期刊文献+
共找到25篇文章
< 1 2 >
每页显示 20 50 100
Quantum key distribution series network protocol with M-classical Bobs 被引量:3
1
作者 张现周 公伟贵 +2 位作者 谭勇刚 任振忠 郭笑天 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第6期2143-2148,共6页
Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one qu... Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one quantum party and numerous classical parties who have no quantum capacity. We prove that our protocol is completely robust, i.e., any eavesdropping attack should be detected with nonzero probability. Our calculations show that our protocol may be secure against Eve's symmetrically individual attack. 展开更多
关键词 quantum key distribution symmetrical attack network protocol
下载PDF
A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States 被引量:2
2
作者 张盛 王剑 +1 位作者 唐朝京 张权 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第8期268-272,共5页
It is established that a single quantum cryptography protocol usually cooperates with other cryptographicsystems,such as an authentication system,in the real world.However,few protocols have been proposed on how tocom... It is established that a single quantum cryptography protocol usually cooperates with other cryptographicsystems,such as an authentication system,in the real world.However,few protocols have been proposed on how tocombine two or more quantum protocols.To fill this gap,we propose a composed quantum protocol,containing bothquantum identity authentication and quantum key distribution,using squeezed states.Hence,not only the identity canbe verified,but also a new private key can be generated by our new protocol.We also analyze the security under anoptimal attack,and the efficiency,which is defined by the threshold of the tolerant error rate,using Gaussian errorfunction. 展开更多
关键词 quantum key distribution quantum cryptography composed protocol
下载PDF
Twin-Field Quantum Key Distribution Protocol Based on Wavelength-Division-Multiplexing Technology
3
作者 Yanxin Han Zhongqi Sun +5 位作者 Tianqi Dou Jipeng Wang Zhenhua Li Yuqing Huang Pengyun Li Haiqiang Ma 《Chinese Physics Letters》 SCIE EI CAS CSCD 2022年第7期3-8,共6页
Quantum key distribution(QKD) generates information-theoretical secret keys between two parties based on the physical laws of quantum mechanics. Following the advancement in quantum communication networks, it becomes ... Quantum key distribution(QKD) generates information-theoretical secret keys between two parties based on the physical laws of quantum mechanics. Following the advancement in quantum communication networks, it becomes feasible and economical to combine QKD with classical optical communication through the same fiber using dense wavelength division multiplexing(DWDM) technology. This study proposes a detailed scheme of TF-QKD protocol with DWDM technology and analyzes its performance, considering the influence of quantum channel number and adjacent quantum crosstalk on the secret key rates. The simulation results show that the scheme further increases the secret key rate of TF-QKD and its variants. Therefore, this scheme provides a method for improving the secret key rate for practical quantum networks. 展开更多
关键词 Twin-Field Quantum key distribution protocol Based on Wavelength-Division-Multiplexing Technology QKD Quantum protocol key
下载PDF
New protocols for non-orthogonal quantum key distribution
4
作者 周媛媛 周学军 +1 位作者 田培根 王瑛剑 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第1期88-93,共6页
Combining the passive decoy-state idea with the active decoy-state idea, a non-orthogonal (SARG04) decoy-state protocol with one vacuum and two weak decoy states is introduced based on a heralded pair coherent state... Combining the passive decoy-state idea with the active decoy-state idea, a non-orthogonal (SARG04) decoy-state protocol with one vacuum and two weak decoy states is introduced based on a heralded pair coherent state photon source for quantum key distribution. Two special cases of this protocol are deduced, i.e., a one-vacuum-and-one-weak-decoy-state protocol and a one-weak-decoy-state protocol. In these protocols, the sender prepares decoy states actively, which avoids the crude estimation of parameters in the SARG04 passive decoy-state method. With the passive decoy-state idea, the detection events on Bob's side that are non-triggered on Alice's side are not discarded, but used to estimate the fractions of single-photon and two-photon pulses, which offsets the limitation of the detector's low efficiency and overcomes the shortcoming that the performance of the active decoy-state protocol critically depends on the efficiency of detector. The simulation results show that the combination of the active and passive decoy-state ideas increases the key generation rate. With a one-vacuum-and-two-weak-decoy-state protocol, one can achieve a key generation rate that is close to the theoretical limit of an infinite decoy-state protocol. The performance of the other two protocols is a little less than with the former, but the implementation is easier. Under the same condition of implementation, higher key rates can be obtained with our protocols than with existing methods. 展开更多
