期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
A Novel Basis Splitting Eavesdropping Scheme in Quantum Cryptography Based on the BB84 Protocol
1
作者 赵楠 朱畅华 权东晓 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期22-26,共5页
We propose a novel strategy numed basis-splitting scheme to split the intercepted quanta into several portions based on different bases, for eavesdropping in the process of quantum cryptography. Compared with intercep... We propose a novel strategy numed basis-splitting scheme to split the intercepted quanta into several portions based on different bases, for eavesdropping in the process of quantum cryptography. Compared with intercept- resend strategy, our simulation results of the basis-splitting scheme under the non-ideal condition show a greater performance, especially with the increase of the length of shifted bits. Consequently our scheme can aid eaves- dropper to gather much more useful information. 展开更多
关键词 A Novel Basis Splitting Eavesdropping Scheme in Quantum Cryptography Based on the bb84 protocol bb
下载PDF
BB84量子密钥分配协议在专网中的应用
2
作者 李文骞 《电脑编程技巧与维护》 2014年第2期70-72,共3页
依据专用网络的特点,对BB84量子密钥分配协议做了改进,提出一种适用于专用网络的BB84-PN协议。该协议通过身份认证和量子物理特性,提高了安全性。同时,在通信过程中通过协商传输量子密钥规则,有效地提高了传输效率。
关键词 量子密钥分配协议 bb84协议 bb84-pn协议 专用网络
下载PDF
Toward Efficient Quantum Key Distribution Reconciliation 被引量:1
3
作者 Nedra Benletaief Houria Rezig Ammar Bouallegue 《Journal of Quantum Information Science》 2014年第2期117-128,共12页
In this paper, we propose how to construct a reconciliation method for the BB84 Quantum Key Distribution (QKD) protocol. Theoretically, it is unconditionally secure because it is based on the quantum laws of physics, ... In this paper, we propose how to construct a reconciliation method for the BB84 Quantum Key Distribution (QKD) protocol. Theoretically, it is unconditionally secure because it is based on the quantum laws of physics, rather than the assumed computational complexity of mathematical problems. BB84 protocol performances can be reduced by various errors and information leakages such as limited intrinsic efficiency of the protocol, imperfect devices and eavesdropping. The proposed reconciliation method allowed to weed out these errors by using Turbo codes. Since their high error correction capability implies getting low errors, this method has high performance especially when compared to the last method presented in the literature based on Low-Density Parity Check codes (LDPC). In particular, we demonstrate that our method leads to a significant improvement of the protocol security and of the Bit Error Rate (BER) even with great eavesdropping capability. 展开更多
关键词 Quantum Key Distribution bb84 protocol RECONCILIATION Turbo CODES LOW-DENSITY PARITY CHECK CODES
下载PDF
Hybrid quantum private communication with continuous-variable and discrete-variable signals 被引量:4
4
作者 LIU WeiQi PENG JinYe +5 位作者 WANG Chao CAO ZhengWen HUANG Duan LIN DaKai HUANG Peng ZENG GuiHua 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2015年第2期14-20,共7页
The quantum key distribution(QKD) has been entering the practical application era. Subsequently, hybrid quantum private communication with discrete-variable signals, continuous-variable signals, and classic optical si... The quantum key distribution(QKD) has been entering the practical application era. Subsequently, hybrid quantum private communication with discrete-variable signals, continuous-variable signals, and classic optical signals becomes inevitable in the practical scenario. In this paper, we experimentally investigated the mutual effects between the discrete-variable QKD(DVQKD) and the continuous-variable QKD(CVQKD) via a fiber channel. The experimental results show that the DVQKD will be influenced by the continuous-variable quantum signals and classic optical signals, while the CVQKD is not sensitive to the discrete-variable quantum signals. 展开更多
关键词 hybrid quantum private communication Gaussian-modulated CVQKD protocol bb84 protocol mutual influences
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部