Quantum key distribution, privacy amplification and data transmission methods, apparatuses, and system

一种量子密钥分发、隐私放大的技术,应用在基于量子密钥的数据传输系统,量子密钥分发领域,能够解决量子密钥分发过程存在、安全隐患等问题

Active Publication Date: 2016-05-04
ALIBABA GRP HLDG LTD
View PDF7 Cites 47 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] This application provides a quantum key distribution method and device to solve the problem of security risks in the quantum key distribution process caused by negotiating privacy amplification parameters in classical channels in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum key distribution, privacy amplification and data transmission methods, apparatuses, and system
  • Quantum key distribution, privacy amplification and data transmission methods, apparatuses, and system
  • Quantum key distribution, privacy amplification and data transmission methods, apparatuses, and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0136] In the following description, numerous specific details are set forth in order to provide a thorough understanding of the application. However, the present application can be implemented in many other ways different from those described here, and those skilled in the art can make similar promotions without violating the connotation of the present application. Therefore, the present application is not limited by the specific implementation disclosed below.

[0137] In this application, a quantum key distribution method and device, a privacy amplification method and device for the quantum key distribution process, a quantum key-based data transmission method, and a quantum key-based Keyed data transfer system. Each will be described in detail in the following examples.

[0138] Please refer to figure 1 , which is a flowchart of an embodiment of a quantum key distribution method of the present application. The method comprises the steps of:

[0139] Step 101: Perform i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses a quantum key distribution method and an apparatus, a privacy amplification method and an apparatus for the process of quantum key distribution, a data transmission method based on quantum keys, and a data transmission system based on the quantum keys. The quantum key distribution method includes: obtaining bit streams with the same basis vector by sending or receiving coding quantum states of random bit streams and comparing and measuring basis vectors; extracting parameter information related to privacy amplification and initial keys from the bit streams with the same basis vector after error code correction according to a pre-appointed method; and regarding the initial key as input, implementing the privacy amplification algorithm according to the parameter information, and obtaining a shared quantum key. By employing the method, hidden risks for negotiation of privacy amplification parameters in classical channels can be eliminated, and the security of the quantum key distribution process is effectively improved.

Description

technical field [0001] This application relates to the field of quantum keys, in particular to a quantum key distribution method. This application also provides a quantum key distribution device, a privacy amplification method and device for the quantum key distribution process, a quantum key-based data transmission method, and a quantum key-based data transmission system . Background technique [0002] The security of classical cryptography is based on computational complexity (such as discrete logarithm or large number decomposition and other difficult problems), however, the rapid increase in computing power of cloud computing and quantum computing provides the possibility to decipher classical cryptography. Classical cryptography faces great challenges. In this case, quantum cryptography has become the focus of attention due to its unique security. [0003] Quantum cryptography is a cross product of quantum mechanics and cryptography, and its security is guaranteed by...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L1/00
CPCH04L9/0852H04L9/0858
Inventor 付颖芳刘栓林高亚滨肖力庞俊英陈秀忠冯亮
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products