量子光学学报, 2014, 20 (4): 289, 网络出版: 2014-12-08   

基于BB84协议利用多对量子态实现量子密钥分配

Quantum Key Distribution with Multiple Pairs of States Based on BB84
作者单位
北京航空航天大学电子信息工程学院,北京 100191
摘要
为了改善BB84协议防窃听的能力,在BB84协议的基础上提出用M(M=3,4,5…)对量子态实现量子密钥分配。为了检测其安全性,用截获-重发的方式对量子密钥分配过程进行窃听,窃听者分别采用两种检测光子状态的方法:在M组基中随机选取一种基和用Breidbart基测量,并在这两种窃听方法下分别通过计算机仿真探究M值与安全性能的关系。仿真结果表明:用多对量子态实现量子密钥分配时,发现窃听者的能力与BB84协议相同,而窃听者可以获取的正确信息要比窃听BB84协议获取的正确信息少。从而提高了量子密钥分配的安全性。
Abstract
To improve BB84’s ability against eavesdropping,quantum key distribution(QKD) with M(M=3,4,5…) pairs of quantum states was proposed here. To test its security,the quantum key distribution process was eavesdropped by intercepting and retransmitting photons. The eavesdropper took two methods to measure every photon’s state:to measure with a randomly selected base from M bases,and to measure with Breidbart base. Under each eavesdropping methods,the relationship between M and safety was explored. The simulation result indicated:quantum key distribution with multiple pairs of states had the same perfomance with BB84 in detecting the eavesdropper,but it had better perfomance than BB84 in letting the eavesdropper get less information.
参考文献

[1] BENNETT C H,BESSETTE F,Brassard G,et al.Experimental Quantum Cryptography[J].Journal of cryptology,1992,5(1):3-28.

[2] 李宏伟,陈巍,黄靖正,等.量子密码安全性研究[J].中国科学:物理学,力学,天文学,2013,42(11):1237-1255.

[3] BOGDANSKI J,RAFIEI N,BOURENNANE M.Multiuser Uantum Key Distribution over Telecom Fiber Networks[J].Optics Communications,2009,282(2):258-262.

[4] URSIN R,TIEFENBACHER F,SCHMITT-MANDERBACH T,et al.Entanglement-based Quantum Communication over 144 km[J].Nature physics,2007,3(7):481-486.

[5] PEEV M,PACHER C,ALLAUME R,et al.The SECOQC Quantum Key Distribution Network in Vienna[J].New Journal of Physics,2009,11(7):075001.

[6] SASAKI M,FUJIWARA M,ISHIZUKA H,et al.Field Test of Quantum Key Distribution in the Tokyo QKD Network[J].Optics Express,2011,19(11):10387-10409.

[7] ZHAO G,ZHAO S,YAO Z,et al.Analysis of Polarization State in Quantum Key Distribution via Single-photon Two-qubit States[J].Optik-International Journal for Light and Electron Optics,2014,125(4):1522-1525.

[8] BENNETT C H,BRASSARD G.QUANTUM Cryptography:Public Key Distribution and Coin Tossing[C]∥Proceedings of IEEE International Conference on Computers,Systems and Signal Processing,1984,175(150):8.

[9] EKERT A K.Quantum Cryptography Based on Bell's Theorem[J].Physical Review Letters,1991,67(6):661-663.

[10] BENNETT CH.Quantum Cryptography Using any Twononorthogonal States[J].Phys Rev Lett,1992,68:3121-3124.

[11] WIESNER S. Conjugate Coding[J].ACM Sigact News,1983,15(1):78-88.

[12] SHOR P W,PRESKILL J.Simple Proof of Security of the BB84 Quantum Key Distribution Protocol[J].Physical Review Letters,2000,85(2):441.

[13] BENNETT C H,BRASSARD G,BREIDBART S, et al.Quantum Cryptography,or Unforgeable Subway Tokens[C]∥Advances in Cryptology. Springer US,1983:267-275.

[14] SHOR P W.Scheme for Reducing Decoherence in Quantum Computer Memory[J].Physical review A,1995,52(4):R2493.

[15] DANIEL A LIDAR,TODD A BRUN.Quantum Error Correction[M].Cambridge University Press,2013.

[16] HOFFMANN H,BOSTROEM K,FELBINGER T. Comment on“Secure Direct Communication with a Quantum One-time Pad”[J].Physical Review A,2005,72(1):16301.

[17] DENG F G,LONG G L. Reply to “Comment on ‘Secure Direct Communication with a Quantum One-time-pad’”[J].Physical Review A,2005,72(1):016302.

[18] LIU B,ZHAO B,ZOU D,et al.A Real-time Privacy Amplification Scheme in Quantum Key Distribution[M]∥Information and Communication Technology. Springer Berlin Heidelberg,2013:453-458.

江月松, 兰天星, 陈瑞强, 孙庆科, 何云涛. 基于BB84协议利用多对量子态实现量子密钥分配[J]. 量子光学学报, 2014, 20(4): 289. JIANG Yue-song, LAN Tian-xing, CHEN Rui-qiang, SUN Qing-ke, HE Yun-tao. Quantum Key Distribution with Multiple Pairs of States Based on BB84[J]. Acta Sinica Quantum Optica, 2014, 20(4): 289.

本文已被 1 篇论文引用
被引统计数据来源于中国光学期刊网
引用该论文: TXT   |   EndNote

相关论文

加载中...

关于本站 Cookie 的使用提示

中国光学期刊网使用基于 cookie 的技术来更好地为您提供各项服务,点击此处了解我们的隐私策略。 如您需继续使用本网站,请您授权我们使用本地 cookie 来保存部分信息。
全站搜索
您最值得信赖的光电行业旗舰网络服务平台!