telecommunications Engineering,Xidian University,Xi’an 710071,Shaanxi,China;Cyberspace Security Institute,University of Science and Technology of China,Hefei 230026,Anhui,China)
出处 《计算机应用与软件》 北大核心 2020年第9期268-271,323,共5页 Computer Applications and Software
基金 “十三五”国家密码发展基金项目(MMJJ20180112)。
关键词 量子密钥分发 BB84协议 假设检验 Quantum key distribution BB84 protocol Hypothesis test
  • 相关文献

参考文献8

二级参考文献50

  • 1陈志新,唐志列,魏正军,刘景锋,廖常俊,刘颂豪.QKD系统在Breidbart基窃听下BB84协议的信息量研究[J].光子学报,2004,33(12):1469-1472. 被引量:9
  • 2陈志新,唐志列,廖常俊,刘颂豪.实际量子密钥分配扩展BB84协议窃听下的安全性分析[J].光子学报,2006,35(1):126-129. 被引量:14
  • 3Wiesner S. Conjugate coding. SIGACT News,1983, 15(1):78-88.
  • 4Bennett C H , Brassard G. Quantum cryptography: Public-key distribution and coin tossing. In proceedings of the IEEE International Conference on Computers Systems and Signal Processing , Bangalore, India , New York:IEEE, 1984. 175-179.
  • 5Ekert A K. Quantum cryptography based on bell's theorem. Phys Rev Lett, 1991,67(6) .661-663.
  • 6Bennett C H, Bessette F, Brassard G, et al. Experimental quantum cryptography. Journal of Cryptology , 1992,5(1):3-28.
  • 7Brub D. Optimal eavesdropping in quantum cryptography with six states. Phys Rev Lett, 1998,81(14) : 3018-3021.
  • 8Philip H A, Bonfrate G, Buller G S, et al. Eighty kilometer transmission experiment using an InGaAs/InPSPAD-hased quantum cryptography receiver operating at1.55 μm. Journal of Modern Optics, 2001,48(13) :1957-1966.
  • 9Buttler W T, Hughes R J, Lamoreaux S K,et al. Daylight quantum key distribution over 1.6 km. Phys Rev Lett,2000,84(34) : 5652-5655.
  • 10Huttner By Ekert A K. Information gain in quantum eavesdropping. Journal of modern Optics, 1994, 41(12) .2455-2466.

共引文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部