您的位置: 专家智库 > >

国家自然科学基金(61101137)

作品数:8 被引量:34H指数:3
相关作者:李宏伟李玉虎俞能海何德勇黄靖正更多>>
相关机构:中国科学技术大学解放军信息工程大学更多>>
发文基金:国家自然科学基金国家重点基础研究发展计划中国博士后科学基金更多>>
相关领域:电子电信理学电气工程更多>>

文献类型

  • 8篇中文期刊文章

领域

  • 6篇电子电信
  • 6篇理学
  • 1篇电气工程

主题

  • 5篇子密钥
  • 5篇量子
  • 5篇量子密钥
  • 4篇量子密钥分配
  • 4篇密钥分配
  • 4篇QUANTU...
  • 2篇诱骗
  • 2篇量子密钥分发
  • 2篇密钥分发
  • 2篇PASSIV...
  • 1篇电磁
  • 1篇电磁干扰
  • 1篇电力架空光缆
  • 1篇信号
  • 1篇有限资源
  • 1篇状态量
  • 1篇无信号
  • 1篇误差检定
  • 1篇误差校验
  • 1篇相干

机构

  • 1篇解放军信息工...
  • 1篇中国科学技术...

作者

  • 1篇王双
  • 1篇李芳毅
  • 1篇刘东
  • 1篇韩正甫
  • 1篇周政
  • 1篇银振强
  • 1篇姚尧
  • 1篇陈巍
  • 1篇黄靖正
  • 1篇何德勇
  • 1篇俞能海
  • 1篇李玉虎
  • 1篇李宏伟

传媒

  • 5篇Chines...
  • 2篇Scienc...
  • 1篇中国科学:物...

