Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantum secret key distribution privacy amplification method supporting large-scale dynamic changes

A quantum key distribution and security enhancement technology, applied to key distribution, can solve the problems of time-consuming, reduce the processing performance of the security enhancement method, and the security enhancement method cannot meet real-time high-speed processing, etc., to achieve strong flexibility and high processing performance Effect

Active Publication Date: 2015-04-08
NAT UNIV OF DEFENSE TECH
View PDF1 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When FFT technology processes variable-length key strings, it is necessary to construct an FFT transformation scheme of the same length, and constructing a large-scale FFT transformation scheme is very time-consuming, which will reduce the processing performance of the security enhancement method.
[0008] It can be seen from the above that the security enhancement method based on Toeplitz matrix and FFT technology in the traditional quantum key distribution system cannot meet the problem of real-time high-speed processing under the condition of large-scale dynamic changes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum secret key distribution privacy amplification method supporting large-scale dynamic changes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be further described in detail below with reference to the drawings and specific embodiments of the specification.

[0036] Such as figure 1 As shown, the steps of the method of the present invention for supporting large-scale dynamic change of quantum key distribution confidentiality enhancement are:

[0037] S1: Initialization;

[0038] When the security enhancement method is started, calculate the optimal operation scale m of the FFT module according to the actual operating parameters of the quantum key distribution system; initialize the FFT operation and inverse FFT operation modules with the scale m;

[0039] S2: Data normalization;

[0040] According to the detector count rate Q of the quantum key distribution system μ , Qubit error rate E μ , After the error correction, the weak security key length n and the quantum key distribution system security parameter s are calculated to calculate the final security key length r, and the initial key str...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a quantum secret key distribution privacy amplification method supporting large-scale dynamic changes. The method includes the steps of firstly, conducting initialization, wherein the optimal operation scale m of an FFT module is calculated according to the actual running parameters of a quantum secret key distribution system when the privacy amplification method is started, and the initialization scale is an FFT operation and inverse FFT operation module of m; secondly, normalizing data, wherein the final security secret key length r is calculated according to the detector counting rate Q mu of the quantum secret key distribution system, the quantum bit error rate E mu, the corrected weak security secret key length n and the security parameter s of the quantum secret key distribution system, and normalizing an initial secret key string and a Toeplitz matrix according to the parameter m, the parameter n and the parameter r; thirdly, conducting data operation, wherein the operation process of the Toeplitz matrix and the initial secret key string is operated through the FFT technology, the first r items of the calculation result are taken to form a result vector, namely, the final security secrete key. The method has the advantages of being high in flexibility, better in processing performance, and the like.

Description

Technical field [0001] The present invention mainly relates to the field of quantum keys, and particularly refers to a method for enhancing the confidentiality of quantum key distribution for supporting large-scale dynamic changes. Background technique [0002] In recent years, with the rapid development of computing technology, modern cryptosystems (including symmetric key systems and asymmetric cryptosystems) based on the complexity of mathematical problems are facing severe security challenges, especially the Peter Shor quantum decomposition algorithm. Utilizing the parallelism of quantum computing, it can quickly decipher the currently widely used encryption algorithms such as RSA. Once the quantum computer is successfully developed, it will seriously threaten the information security of the country's core areas of finance, politics, and military affairs. "One-Time Pad" (OTP) is currently the only encryption algorithm that has been proven to be secure in information theory (...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
Inventor 吴纯青刘波赵宝康虞万荣王宝生陶静陈一骄毛席龙崔向东冯振乾胡晓峰赵锋文玲刘博张振宁
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products