检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:LIU Dong WANG Shuang YIN ZhenQiang CHEN Wei HAN ZhengFu
机构地区:[1]Key Laboratory of Quantum Information, University of Science and Technology of China
出 处:《Chinese Science Bulletin》2013年第31期3859-3862,共4页
基 金:supported by the National Basic Research Program of China(2011CBA00200 and 2011CB921200);the National Natural Science Foundation of China(60921091 and 61101137);China Postdoctoral Science Foundation(2012M511419);Technology projects funded of State Grid Corporation(XX17201200028)
摘 要:The decoy state protocol was proposed to overcome the primitive photon number splitting attack.When using a better strategy,the attacker can ensure that the ratio of the overall gain of the signal state pulse against the decoy state pulse changes very little,even to keep the overall gain of the signal state pulses equal to that obtained without attacker.In this paper we first give a model of the partial photon number splitting attack which contains the original one,and then find that the decoy state protocol still works effectively under the partial photon number splitting attack.The decoy state protocol was proposed to overcome the primitive photon number splitting attack. When using a better strategy, the attacker can ensure that the ratio of the overall gain of the signal state pulse against the decoy state pulse changes very little, even to keep the overall gain of the signal state pulses equal to that obtained without attacker. In this paper we first give a model of the partial photon number splitting attack which contains the original one, and then find that the decoy state protocol still works effectively under the partial photon number splitting attack.
关 键 词:攻击者 光子数 诱骗 分束 协议 安全性 脉冲信号 无信号
分 类 号:TN918.1[电子电信—通信与信息系统]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.199