光通信物理层密钥分发后处理技术研究  

Research on Post-Processing Technology of Key Distribution in Optical Communication Physical Layer

在线阅读下载全文

作  者:陈孝莲 张杰[2] 李亚杰[2] 涂志伟 张会彬[2] CHEN Xiaolian;ZHANG Jie;LI Yajie;TU Zhiwei;ZHANG Huibin(Wuxi Power Supply Company,State Grid Jiangsu Electric Power Co.,Ltd.,Wuxi 214000,China;State Key Laboratory of Information Photonics and Optical Communications,Beijing University of Posts and Telecommunications,Beijing 100876,China)

机构地区:[1]国网江苏省电力有限公司无锡供电分公司,江苏无锡214000 [2]北京邮电大学信息光子学与光通信国家重点实验室,北京100876

出  处:《电力信息与通信技术》2020年第10期15-19,共5页Electric Power Information and Communication Technology

基  金:国家自然科学基金(61831003);国网江苏省电力有限公司科技项目“基于抵入噪声技术的长跨距无中继光通信物理层安全传输系统研究及应用”(J2019124)。

摘  要:现有光纤通信系统无法抵御物理层攻击,常通过预共享密钥对信息加密来确保通信安全。随着量子计算机的问世,公钥加密算法已不再安全。量子密钥分发虽能提供理论上的无条件安全,但它需要单光子或弱信号传输,对噪声和损伤特别敏感,因此无法使用光放大器,不适合长距离传输。光通信物理层密钥分发更为简单,在现有光纤传输系统的基础上,利用各种独特的信道特征的变化来量化生成密钥,安全性较高,但其分发所得密钥未达到完全一致,无法直接应用。文章提出了一种面向光通信物理层密钥分发的后处理方法,通信双方对分发所得密钥进行随机化、分段及奇偶校验处理,通过传递边信息分段纠错,经保密增强处理后,密钥在信息泄露量最少的情况下达到一致。Existing optical fiber communication systems cannot resist physical layer attacks and often use preshared keys to encrypt information to ensure communication security.With the advent of quantum computers,public-key encryption algorithms are no longer secure.Although quantum key distribution can provide unconditional security theoretically,it requires single photon or weak signal transmission and is particularly sensitive to noise and damage.Therefore,optical amplifiers cannot be used,which is not suitable for longdistance transmission.Alternatively,the key distribution of optical communication physical layer is simpler.On the basis of the existing optical fiber transmission system,various unique channel characteristics are quantified to generate the keys,which has high security.However,the keys are not consistent completely and cannot be directly applied.This paper proposes a post-processing method for key distribution of optical communication physical layer.Both communication parties randomize,segment and parity-check the keys obtained by the distribution.correct errors by passing side information.after the privacy amplification,the key reaches consistent with the least amount of information leakage.

关 键 词:通信安全 密钥后处理 信息协商 保密增强 

分 类 号:TN918[电子电信—通信与信息系统]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象