期刊文献+

量子保密通信的技术现状及安全性 被引量:6

The security and recent technology of QKD
下载PDF
导出
摘要 理论上,量子密钥分发可以带来绝对安全的保密通信.但是真实系统的量子密钥分发的安全性需要进一步证明.现有的基于弱相干态的量子密码实验在光子数分离攻击下是完全不安全的.诱骗信号方案(decoy-statem ethod)及纠缠对分发方案可以实现基于现有技术的、真实系统的绝对安全量子密钥分发. In principle, quantum key distribution (QKD) can be used to make unconditionally secure pri- vate communication. However, the security of existing real system for QKD needs to be carefully examined. Actually, the existing experiments based on weak coherent states are insecure under photon-number-splitting attack. Fortunately, the decoy-state method and the entanglement-distribution method can be used to realize the unconditionally secure QKD based on real-life system with existing technology.
出处 《物理》 CAS 北大核心 2006年第2期125-129,共5页 Physics
关键词 量子保密通信 安全性 BB84方案 诱骗信号方案 光子数分离攻击 QKD , security , BB84 method , decoy-state method , photon-number-splitting attack
  • 相关文献

参考文献31

  • 1Shor P.Proc.35th Ann.Symp.on Found.Of Computer Science.IEEE Comp.Soc.Press.Los Alomitos,CA,1994.124-134
  • 2Wang X Y et al.Efficient collision attacks on SHA -0,Crypto 05
  • 3Wang X Y et al.Finding collisions in the full SHA-1 Collision search attacks on SHA1,Crypto05
  • 4Wang X Y et al.Collision for some hash functions MD4,MD5,HAVAL-128,Crypto04
  • 5Bennett C H et al.In:Proc.IEEE Int.Conf.on Computers,systems,and signal processing.Bangalore.IEEE,New York,1984.175
  • 6Mayers D et al.Comput.Mach.,2001,48:351(Its preliminary version appeared in "Advances in Cryptology-Proc.Crypto" 96,Vol.1109 of Lecture Notes in Computer Science.New York:Springer-Verlag,1996.343
  • 7Koashi M.quant-ph/0507154
  • 8Shor P W et al.Phys.Rev.Lett.,2000,85:441
  • 9Stucki D et al.NewJ.Phys.,2002,4:41
  • 10Gobby C et al.Appl.Phys.Lett.,2004,84:3762

二级参考文献42

  • 1Nielson M A, Chuang I L. Quantum Computation and Quantum Information. Cambridge University Press, 2000.
  • 2Bouwmeester D, Ekert A, Zeilinger A. The Physics of Quantum Information. Springer-Verlag Berlin: Heidelberg, 2000.
  • 3Gisin N, Ribordy G, Tittel Wet al. Rev. Mod. Phys, 2002,74: 145.
  • 4Shor P W. Proc. 35th Annu. Symp. on the Foundations of Computer Science. IEEE Computer Society Press, Los Alamitos, California, 1994. 124-134.
  • 5Vernam G. J. Am. Inst. Electr. Eng, 1926, 45:109.
  • 6Bennett C H, Brassard G. Proc. IEEE Int. Conf. on Computers, Systems and Signal Processing. Bangalore, India(IEEE, New York, 1984). 175-179.
  • 7Lo H. -K, Chau H F. Science, 1999, 283:2050.
  • 8Shor P W, Preskill J. Phys. Rev. Lett, 2000, 85: 441.
  • 9Bennett C H. Phys. Rev. Lett, 1992, 68:3121.
  • 10BruB D. Phys. Rev. Lett. 1998, 81:3018.

共引文献11

同被引文献37

引证文献6

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部