关键词 quantum key distribution non-orthogonal encoding protocol active decoy state passive decoy state
下载PDF
Proof of Security of a Semi-Device-Independent Quantum Key Distribution Protocol
5
作者 Peng Xu Wan-Su Bao +2 位作者 Hong-Wei Li Yang Wang Hai-Ze Bao 《Chinese Physics Letters》 SCIE CAS CSCD 2017年第2期7-10,共4页
Semi-device-independent quantum key distribution (SDI-QKD) has been proposed by applying the quantum dimension correlation, and the security relies on the violation of quantum dimension witness inequalities. We prov... Semi-device-independent quantum key distribution (SDI-QKD) has been proposed by applying the quantum dimension correlation, and the security relies on the violation of quantum dimension witness inequalities. We prove the security of the SDI-QKD protocol under the depolarization channel by considering the quantum dimension witness inequalities and minimum entropy and the specific process of the QKD protocol, combining with a four- quantum-state preparation and three measurement bases. We also provide the relationship between the dimension witness value, the error rate and the security key rate by the numerical simulation. 展开更多
关键词 QKD Proof of Security of a Semi-Device-Independent Quantum key distribution protocol SDI
下载PDF
On the Security of Quantum Key Distribution Ping-Pong Protocol
6
作者 Masakazu Yoshida Takayuki Miyadera Hideki Imai 《Journal of Quantum Information Science》 2013年第1期16-19,共4页
Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security att... Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security attracts attention. In this paper, we consider security of a two-way quantum key distribution protocol, so called Ping-Pong protocol. As a result, we introduce not only robustness but also a different information disturbance theorem, which denotes a trade-off relationship between information gain for an eavesdropper and error rate, from the related works for an attack model. 展开更多
关键词 Two-Way QUANTUM key distribution Ping-Pong protocol ROBUSTNESS Information DISTURBANCE THEOREM
下载PDF
Six-State Symmetric Quantum Key Distribution Protocol
7
作者 Makhamisa Senekane Mhlambululi Mafu Francesco Petruccione 《Journal of Quantum Information Science》 2015年第2期33-40,共8页
We propose and demonstrate an optical implementation of a quantum key distribution protocol, which uses three-non-orthogonal states and six states in total. The proposed scheme improves the protocol that is proposed b... We propose and demonstrate an optical implementation of a quantum key distribution protocol, which uses three-non-orthogonal states and six states in total. The proposed scheme improves the protocol that is proposed by Phoenix, Barnett and Chefles [J. Mod. Opt. 47, 507 (2000)]. An additional feature, which we introduce in our scheme, is that we add another detection set;where each detection set has three non-orthogonal states. The inclusion of an additional detection set leads to improved symmetry, increased eavesdropper detection and higher security margin for our protocol. 展开更多
关键词 QUANTUM key distribution QKD SYMMETRIC protocol Six-State QUANTUM PBC00 Optical Implementation
下载PDF
Efficient Authenticated Key Agreement Protocol Using Self-Certified Public Keys from Pairings 被引量:12
8
作者 SHAOZu-hua 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期267-270,共4页
An efficient authenticated key agreement protocol is proposed, which makesuse of bilinear pairings and self-certificd public keys. Its security is based on the securityassumptions of the bilinear Diff ie-Hellman probl... An efficient authenticated key agreement protocol is proposed, which makesuse of bilinear pairings and self-certificd public keys. Its security is based on the securityassumptions of the bilinear Diff ie-Hellman problem and the computational Diffie-Hellman problem.Users can choose their private keys independently. The public keys and identities of users can beverified implicitly when the session key being generating in a logically single step. A trusted KeyGeneration Center is no longer requiredas in the ID-based authenticated key agreement protocolsCompared with existing authenticated key agreement protocols from pairings, the. new proposedprotocol is more efficient and secure. 展开更多
关键词 authenticated key agreement protocol self-certified public keys bilinearpairings
下载PDF
Practical non-orthogonal decoy state quantum key distribution with heralded single photon source 被引量:4
9
作者 米景隆 王发强 +1 位作者 林青群 梁瑞生 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第4期1178-1183,共6页
Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practical non-orthogonal deco... Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practical non-orthogonal decoy state protocol with a heralded single photon source (HSPS) for QKD is presented. The protocol is based on 4 states with different intensities. i.e. one signal state and three decoy states. The signal state is for generating keys; the decoy states are for detecting the eavesdropping and estimating the fraction of single-photon and two-photon pulses. We have discussed three cases of this protocol, i.e. the general case, the optimal case and the special case. Moreover, the final key rate over transmission distance is simulated. For the low dark count of the HSPS and the utilization of the two-photon pulses, our protocol has a higher key rate and a longer transmission distance than any other decoy state protocol. 展开更多