年份

  • 4篇2014
  • 1篇2013
  • 3篇2012
8 条 记 录,以下是 1-8
排序方式:
Fast implementation of length-adaptive privacy amplification in quantum key distribution被引量:6
2014年
Post-processing is indispensable in quantum key distribution(QKD), which is aimed at sharing secret keys between two distant parties. It mainly consists of key reconciliation and privacy amplification, which is used for sharing the same keys and for distilling unconditional secret keys. In this paper, we focus on speeding up the privacy amplification process by choosing a simple multiplicative universal class of hash functions. By constructing an optimal multiplication algorithm based on four basic multiplication algorithms, we give a fast software implementation of length-adaptive privacy amplification. "Length-adaptive" indicates that the implementation of privacy amplification automatically adapts to different lengths of input blocks. When the lengths of the input blocks are 1 Mbit and 10 Mbit, the speed of privacy amplification can be as fast as 14.86 Mbps and 10.88 Mbps, respectively. Thus, it is practical for GHz or even higher repetition frequency QKD systems.
张春梅李默黄靖正Patcharapong Treeviriyanupab李宏伟李芳毅王川银振强陈巍Keattisak Sripimanwat韩正甫
关键词:量子密钥分配保密增强秘密密钥
量子密码安全性研究被引量:16
2012年
本文介绍了量子密码协议安全性证明的三种模型,并据此针对光源、有源光学调制器件、无源光学调制器件和探测器的非理想特性,分别度量了实际量子密钥分配系统和理想量子密钥分配协议之间的差异,并针对各种实际器件的非理想性,分析了实际量子密钥分配系统安全性存在的问题以及可能存在的攻击方案.在综合介绍国内外量子密钥分配安全性相关工作进展的同时,着重对当前的主流设备无关及半设备无关量子密码方案进行了分析阐述.
李宏伟陈巍黄靖正姚尧刘东李芳毅王双银振强何德勇周政李玉虎俞能海韩正甫
关键词:量子密码
Experimental demonstration of passive decoy state quantum key distribution
2012年
Passive decoy state quantum key distribution(PDS-QKD) has advantages in high-speed scenarios.We propose a modified model to simulate the PDS-QKD with a weak coherent light source based on Curty’s theory [Opt.Lett.34 3238(2009)].The modified model can provide better performance in a practical PDS-QKD system.Moreover,we report an experimental demonstration of the PDS-QKD of over 22.0-dB channel loss.
张阳王双银振强陈巍梁文烨李宏伟郭光灿韩正甫
关键词:量子密钥分发诱骗相干光源
被动圈套状态量钥匙分发的试验性的示范
2012年
Passive decoy state quantum key distribution(PDS-QKD) has advantages in high-speed scenarios.We propose a modified model to simulate the PDS-QKD with a weak coherent light source based on Curty’s theory [Opt.Lett.34 3238(2009)].The modified model can provide better performance in a practical PDS-QKD system.Moreover,we report an experimental demonstration of the PDS-QKD of over 22.0-dB channel loss.
张阳王双银振强陈巍梁文烨李宏伟郭光灿韩正甫
关键词:QUANTUMKEYPASSIVEDECOY
全文增补中
Security of biased BB84 quantum key distribution with finite resource
2014年
In the original BB84 quantum key distribution protocol, the states are prepared and measured randomly, which lose the unmatched detection results. To improve the sifting efficiency, biased bases selection BB84 protocol is proposed.Meanwhile, a practical quantum key distribution protocol can only transmit a finite number of signals, resulting in keys of finite length. The previous techniques for finite-key analysis focus mainly on the statistical fluctuations of the error rates and yields of the qubits. However, the prior choice probabilities of the two bases also have fluctuations by taking into account the finite-size effect. In this paper, we discuss the security of biased decoy state BB84 protocol with finite resources by considering all of the statistical fluctuations. The results can be directly used in the experimental realizations.
赵良圆李宏伟银振强陈巍尤娟韩正甫
关键词:量子密钥分配协议有限资源BB84协议
Delayed error verification in quantum key distribution被引量:12
2014年
Quantum key distribution(QKD)provides an unconditional secure key generation method between two distant legitimate parties Alice and Bob based on the fundamental properties of quantum mechanics,in the presence of an eavesdropper Eve.Since key reconciliation cannot always assure that the reconciled keys between Alice and Bob are identical,error verification is an important step in QKD.In this paper,we propose a scheme of delayed error verification using extra keys gained by privacy amplification with an arbitrarily small failure probability.The proposed scheme simplifies the post-processing procedure in QKD,which can be applied in practical QKD systems.
Chun-Mei ZhangXiao-Tian SongPatcharapong TreeviriyanupabMo LiChao WangHong-Wei LiZhen-Qiang YinWei ChenZheng-Fu Han
关键词:量子密钥分配误差检定量子密钥分发误差校验
The security of decoy state protocol in the partial photon number splitting attack被引量:1
2013年
The decoy state protocol was proposed to overcome the primitive photon number splitting attack.When using a better strategy,the attacker can ensure that the ratio of the overall gain of the signal state pulse against the decoy state pulse changes very little,even to keep the overall gain of the signal state pulses equal to that obtained without attacker.In this paper we first give a model of the partial photon number splitting attack which contains the original one,and then find that the decoy state protocol still works effectively under the partial photon number splitting attack.
LIU DongWANG ShuangYIN ZhenQiangCHEN WeiHAN ZhengFu
关键词:攻击者光子数诱骗无信号
Effect of electromagnetic disturbance on the practical QKD system in the smart grid被引量:2
2014年
To improve the security of the smart grid, quantum key distribution(QKD) is an excellent choice. The rapid fluctuations on the power aerial optical cable and electromagnetic disturbance in substations are two main challenges for implementation of QKD. Due to insensitivity to birefringence of the channel, the stable phase-coding Faraday–Michelson QKD system is very practical in the smart grid. However, the electromagnetic disturbance in substations on this practical QKD system should be considered. The disturbance might change the rotation angle of the Faraday mirror, and would introduce an additional quantum bit error rate(QBER). We derive the new fringe visibility of the system and the additional QBER from the electromagnetic disturbance. In the worst case, the average additional QBER only increases about 0.17% due to the disturbance, which is relatively small to normal QBER values. We also find the way to degrade the electromagnetic disturbance on the QKD system.
李芳毅王东王双李默银振强李宏伟陈巍韩正甫
关键词:电磁干扰QKD量子密钥分配电力架空光缆法拉第镜
共1页<1>
聚类工具0