Continuous variable quantum key distribution (CVQKD) security defense method

A technology of quantum key distribution and security defense, which is applied in the field of continuous variable quantum key distribution security defense based on shot noise variance monitoring, and can solve the problems of inability to obtain shot noise variance, defense failure, and inability to obtain key rate, etc.

Active Publication Date: 2015-04-22
上海循态量子科技有限公司
View PDF2 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At this time, the legitimate communication party will not be able to obtain the changed variance of the shot noise, so that the real key rate cannot be obtained, resulting in the failure of the defense. This is the principle of the shot noise variance scaling attack based on the local oscillator.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Continuous variable quantum key distribution (CVQKD) security defense method
  • Continuous variable quantum key distribution (CVQKD) security defense method
  • Continuous variable quantum key distribution (CVQKD) security defense method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several modifications and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0053] The CVQKD system security defense method based on shot noise variance monitoring provided by the present invention, such as figure 1 , figure 2 As shown, the specific steps are as follows:

[0054] (1) Optical signal transmission stage of the CVQKD system: first, the CVQKD system encodes a series of Gaussian random numbers from the Alice end on the coherent state, takes the encoded coherent state as the signal state, and passes the time division multiplexing and The polarization multiple...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a continuous variable quantum key distribution (CVQKD) security defense method. The method comprises the following steps: A, shot noise monitoring: establishing a shot noise variance by monitoring the local oscillation light intensity of a receiving end in real time; and B, key rate calculation: calculating a running key rate according to the real-time shot noise variance estimated in the step A, wherein the two steps are executed simultaneously and concurrently. The shot noise variance during system running is acquired through a method for monitoring the local oscillation light of the receiving end of a CVQKD system, and the real-time running key rate of the system is acquired in combination with a parameter estimation method, so that security pre-warning is given to system security.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a continuous variable quantum key distribution (CVQKD) security defense method based on shot noise variance monitoring. [0002] This method is the defense technology proposed for this series of attack methods. In addition, since the detection security of this method is based on the real-time key rate, it can also detect general collective attacks. Background technique [0003] As information security has attracted more and more attention, quantum secure communication with unique security has gradually become familiar to everyone. After nearly 30 years of development, discrete variable quantum secure communication technology has already appeared in commercial products. Continuous variable quantum secure communication technology appeared relatively late, but developed rapidly, and is currently undergoing applied research. Like discrete variable techniques, continuou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0819H04L9/0852H04L63/062
Inventor 黄鹏黄端刘维琪韩二虎曾贵华
Owner 上海循态量子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products