关键词 quantum key distribution decoy state non-orthogonal encoding protocol heralded single photon source
下载PDF
Round-robin differential quadrature phase-shift quantum key distribution 被引量:1
10
作者 Chun Zhou Ying-Ying Zhang +3 位作者 Wan-Su Bao Hong-Wei Li Yang Wang Mu-Sheng Jiang 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第2期63-67,共5页
Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phas... Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phase-encoded Bennett-Brassard 1984 protocol(PE-BB84) to the RRDPS,this paper presents another quantum key distribution protocol called round-robin differential quadrature phase-shift(RRDQPS) quantum key distribution.Regarding a train of many pulses as a single packet,the sender modulates the phase of each pulse by one of {0,π/2,π,3π/2},then the receiver measures each packet with a Mach-Zehnder interferometer having a phase basis of 0 or π/2.The RRDQPS protocol can be implemented with essential similar hardware to the PE-BB84,so it has great compatibility with the current quantum system.Here we analyze the security of the RRDQPS protocol against the intercept-resend attack and the beam-splitting attack.Results show that the proposed protocol inherits the advantages arising from the simplicity of the RRDPS protocol and is more robust against these attacks than the original protocol. 展开更多
关键词 round-robin differential phase-shift protocol quantum key distribution intercept-resend attack beam-splitting attack
下载PDF
Toward Efficient Quantum Key Distribution Reconciliation 被引量:1
11
作者 Nedra Benletaief Houria Rezig Ammar Bouallegue 《Journal of Quantum Information Science》 2014年第2期117-128,共12页
In this paper, we propose how to construct a reconciliation method for the BB84 Quantum Key Distribution (QKD) protocol. Theoretically, it is unconditionally secure because it is based on the quantum laws of physics, ... In this paper, we propose how to construct a reconciliation method for the BB84 Quantum Key Distribution (QKD) protocol. Theoretically, it is unconditionally secure because it is based on the quantum laws of physics, rather than the assumed computational complexity of mathematical problems. BB84 protocol performances can be reduced by various errors and information leakages such as limited intrinsic efficiency of the protocol, imperfect devices and eavesdropping. The proposed reconciliation method allowed to weed out these errors by using Turbo codes. Since their high error correction capability implies getting low errors, this method has high performance especially when compared to the last method presented in the literature based on Low-Density Parity Check codes (LDPC). In particular, we demonstrate that our method leads to a significant improvement of the protocol security and of the Bit Error Rate (BER) even with great eavesdropping capability. 展开更多
关键词 Quantum key distribution BB84 protocol RECONCILIATION Turbo CODES LOW-DENSITY PARITY CHECK CODES
下载PDF
Improved statistical fluctuation analysis for two decoy-states phase-matching quantum key distribution
12
作者 周江平 周媛媛 +1 位作者 周学军 暴轩 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第8期188-194,共7页
Phase-matching quantum key distribution is a promising scheme for remote quantum key distribution,breaking through the traditional linear key-rate bound.In practical applications,finite data size can cause significant... Phase-matching quantum key distribution is a promising scheme for remote quantum key distribution,breaking through the traditional linear key-rate bound.In practical applications,finite data size can cause significant system performance to deteriorate when data size is below 1010.In this work,an improved statistical fluctuation analysis method is applied for the first time to two decoy-states phase-matching quantum key distribution,offering a new insight and potential solutions for improving the key generation rate and the maximum transmission distance while maintaining security.Moreover,we also compare the influence of the proposed improved statistical fluctuation analysis method on system performance with those of the Gaussian approximation and Chernoff-Hoeffding boundary methods on system performance.The simulation results show that the proposed scheme significantly improves the key generation rate and maximum transmission distance in comparison with the Chernoff-Hoeffding approach,and approach the results obtained when the Gaussian approximation is employed.At the same time,the proposed scheme retains the same security level as the Chernoff-Hoeffding method,and is even more secure than the Gaussian approximation. 展开更多
关键词 quantum key distribution phase matching protocol statistical fluctuation analysis decoy state
下载PDF
