检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:陈小明 陈雷[1,2] 阎亚龙 CHEN Xiaoming;CHEN Lei;YAN Yalong(School of Cyberspace Security,Beijing University of Posts and Telecommunications,Haidian Beijing 100876;Beijing Electronic Science and Technology Institute,Fengtai Beijing 100070;School of Cyber Science and Technology,University of Science and Technology of China,Hefei 230026)
机构地区:[1]北京邮电大学网络空间安全学院,北京海淀区100876 [2]北京电子科技学院,北京丰台区100070 [3]中国科学技术大学网络空间安全学院,合肥230026
出 处:《电子科技大学学报》2022年第4期482-487,共6页Journal of University of Electronic Science and Technology of China
基 金:部级基金(JCKY2019102C001)。
摘 要:采用贝叶斯决策来区分单诱骗态量子密钥分发中的信号态和诱骗态。分析结果表明,仍然只能得到信号态和诱骗态拥有相同i光子透射率的结论,从而验证了信号态和诱骗态不可区分这一假设的合理性,也验证了诱骗态方法的安全性。此外,分别对比单信号态和信号态+单诱骗态两种情况下光子数分离攻击前后的安全密钥率,发现前者攻击成功,后者攻击失败,这证明了诱骗态存在的必要性,验证了诱骗态方法确实能够抵抗光子数分离攻击,同时也进一步验证了诱骗态方法的安全性。In this paper, we use Bayesian decision to distinguish signal state from decoy state in one decoystate quantum key distribution. The analysis results show that we can still only get the conclusion that the signal state and decoy state have the same i-photon transmittance, which verifies the rationality of the assumption that signal state and decoy state are indistinguishable, and also verifies the security of decoy-state method. In addition,by comparing the secure key rate of two cases including only signal state and signal state + one decoy state before and after photon number splitting attack, we find the former is successful and the latter is failed. This just proves the necessity of the existence of decoy state, verifies that the decoy-state method can indeed resist photon number splitting attack, and further verifies the security of decoy-state method.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.49