检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:卿爽 陈小明[1,2,3] Qing Shuang;Chen Xiaoming(Beijing Electronic Science and Technology Institute,Beijing 100071,China;School of Telecommunications Engineering,Xidian University,Xi’an 710071,Shaanxi,China;Cyberspace Security Institute,University of Science and Technology of China,Hefei 230026,Anhui,China)
机构地区:[1]北京电子科技学院,北京100071 [2]西安电子科技大学通信工程学院,陕西西安710071 [3]中国科学技术大学网络空间安全学院,安徽合肥230026
出 处:《计算机应用与软件》2020年第9期268-271,323,共5页Computer Applications and Software
基 金:“十三五”国家密码发展基金项目(MMJJ20180112)。
摘 要:目前实用的量子密钥分发(Quantum key distribution,QKD)系统使用的是BB84协议或诱骗态BB84协议,在用此协议进行密钥分发的过程中若有窃听者实施攻击,便会引起误码率的显著变化,若误码率超过某一阈值便可认为存在窃听者。但实际使用中误码率与理论值存在偏差,仅按理论阈值来判断是否存在窃听者将会出现两类差错。通过对量子密钥分发及对BB84协议进行测量转发攻击原理的分析,利用假设检验的原理来对两类差错进行具体分析,并计算出相关数据。The current practical quantum key distribution(QKD)system uses the BB84 protocol or the decoy state BB84 protocol.If an eavesdropper performs an attack during the key distribution processwith this protocol,it causes a significant change in the bit error rate.If the bit error rate exceeds a certain threshold,the eavesdropper can be noticed.However,in practice,the bit error rate deviates from the theoretical value.Only according to the theoretical threshold to judge whether there is an eavesdropper,it leads to two types of errors.Through the analysis of the quantum key distribution and the measurement forwarding attack principle of the BB84 protocol,the principle of hypothesis testing was used to analyze the two types of errors,and the relevant data was calculated.
分 类 号:TP3[自动化与计算机技术—计算机科学与技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.222