诱骗态量子密钥分发中不可区分假设的合理性和安全性验证  被引量:3

Rationality and Security Verification of Indistinguishability Assumption in Decoy-State Quantum Key Distribution

在线阅读下载全文

作  者:陈小明 陈雷[1,2] 阎亚龙 CHEN Xiaoming;CHEN Lei;YAN Yalong(School of Cyberspace Security,Beijing University of Posts and Telecommunications,Haidian Beijing 100876;Beijing Electronic Science and Technology Institute,Fengtai Beijing 100070;School of Cyber Science and Technology,University of Science and Technology of China,Hefei 230026)

机构地区:[1]北京邮电大学网络空间安全学院,北京海淀区100876 [2]北京电子科技学院,北京丰台区100070 [3]中国科学技术大学网络空间安全学院,合肥230026

出  处:《电子科技大学学报》2022年第4期482-487,共6页Journal of University of Electronic Science and Technology of China

基  金:部级基金(JCKY2019102C001)。

摘  要:采用贝叶斯决策来区分单诱骗态量子密钥分发中的信号态和诱骗态。分析结果表明,仍然只能得到信号态和诱骗态拥有相同i光子透射率的结论,从而验证了信号态和诱骗态不可区分这一假设的合理性,也验证了诱骗态方法的安全性。此外,分别对比单信号态和信号态+单诱骗态两种情况下光子数分离攻击前后的安全密钥率,发现前者攻击成功,后者攻击失败,这证明了诱骗态存在的必要性,验证了诱骗态方法确实能够抵抗光子数分离攻击,同时也进一步验证了诱骗态方法的安全性。In this paper, we use Bayesian decision to distinguish signal state from decoy state in one decoystate quantum key distribution. The analysis results show that we can still only get the conclusion that the signal state and decoy state have the same i-photon transmittance, which verifies the rationality of the assumption that signal state and decoy state are indistinguishable, and also verifies the security of decoy-state method. In addition,by comparing the secure key rate of two cases including only signal state and signal state + one decoy state before and after photon number splitting attack, we find the former is successful and the latter is failed. This just proves the necessity of the existence of decoy state, verifies that the decoy-state method can indeed resist photon number splitting attack, and further verifies the security of decoy-state method.

关 键 词:贝叶斯决策 诱骗态 不可区分假设 光子数分离攻击 量子密钥分发 

分 类 号:O431.2[机械工程—光学工程]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象