Asymmetry-based communication method of decoy-state quantum key distribution protocols

A decoy state quantum and key distribution technology, which is applied in the communication field of decoy state quantum key distribution protocol, can solve the problems of not being, decoy state BB84 protocol is not the optimal method, needs to be improved, etc., and achieves reduced complexity and strong application. Value, the effect of increasing the generation rate

Active Publication Date: 2015-11-11
TSINGHUA UNIV
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

but not optimal
[0005] However, in the decoy-state BB84 protocol, it is assumed that Alice and Bob choose the base vectors for encoding and detection with the same pro...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asymmetry-based communication method of decoy-state quantum key distribution protocols

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0018] In addition, the terms "first" and "second" are used for descriptive purposes only, and cannot be interpreted as indicating or implying relative importance or implicitly specifying the quantity of indicated technical features. Thus, a feature defined as "first" and "second" may explicitly or implicitly include one or more of these features. In the description of the present invention, "plurality" means two or more, unless otherwise specifically defined.

[0019] In the present invention, unless otherwise clearly specified...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an asymmetry-based communication method of decoy-state quantum key distribution protocols. The asymmetry-based communication method comprises the following steps that: a receiver and a sender establish a communication channel; the sender randomly generates a digital sequence and codes the digital sequence under multi-intensity light; if the light is in a signal state, coding is carried out under same basis vectors; if the light is in a weak decoy state, coding is carried out under a first basis vector or a second basis vector in different probabilities respectively; the sender sends coding information to the receiver; the receiver measures the coding information under the first basis vector or the second basis vector in different probabilities respectively, so that a source code is generated; and a shared key is screened from the source code according to the coding basis vector and the light intensity selected by the sender and the measurement basis vector selected by the receiver. According to the asymmetry-based communication method provided in the embodiment of the invention, on the premise of ensuring the communication security, the security key generation rate is increased by asymmetrically selecting the basis vectors; and thus, the systematic complexity is reduced.

Description

technical field [0001] The invention relates to the technical field of Internet communication, in particular to a communication method based on an asymmetric decoy state quantum key distribution protocol. Background technique [0002] The security of the quantum key distribution protocol is guaranteed by the basic laws of quantum mechanics. Among them, the most widely used quantum key distribution protocol is the BB84 protocol, but the BB84 protocol requires the light source to be a single-photon source, but in practice, the single-photon source is difficult to achieve. [0003] In practical applications, related technologies generally use a coherent light source, which easily leads to the existence of multi-photon components. Due to the photon number attack, the multi-photon component must be insecure, but the single-photon component and the multi-photon component are together, and it is difficult to distinguish, which greatly reduces the safe transmission distance of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06
Inventor 马雄峰张振
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products