New Public Key Cryptosystems from Combinatorial Group Theory
13
作者 TANG Xueming WANG Xiaofei HONG Fan CUI Guohua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1267-1270,共4页
External direct product of some low layer groups such as braid groups and general Artin groups, with a kind of special group action on it, provides a secure cryptographic computation platform, which can keep secure in... External direct product of some low layer groups such as braid groups and general Artin groups, with a kind of special group action on it, provides a secure cryptographic computation platform, which can keep secure in the quantum computing epoch. Three hard problems on this new platform, Subgroup Root Problem, Multi-variant Subgroup Root Problem and Subgroup Action Problem are presented and well analyzed, which all have no relations with conjugacy. New secure public key encryption system and key agreement protocol are designed based on these hard problems. The new cryptosystems can be implemented in a general group environment other than in braid or Artin groups. 展开更多
关键词 public key cryptosystem key agreement protocol combinatorial group theory Artin group external direct product quantum computing
下载PDF
Key Distribution Protocols for Mobile Communication Systems
14
作者 Zhan Banghua and Hu Zhengming (Department of Information Engineering Beijing University of Posts and Telecommunications, Beijing, 100876, P. R. China) 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 1998年第2期6-9,共4页
In this paper we propose a new key distribution protocol for mobile communication systems.This protocol KDP4, like KDP3 in [3], is still secure against Simmons' replay attack and the new attack in [3] without us... In this paper we propose a new key distribution protocol for mobile communication systems.This protocol KDP4, like KDP3 in [3], is still secure against Simmons' replay attack and the new attack in [3] without using timestamps. It is a secure, efficient and practical key distribution protocol for mobile communication systems. 展开更多
关键词 key distribution protocols mobile communication systems CRYPTOLOGY
原文传递
Reparable Key Distribution Protocols for Internet Environments
15
作者 YANGYi-xian NIUXin-xin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2000年第1期86-88,共3页
It has claimed that any practical way to achieve perfect reparability for key distribution protocol (KDP) could only be futile. Fortunately, this paper presents reparable KDPs for internet environments with the use of... It has claimed that any practical way to achieve perfect reparability for key distribution protocol (KDP) could only be futile. Fortunately, this paper presents reparable KDPs for internet environments with the use of the concept of timestamps. 展开更多
关键词 key distribution protocols CRYPTOLOGY network security
原文传递
Research of Session Initial Protocol Security Mechanism on Public Key Technique
16
作者 HU Jian LI Yuxiang FENG Jiuchao 《Wuhan University Journal of Natural Sciences》 CAS 2011年第5期419-422,共4页
Two common kinds of security mechanisms used in session initial protocol (S1P) are analyzed. An improved HTTP digest authentication scheme is put forward based on the existing SIP authentication theories. This mecha... Two common kinds of security mechanisms used in session initial protocol (S1P) are analyzed. An improved HTTP digest authentication scheme is put forward based on the existing SIP authentication theories. This mechanism is combined with the merits of the HTTP digest authentication and the public key encryption, so the communicating parties complete two-way authentication and public key exchange in pre-calling, and the session key can be randomly generated in post-calling. The mixture of security encryption mechanism with public key encryption and symmetric-key encryption algorithm can ensure the security for network communication data. The emulation of the scheme is verified, and the security analysis is conducted in the end. The researches show that the simulations efficiency of this method is about 78% of HTTP's, and it can prevent four kinds of attacks including impersonating a server, offline password guessing attacks, relay-attack, and session monitoring. 展开更多
关键词 session initial protocol (SIP) HTTP digest authentication public key SECURITY
原文传递
Cryptographic Protocols Based on Nielsen Transformations
17
作者 Benjamin Fine Anja I. S. Moldenhauer Gerhard Rosenberger 《Journal of Computer and Communications》 2016年第12期63-107,共46页
We introduce in this paper cryptographic protocols which use combinatorial group theory. Based on a combinatorial distribution of shares we present secret sharing schemes and cryptosystems using Nielsen transformation... We introduce in this paper cryptographic protocols which use combinatorial group theory. Based on a combinatorial distribution of shares we present secret sharing schemes and cryptosystems using Nielsen transformations. Nielsen transformations are a linear technique to study free groups and general infinite groups. In addition the group of all automorphisms of a free group F, denoted by AUT (F), is generated by a regular Nielsen transformation between two basis of F, and each regular Nielsen transformation between two basis of F defines an automorphism of F. 展开更多
