Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Apparatus and method for quantum key distribution with enhanced security and reduced trust requirements

A quantum key distribution and quantum key technology, applied in the field of quantum key distribution, can solve the problem of not allowing QKD users to modify QKD system parameters

Active Publication Date: 2017-06-27
ID量子技术公司
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing technology does not allow QKD users to modify the QKD system parameters in such a way that the QKD manufacturer does not know the QKD system parameters in advance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Apparatus and method for quantum key distribution with enhanced security and reduced trust requirements
  • Apparatus and method for quantum key distribution with enhanced security and reduced trust requirements
  • Apparatus and method for quantum key distribution with enhanced security and reduced trust requirements

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The description of the invention is based on several drawings.

[0039] The main objective of the present invention is to enhance the security provided by the QKD system and reduce the trust requirements of QKD users on equipment manufacturers.

[0040] Such as figure 1 As shown in, the present invention can be used to securely exchange encryption keys between a transmitter (100) and a receiver (200). It is based on a traditional QKD system modified to accept additional customized parameters. The hardware of the QKD system consists of a QKD transmitter (120) and a QKD receiver (220) connected through a quantum channel (quantum channel (500)). The QKD transmitter (120) and receiver (220) generally consist of optical and electronic components suitable for generating and detecting a stream of qubits (520). The QKD transmitter (120) and receiver (220) are controlled by the QKD controller (110 and 210) through communication lines (115 and 215). These controllers consist of on...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A QKD system used to securely exchange encryption keys between an emitter (100) and a receiver (200) modified to accept an additional customization parameter. Said QKD system consists of a QKD transmitter (120) and a QKD receiver (220) capable of implementing a plurality of QKD protocols forming a family of protocols. The QKD transmitter (120) and receiver (220) connected through a quantum channel (500) consist of optical and electronic components adapted to produce and detect a stream of qubits. The qubits (520) exchanged over the quantum channel (500) are grouped into blocks (510) consisting of at least one qubit and whose length is L i (511). For each, block (510) of qubits (520), one of the QKD protocol (530), selected from the family of protocols can be implemented using the emitter (100) and transmitter (200) is used.

Description

Technical field [0001] The present invention relates generally to the field of quantum key distribution, and more precisely to an apparatus and method for enhancing the security of a quantum key distribution (QKD) system. Background technique [0002] The main goal of quantum cryptography or quantum key distribution (QKD) is to be able to share a sequence of bits whose privacy can be proven with a limited set of hypotheses between the transmitter and the receiver. [0003] If two users have shared random secret information (hereinafter referred to as "key"), they can use provable security to achieve two of the goals of cryptography: 1) Make their messages inaccessible to eavesdroppers Understand and 2) distinguish between legitimate messages and forged or altered messages. The one-time pad encryption algorithm achieves the first goal, while the Wegman-Carter authentication achieves the second goal. Unfortunately, both of these encryption schemes consume key material and make it u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0852H04L9/0858
Inventor 格雷瓜尔·利波第
Owner ID量子技术公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products