Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Modified continuous-variable quantum key distribution method for resisting actual attack

A quantum key distribution and variable technology, applied in the field of information security, can solve the problems of increasing the complexity of the system, reducing the efficiency of the system detector, and reducing the final key rate of the system, so as to eliminate the effect of limited sampling bandwidth and improve the output encryption. Key rate, the effect of removing finite sampling bandwidth effects

Active Publication Date: 2017-06-13
上海循态量子科技有限公司
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this scheme needs to insert an intensity modulator in the signal path. On the one hand, it changes the optical path structure of the original Gaussian modulation CVQKD scheme, which increases the complexity of the system implementation. On the other hand, the introduction of the intensity modulator reduces the intensity of the signal path, etc. effectively reduces the system detector efficiency, thereby reducing the final key rate of the system
However, a recent paper has analyzed the limited bandwidth effect of data sampling in practical CVQKD systems, and the results show that for high-speed CVQKD systems, the limited bandwidth effect at limited sampling frequency will become obvious, which will cause the actual Homodyne detector output signal to be no longer accurate peak-to-valley value
Therefore, the results obtained by monitoring the light intensity of the local oscillator through the optical power meter to evaluate the variance of the shot noise will no longer be consistent with the output results of the Homodyne detector, resulting in no accurate evaluation of key parameters such as system over-noise

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Modified continuous-variable quantum key distribution method for resisting actual attack
  • Modified continuous-variable quantum key distribution method for resisting actual attack
  • Modified continuous-variable quantum key distribution method for resisting actual attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several changes and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0040] In view of the defects in the prior art, the purpose of the present invention is to provide a continuous variable quantum key distribution method that can eliminate the limited sampling bandwidth effect and resist actual attacks. The optical monitoring method and data post-processing method are used to defend against existing actual attacks. On the one hand, this method performs real-time intensity monitoring on the basis of the original monitoring of local oscillator light based on an optical pow...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a modified continuous-variable quantum key distribution method for resisting an actual attack. The method comprises the following steps of step A carrying out continuous-variable quantum information transmission and carrying out real-time monitoring on local oscillator light; and step B carrying out a data post-processing step including a preprocessing operation, wherein the step B includes the steps that Bob obtains an original key according to peak-to-valley value lookup and Gaussian post-selection, obtains accurate parameter estimation through combination with local oscillator light intensity evaluation monitored by real-time AD oversampling and finally obtains a final key through data negotiation and privacy amplification. According to the method in the invention, the limited sampling bandwidth effect can be effectively eliminated, and meanwhile, all existing actual attacks for Gaussian-modulation CVQKD are defended, the method only changes the steps of a local oscillator light intensity monitoring method and a data post-processing software algorithm, the actual cost for defending the actual attack is simplified and the system complexity is reduced. The method can eliminate the limited sampling bandwidth effect, so that the key output rate of a Gaussian-modulation CVQKD system is improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an improved continuous variable quantum key distribution method capable of resisting actual attacks. Background technique [0002] As information security is getting more and more attention, quantum secure communication with unique security is gradually becoming familiar to everyone. At present, there are two implementation methods of quantum secure communication, namely quantum secure communication based on discrete variable technology and continuous variable technology, among which quantum key distribution (quantum key distribution, QKD) technology is the research focus. Discrete-variable quantum key distribution (DVQKD) has developed relatively maturely, while continuous-variable quantum key distribution (CVQKD) appeared relatively late, but developed rapidly, and is currently Conduct applied research. Like discrete variable techniques, continuous variable QKD i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/00
CPCH04L9/002H04L9/0858
Inventor 黄鹏曾贵华
Owner 上海循态量子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products