检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:李宏欣[1,2,3] 高明[1,2] 马智 马传贵[1,2] 王伟[3]
机构地区:[1]解放军信息工程大学,郑州450001 [2]数学工程与先进计算国家重点实验室,郑州450001 [3]解放军外国语学院语言工程系,洛阳471003
出 处:《密码学报》2014年第6期589-601,共13页Journal of Cryptologic Research
基 金:国家高科技研究和发展项目(863项目)(2011AA010803);国家自然科学基金项目(U1204602);数学工程与先进计算国家重点实验室开放课题项目(2013A14)
摘 要:量子密钥分发是量子密码研究中最为实用的领域,基于量子的物理属性保证通信的无条件安全.针对实际系统中光源等设备的不理想,同时为了抵抗光子数分离攻击和提高安全密钥率,人们提出了诱骗态思想和相关的实用量子密钥分发方案.经过近十年的发展,其安全性分析由无限码长转为更加实用的有限码长条件.本文首先介绍诱骗态量子密钥分发方案安全性分析的相关研究进展,在一些高效安全方案的基础上提出一种通用可组合安全下的诱骗态方案,方案采用弱诱骗态和真空诱骗态模式,主要特点在于利用信号态、诱骗态均成码和偏选基方法提高安全密钥生成率;同时针对与最终码率相关的五个参数,即信号态真空脉冲、信号态单光子脉冲、弱诱骗态真空脉冲、弱诱骗态单光子脉冲的计数率下界和单光子相位误码率的上界,采用大数定律进行有限码长条件下的统计涨落分析,设置相关的安全参数及条件使得方案满足UC安全.在相同安全标准下对比三类典型的方案,我们提出的方案更加高效、安全和实用,具有现实可行性.Quantum key distribution is one of the most applicable fields in quantum cryptography, which guarantees unconditional secure communication based on quantum physics. Given the fact that there are some undesirabilities in light sources and other devices of real systems, decoy-state idea and the related quantum key distribution schemes have been proposed to resist photon-number-splitting attack and improve the secret key rate. After ten years of development, its security analysis changes the assumption from asymptotic case into finite-key condition which is more practical. We first introduce the related research of security analysis of decoy-state protocols, and then put forward a new scheme with universal composable security, which employs weak decoy-state and vacuum decoy-state. Aiming at improving the secret key rate, we make full use of signal state and decoy-state for generating secret key and adopt the biased basis methods. Meanwhile, under the finite key assumption, the law of large numbers is employed to analyze the statistical fluctuations of five kinds of parameters, including the lower bound of vacuum pulse and single photon of signal state, the ones of weak decoy-state, and the upper bound of single photon phase error rate. Then the relevant security parameters and conditions are set to meet the UC security standards. Comparing to the three typical protocols under the same security standards, the new scheme is more efficient, secure and applicable, and possesses realistic feasibility.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.16.107.122