期刊文献+

误码估计中分组奇偶检验方法的改进

IMPROVEMENT OF THE PACKET PARITY TEST IN ERROR ESTIMATION
下载PDF
导出
摘要 通过量子密钥分配技术可以使合法通信双方生成大量的共享安全密钥。误码估计是量子密钥分配后处理环节的重要步骤。在众多的误码估计方案中,分组奇偶校验法由于能够高效地协商出误码率而得到了广泛的应用。分组奇偶校验法采用在公共信道里交互部分信息来估计误码率,从而导致了密钥信息的部分泄漏。为了降低该算法的信息泄漏量,提出分组奇偶校验法的一种改进方案,利用偶数个错误与奇数个错误在进行二分后的结果可能不一致的性质协商误码率。实验结果表明,所提方案在保证误码估计效率的同时,有效降低了密钥信息的泄漏量。 Quantum key distribution(QKD)technology enables the legitimate communication parties to generate a large number of shared security keys.Error estimation is an important step of the post procession in QKD.Among many error estimation schemes,the packet parity method has been widely used because it can negotiate the bit error rate efficiently.The packet parity method uses the interaction of the information in the public channel to estimate the bit error rate,which leads to the leakage of the key information.In order to reduce the information leakage of this algorithm,an improved scheme of packet parity is proposed.We negotiated the bit error rate by using the property that the results of even and odd errors might be inconsistent after binary operation.The results show that the proposed scheme can guarantee the error estimation efficiency and reduce the leakage of key information effectively.
作者 刘冰 陈宜栋 贾炜光 刘欣瑞 Liu Bing;Chen Yidong;Jia Weiguang;Liu Xinrui(Department of Cryptography,Beijing Electronic Science and Technology Institute,Beijing 100070,China)
出处 《计算机应用与软件》 北大核心 2023年第11期308-311,326,共5页 Computer Applications and Software
基金 中央高校基本科研业务费项目(328201916)。
关键词 量子密钥分配 误码估计 信息泄漏 Quantum key distribution Error estimation Information leakage
  • 相关文献

参考文献5

二级参考文献72

  • 1杨涛,潘建伟.量子信息技术的新进展——五光子纠缠和开放目的的量子隐形传态[J].中国科学院院刊,2004,19(5):355-358. 被引量:73
  • 2张军,彭承志,包小辉,杨涛,潘建伟.量子密码实验新进展——13km自由空间纠缠光子分发:朝向基于人造卫星的全球化量子通信[J].物理,2005,34(10):701-707. 被引量:12
  • 3SCARANI V, BECHMANN-PASQUINUCCI H, CERF N J, et al. The Security of Practical Quantum Key Distribu- tion[J]. Rev. Mod. Phys. 2009,81(3) : 1 301-1 350.
  • 4SHOR P W, PRESKILL J. Simple Proof of Security of the BB84 Quantum Key Distribution Protocol[ J ]. Phys. Rev. Lett. 2000,85(2) : 441-445.
  • 5GOTrESMAN D, LO H K, LUTKENHAUS N, et al. Secur- ity of Quantum Key Distribution With Imperfect Devices [J]. Quantum Inf. Comput. 2004,4(5) : 325-360.
  • 6LO H K,ZHAO Y. Quantum cryptography[ J]. Encyclope- dia of Complexity and Systems Science(Springer New York), 2009,8 : 7 265-7 285.
  • 7LYDERSEN L. Practical Security of Quantum Cryptogra- phy[ D]. PHD Thesis, NTNU, 2011.
  • 8ZHAO Y, QI B, LO H K. Quantum Key Distribution with an Unknown and Untrusted Source [ J ]. Phys. Rev. A, 2008, 77 (5) : 052 327.
  • 9PENG X, JIANG H, XU B J, et al. Experimental Quan- tum-Key Distribution With an Untrusted Source [ J ]. Opt. Lett ,2008,33 ( 8 ) :2 077 -2 079.
  • 10PENG X, XU B, GUO H. Passive-Scheme Analysis for Solving the Untrusted Source Problem in Quantum Key Distribution[J]. Phys. Rev. A, 2010, 81(4) : 042 320.

共引文献106

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部