量子光学学报, 2008, 14 (1): 24, 网络出版: 2008-08-17  

利用诱骗信号方案进行实用的量子密钥分发

Practical Quantum Key Distribution with Decoy State Method
作者单位
西安电子科技大学计算机网络与信息安全教育部重点实验室,陕西,西安,710071
摘要
真实量子密钥分发系统中不完善的单光子源和信道损耗的存在,使得现有基于弱相干态的量子密码实验在分束攻击下并不安全,诱骗信号方案能实现基于现有技术绝对安全的量子密钥分发,并能有效提高密钥分发率和安全传输距离,因此成为近年来量子通信研究的热点问题.结合现实量子密码系统的一般模型,介绍目前几种典型的诱骗信号方案以及实验进展,综述了诱骗信号方案的发展情况和最新成果,并对未来的研究方向进行了展望.
Abstract
参考文献

[1] MAYERS D.Unconditional Security in Quantum Cryptography[J].Journal of the ACM,2001,48(3):351-406.

[2] SHOR P W,PRESKILL J.Simple Proof of Seeurtiy of the BB84 Quantum Key Distribution Protocol[J].Phys Rev Lett,2000,85:441-444.

[3] EKERT A K,HUTTNER B.Information Gain in Quantum Eavesdropping[J].J Mod opt,1994,41:24552466.

[4] id Quantique SA.Emerging Technogies That Will Change the World[N/OL].Business Week.July 2003.http://www.idquantique.com/news/news-Techreview.htm.

[5] BRASSARD G,LUTKENHAUS N,MOR T,et al.Limitation on Practical Quantum Cryptography[J].Phys Rev Lett,2000,8S:1330.

[6] HWANG W Y.Quantum Key Distribution with High Loss:toward Global Secure Communication[J].Phys Rev Lett,2003,91:057901.

[7] MA X F,QI B,ZHAO Y,et al.Practical Decoy State for Quantum Key Distribution[J].Phys Rev A,2005,72:012326.

[8] LO H K,MA X F,CHEN K.Decoy State Quantum Key Distribution[J].Phys Rev Lett,2005,94:230504.

[9] H.ARRINGTON J W,ETYINGER J M,HUGHES R J,et al.Enhancing Practical Security of QKD with a few Decoy States[EB/OL].http://arxiv.org/abs/quant-ph/0503002.

[10] WANG X B.Beating the Photon.number.splitting Attack in Practical Quantum Cryptography[J].Phys Rev Lett,2005,94:230503.

[11] WANG X B.Quantum Key Distribution with 4 Intensities of Coherent Light[J].Phys Rev A,2005,72:012322.

[12] ZHAO Y,QI B,MAX F,et al.Experimental Quantum Key Distribution with Decoy States[J].Phys Rev Lett,2006,96:070502.

[13] ZHAO Y,QI B,M A X F,et al.Simulation and Implementation of Decoy State Quantum Key Distribution over 60 km Telecom Fiber[EB/OL].http://arxiv,org/as/quant-ph/0601168.

[14] PENG C Z,ZHANG J,YANG D,et al.Experimental Long-Distance Decoy-State Quantum Key Distribution Based On Polarization Encoding[EB/OL]/ http://arxiv.org/abs/quant-ph/0607129.

[15] ROSENBERG D,HARRINGTON J W,RICE P R,et al.Long Distance Decoy State Quantum Key Distribution in Optical Fiber[EB/OL].http://arxiv,org/abs/quant-ph/0607186.

[16] MA X F,FUNG C H F,DUPUIS F,et al.Decoy state Quantum Key Distribution with two-way Classical Post-processing[EB/OL].http://arxiv.org/abs/quant-ph/0604094.

[17] WANG J,ZHANG Q,TANG C J.Quantum Secure Direct Communication with Pure Entangled States[EB/OL].http://arxiv.org/abs/quant-ph/0606236.

[18] LI J B,FANG X M.Nonorthogonal Decoy State QKD[EB/OL].http://arxiv,org/abs/quant-qh/0509077.

[19] DENG F G,LI X H,LI C Y,et al.Any-to-any Quantum Direct Communication with Superdense Coding and Decoy States[EB/OL].http:// arxiv. org/abs/quant-ph/0605214.

[20] NORBERT LUTKENHAUS.Security against Individual Attacks for Ralistic Quantum Key Distribution[J].Phys Rev A,2000,61:052304.

[21] GOTTESMAN D,LO H K,LUTKENHAUS N,et al.Security of Quantum Key Distribution with Imperfect Deviees[J].Quantum Information and Computation,2004,4:325-360.

[22] BENNETT C H,BRASSARD G.Quantum Cryptography:Public Key Distribution and Coin Tossing[C].Proceedings of the IEEE International Conference on Computer Systems and Signal Processing,Bangalore India,December 1984:175-179.

[23] LO H-K,CHAU H F,ARDEHALI M.Efficient Quantum Key Distribution Scheme and a Proof of its Unconditional Security[P].Journal of Cryptology,2005,18:133.

邹佩琳, 李晖. 利用诱骗信号方案进行实用的量子密钥分发[J]. 量子光学学报, 2008, 14(1): 24. 邹佩琳, 李晖. Practical Quantum Key Distribution with Decoy State Method[J]. Acta Sinica Quantum Optica, 2008, 14(1): 24.

关于本站 Cookie 的使用提示

中国光学期刊网使用基于 cookie 的技术来更好地为您提供各项服务,点击此处了解我们的隐私策略。 如您需继续使用本网站,请您授权我们使用本地 cookie 来保存部分信息。
全站搜索
您最值得信赖的光电行业旗舰网络服务平台!