UC安全有限码长诱骗态协议研究  被引量:1

Research on UC Secure Finite-key Protocol with Decoy-state

在线阅读下载全文

作  者:李宏欣[1,2,3] 高明[1,2] 马智 马传贵[1,2] 王伟[3] 

机构地区:[1]解放军信息工程大学,郑州450001 [2]数学工程与先进计算国家重点实验室,郑州450001 [3]解放军外国语学院语言工程系,洛阳471003

出  处:《密码学报》2014年第6期589-601,共13页Journal of Cryptologic Research

基  金:国家高科技研究和发展项目(863项目)(2011AA010803);国家自然科学基金项目(U1204602);数学工程与先进计算国家重点实验室开放课题项目(2013A14)

摘  要:量子密钥分发是量子密码研究中最为实用的领域,基于量子的物理属性保证通信的无条件安全.针对实际系统中光源等设备的不理想,同时为了抵抗光子数分离攻击和提高安全密钥率,人们提出了诱骗态思想和相关的实用量子密钥分发方案.经过近十年的发展,其安全性分析由无限码长转为更加实用的有限码长条件.本文首先介绍诱骗态量子密钥分发方案安全性分析的相关研究进展,在一些高效安全方案的基础上提出一种通用可组合安全下的诱骗态方案,方案采用弱诱骗态和真空诱骗态模式,主要特点在于利用信号态、诱骗态均成码和偏选基方法提高安全密钥生成率;同时针对与最终码率相关的五个参数,即信号态真空脉冲、信号态单光子脉冲、弱诱骗态真空脉冲、弱诱骗态单光子脉冲的计数率下界和单光子相位误码率的上界,采用大数定律进行有限码长条件下的统计涨落分析,设置相关的安全参数及条件使得方案满足UC安全.在相同安全标准下对比三类典型的方案,我们提出的方案更加高效、安全和实用,具有现实可行性.Quantum key distribution is one of the most applicable fields in quantum cryptography, which guarantees unconditional secure communication based on quantum physics. Given the fact that there are some undesirabilities in light sources and other devices of real systems, decoy-state idea and the related quantum key distribution schemes have been proposed to resist photon-number-splitting attack and improve the secret key rate. After ten years of development, its security analysis changes the assumption from asymptotic case into finite-key condition which is more practical. We first introduce the related research of security analysis of decoy-state protocols, and then put forward a new scheme with universal composable security, which employs weak decoy-state and vacuum decoy-state. Aiming at improving the secret key rate, we make full use of signal state and decoy-state for generating secret key and adopt the biased basis methods. Meanwhile, under the finite key assumption, the law of large numbers is employed to analyze the statistical fluctuations of five kinds of parameters, including the lower bound of vacuum pulse and single photon of signal state, the ones of weak decoy-state, and the upper bound of single photon phase error rate. Then the relevant security parameters and conditions are set to meet the UC security standards. Comparing to the three typical protocols under the same security standards, the new scheme is more efficient, secure and applicable, and possesses realistic feasibility.

关 键 词:量子密码 量子密钥分配 诱骗态 有限码长 通用可组合安全 

分 类 号:O413[理学—理论物理] TN918[理学—物理]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象