Postprocessing method for quantum key distribution

A quantum key distribution and key technology, applied in the field of Internet communication, can solve problems such as security risks, achieve the effect of improving correctness and security, and ensuring absolute security

Active Publication Date: 2015-11-18
TSINGHUA UNIV
View PDF3 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because the quantum key distribution technology is still in the development stage, the existing post-processing schemes are often completed according to certain empirical steps in experiments and practical applications
Since the post-processing process is not carried out in accordance with strict security proof methods, the current post-processing scheme of quantum key distribution may have potential security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Postprocessing method for quantum key distribution
  • Postprocessing method for quantum key distribution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0025] The post-processing method of quantum key distribution according to the embodiment of the present invention will be described below with reference to the accompanying drawings.

[0026] Specifically, in the quantum key distribution protocol, after signal transmission, reception and measurement at the physical level, the sender and receiver will generate corresponding information. Since these information are not correspondingly equal, and there are information leaks and errors, post-processing is required to process these informati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a postprocessing method for quantum key distribution. The postprocessing method comprises the following steps of S1, performing information interaction and local postprocessing by a transmitting party and a receiving party, thereby acquiring a first shared key from transmitting information of the transmitting party and acquiring a second shared key from receiving information of the receiving party; S2, performing error correction on the first shared key and the second shared key; S3, verifying whether the first shared key and the second shared key are same, if yes, performing a step S4, and otherwise returning to the step S2; S4, evaluating the size of the leakage information by the transmitting party and the receiving party, and acquiring a safe key from the first shared key and the second shared key according to the size of the leakage information through a privacy amplification process; and S5, storing the safe key in a key pool by the transmitting party and the receiving party. The postprocessing method can improve correctness and safety in quantum key distribution.

Description

technical field [0001] The invention relates to the technical field of Internet communication, in particular to a post-processing method of quantum key distribution. Background technique [0002] With the rapid development and widespread popularization and application of the Internet, the importance of communication security is constantly increasing. In many cases, the communication parties hope to transmit information through public channels while ensuring the privacy of the information. For example, when a bank asks a user for an account number and password, the user always hopes that the information they transmit through the public channel is private and cannot be obtained by a third party. By encrypting the information one-time pad, the privacy and security of the information can be guaranteed. But this requires both parties to share a large number of private keys. The security of classical communication protocols is based on mathematical computational complexity by s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
Inventor 马雄峰袁骁
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products