Unlock instant, AI-driven research and patent intelligence for your innovation.

A Method of Resisting Wavelength Attack in Quantum Key Distribution System

A quantum key distribution, wavelength technology, applied in key distribution, can solve problems such as insufficiency and failure

Active Publication Date: 2019-05-21
QUANTUMCTEK
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These conditions are still not met in the real world
Its implicit condition also requires that the behavior of the sender (receiver) to select the modulation (measurement) base vector has true randomness, which is also possible due to the limitation of some actual parameters of the device.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method of Resisting Wavelength Attack in Quantum Key Distribution System
  • A Method of Resisting Wavelength Attack in Quantum Key Distribution System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The above-mentioned features and advantages of the present invention will become clearer and easier to understand through the following description of exemplary embodiments thereof in conjunction with the accompanying drawings.

[0025] The QKD system in this embodiment adopts the QKD scheme of BB84 protocol and polarization coding. The sender of the QKD system sends synchronous light and signal light, and the synchronous light and signal light are transmitted to the receiver of the QKD system through the same optical fiber. The signal light is the signal light corresponding to four polarization states prepared by the sender randomly selecting the horizontal vertical base (H, V) and the 45-degree diagonal base (P, N), denoted as H, V, P and N respectively.

[0026] like figure 1 As shown, the method for resisting wavelength attack in the QKD system of the present invention comprises the following steps:

[0027] (1) The receiver of the QKD system adopts first-stage fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for resisting a wavelength attack in a quantum key distribution system. According to the method, two level filtering means are used by a receiver of the quantum key distribution system, disguises for signal light are separated out by primary filtering, disguises for synchronous light are separated out by secondary filtering, a conformity removal technology is combined, and accordingly, effective defense to the wavelength attack is achieved. During wavelength attacking, the quantum key distribution system can make proper judgment, send out a warning signal to indicate the wavelength attack of the system and work normally during attacking, and thus, coding can be achieved safely.

Description

technical field [0001] The invention relates to the field of quantum secret communication, and in particular provides a method for resisting wavelength attacks in a quantum key distribution system. Background technique [0002] Quantum Key Distribution (QKD, Quantum Key Distribution) technology is a new type of key distribution technology that has emerged in recent years. According to a specific protocol, it uses quantum state encoding information at the single-photon level, and the two parties in communication can share a large number of random secrets. key. Since single photons are indivisible in physical principles and quantum states cannot be cloned, quantum key distribution is not eavesdropping in physical principles and has theoretical absolute security. [0003] Although the QKD prototype based on the BB84 protocol (Quantum cryptography: public-key distribution and coin tossing. Proceedings of the IEEE International Conference on Computers, Systems, and Signal Proces...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
Inventor 不公告发明人
Owner QUANTUMCTEK