检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:陈孝莲 张杰[2] 李亚杰[2] 涂志伟 张会彬[2] CHEN Xiaolian;ZHANG Jie;LI Yajie;TU Zhiwei;ZHANG Huibin(Wuxi Power Supply Company,State Grid Jiangsu Electric Power Co.,Ltd.,Wuxi 214000,China;State Key Laboratory of Information Photonics and Optical Communications,Beijing University of Posts and Telecommunications,Beijing 100876,China)
机构地区:[1]国网江苏省电力有限公司无锡供电分公司,江苏无锡214000 [2]北京邮电大学信息光子学与光通信国家重点实验室,北京100876
出 处:《电力信息与通信技术》2020年第10期15-19,共5页Electric Power Information and Communication Technology
基 金:国家自然科学基金(61831003);国网江苏省电力有限公司科技项目“基于抵入噪声技术的长跨距无中继光通信物理层安全传输系统研究及应用”(J2019124)。
摘 要:现有光纤通信系统无法抵御物理层攻击,常通过预共享密钥对信息加密来确保通信安全。随着量子计算机的问世,公钥加密算法已不再安全。量子密钥分发虽能提供理论上的无条件安全,但它需要单光子或弱信号传输,对噪声和损伤特别敏感,因此无法使用光放大器,不适合长距离传输。光通信物理层密钥分发更为简单,在现有光纤传输系统的基础上,利用各种独特的信道特征的变化来量化生成密钥,安全性较高,但其分发所得密钥未达到完全一致,无法直接应用。文章提出了一种面向光通信物理层密钥分发的后处理方法,通信双方对分发所得密钥进行随机化、分段及奇偶校验处理,通过传递边信息分段纠错,经保密增强处理后,密钥在信息泄露量最少的情况下达到一致。Existing optical fiber communication systems cannot resist physical layer attacks and often use preshared keys to encrypt information to ensure communication security.With the advent of quantum computers,public-key encryption algorithms are no longer secure.Although quantum key distribution can provide unconditional security theoretically,it requires single photon or weak signal transmission and is particularly sensitive to noise and damage.Therefore,optical amplifiers cannot be used,which is not suitable for longdistance transmission.Alternatively,the key distribution of optical communication physical layer is simpler.On the basis of the existing optical fiber transmission system,various unique channel characteristics are quantified to generate the keys,which has high security.However,the keys are not consistent completely and cannot be directly applied.This paper proposes a post-processing method for key distribution of optical communication physical layer.Both communication parties randomize,segment and parity-check the keys obtained by the distribution.correct errors by passing side information.after the privacy amplification,the key reaches consistent with the least amount of information leakage.
分 类 号:TN918[电子电信—通信与信息系统]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.49