关键词 Nielsen Transformation Matrix Group SL(2 Q) Secret Sharing protocol Private key Cryptosystem public key Cryptosystem
下载PDF
An Efficient Two-Party Key Exchange Protocol with Strong Security 被引量:2
18
作者 DENG Shaofeng LI Yifa DENG Yiqun 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期267-271,共5页
Combined public key (CPK) cryptography does not need certificates to guarantee the authenticity of public keys and avoids the inherent key escrow problem of identity-based cryptography. Based on the efficient CPK sc... Combined public key (CPK) cryptography does not need certificates to guarantee the authenticity of public keys and avoids the inherent key escrow problem of identity-based cryptography. Based on the efficient CPK scheme, we present an efficient three-round two-party authenticated key exchange protocol with strong security, which is provably secure in the standard model under the decisional Diffie-Hellman (DDH) assumption. The protocol can keep the session key secret from the adversary except that one party's ephemeral private key and static private key are all revealed to the adversary. Compared to the existing protocols, this protocol not only assures strong security but also is more efficient. 展开更多
关键词 combined public key (CPK) authenticated key exchange protocol strong security standard model
原文传递
Analysis of Security Vulnerabilities and Countermeasures of Ethernet Passive Optical Network(EPON) 被引量:1
19
作者 Stamatios V.Kartalopoulos Pramode K.Verma 《China Communications》 SCIE CSCD 2007年第3期17-29,共13页
Ethernet-based Passive Optical Network(EPON) is considered a very promising solution for the first mile problem of the next generation networks.Due to its particular characteristic of shared media structure,EPON suffe... Ethernet-based Passive Optical Network(EPON) is considered a very promising solution for the first mile problem of the next generation networks.Due to its particular characteristic of shared media structure,EPON suffers many security vulnerabilities. Communication security must be guaranteed when EPON is applied in practice.This paper gives a general introduction to the EPON system,analyzes the potential threats and attacks pertaining to the EPON system,and presents effective countermea-sures against these threats and attacks with emphasis on the authentication protocols and key distribution. 展开更多
关键词 EPON security VULNERABILITIES ATTACKS COUNTERMEASURES AUTHENTICATION protocols key distribution
下载PDF
Hyper Elliptic Curve Based Certificateless Signcryption Scheme for Secure IIoT Communications 被引量:1
20
作者 Usman Ali Mohd Yamani Idna Idris +6 位作者 Jaroslav Frnda Mohamad Nizam Bin Ayub Roobaea Alroobaea Fahad Almansour Nura Modi Shagari Insaf Ullah Ihsan Ali 《Computers, Materials & Continua》 SCIE EI 2022年第5期2515-2532,共18页
Industrial internet of things (IIoT) is the usage of internet of things(IoT) devices and applications for the purpose of sensing, processing andcommunicating real-time events in the industrial system to reduce the unn... Industrial internet of things (IIoT) is the usage of internet of things(IoT) devices and applications for the purpose of sensing, processing andcommunicating real-time events in the industrial system to reduce the unnecessary operational cost and enhance manufacturing and other industrial-relatedprocesses to attain more profits. However, such IoT based smart industriesneed internet connectivity and interoperability which makes them susceptibleto numerous cyber-attacks due to the scarcity of computational resourcesof IoT devices and communication over insecure wireless channels. Therefore, this necessitates the design of an efficient security mechanism for IIoTenvironment. In this paper, we propose a hyperelliptic curve cryptography(HECC) based IIoT Certificateless Signcryption (IIoT-CS) scheme, with theaim of improving security while lowering computational and communicationoverhead in IIoT environment. HECC with 80-bit smaller key and parameterssizes offers similar security as elliptic curve cryptography (ECC) with 160-bitlong key and parameters sizes. We assessed the IIoT-CS scheme security byapplying formal and informal security evaluation techniques. We used Realor Random (RoR) model and the widely used automated validation of internet security protocols and applications (AVISPA) simulation tool for formalsecurity analysis and proved that the IIoT-CS scheme provides resistance tovarious attacks. Our proposed IIoT-CS scheme is relatively less expensivecompared to the current state-of-the-art in terms of computational cost andcommunication overhead. Furthermore, the IIoT-CS scheme is 31.25% and 51.31% more efficient in computational cost and communication overhead,respectively, compared to the most recent protocol. 展开更多
关键词 IoT security authentication protocols hyperelliptic curve cryptography certificateless public key cryptography
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部