检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:李芳毅 银振强 李宏伟 陈巍 王双 温浩 赵义博 韩正甫
机构地区:[1]Key Lab of Quantum Information, University of Science and Technology of China, Hefei 230026 [2]Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026 [3]Information Engineering College, Zhejiang University of Technology, Hangzhou 310023 [4]Anhui Qasky Quantum Science and Technology Co. Ltd., Wuhu 241002
出 处:《Chinese Physics Letters》2014年第7期16-19,共4页中国物理快报(英文版)
基 金:Supported by the Chinese Academy of Sciences, the National Basic Research Program of China under Grants Nos 2011CBA00200 and 2011CB921200, the National Natural Science Foundation of China under Grants Nos 61101137 and 61201239, the Program for Zhejiang Leading Team of Science and Technology Innovation under Grant No 2012r10011-12, and the Special Foundation for Young Scientists of Zhejiang Province under Grant No LQ13F050005.
摘 要:Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.129.206.232