In a perfect security case of symmetric encryption,the secure key is generated from a true random number generator and cannot be reused.Moreover,it has the same code length as the total message.Furthermore,we require ...In a perfect security case of symmetric encryption,the secure key is generated from a true random number generator and cannot be reused.Moreover,it has the same code length as the total message.Furthermore,we require the secure key to be distributed by employing unconditionally secure methods.Apart from quantum secure direct communication(QSDC)that directly achieves the confidential transmission of secure information over a quantum channel without key distribution procedure[1–3],secure key generation and secure key distribution(SKD)are the two most remarkable challenges restricting the efficiency and security of a cryptosystem[4]in conventional secure communication systems.展开更多
基金This work was supported by the National Key Research and Development Program of China(2016YFE0129400)Youth Innovation Promotion Association(2016290)+1 种基金Strategic Priority Research Program of the Chinese Academy of Sciences(XDC02010800)National Cryptography Development Fund during the 13th Five-Year Plan Period(MMJJ20180112).
文摘In a perfect security case of symmetric encryption,the secure key is generated from a true random number generator and cannot be reused.Moreover,it has the same code length as the total message.Furthermore,we require the secure key to be distributed by employing unconditionally secure methods.Apart from quantum secure direct communication(QSDC)that directly achieves the confidential transmission of secure information over a quantum channel without key distribution procedure[1–3],secure key generation and secure key distribution(SKD)are the two most remarkable challenges restricting the efficiency and security of a cryptosystem[4]in conventional secure communication systems.