Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Verifiable and secure privacy amplification method based on quantum key distribution

A quantum key distribution, security and confidentiality technology, applied in the field of verifiable security and confidentiality enhancement, to achieve the effect of easy realization

Active Publication Date: 2018-09-28
NAT UNIV OF DEFENSE TECH
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The technical problem to be solved by the present invention is that, aiming at the security threats faced by the random number source selection and construction existing in the security enhancement method in the existing quantum key distribution system, the present invention provides a verifiable security security method for quantum key distribution Enhanced method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifiable and secure privacy amplification method based on quantum key distribution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0034] Such as figure 1 As shown, a verifiable security enhancement method for quantum key distribution of the present invention, the steps are:

[0035] S1: Generate an initial random number string W , the communication parties (Alice and Bob) respectively generate random number strings in the base comparison process of quantum key distribution K mis,A and K mis,B , then Alice combines the two into a random number string W =[ K mis,A , K mis,B ]:

[0036] S101: During the base comparison process of quantum key distribution, when the base selections of Alice and Bob are opposite to each other, the two parties respectively save the random bit strings detected at this time, expressed as K mis,A and K mis,B ;

[0037] S102: Bob will K mis,B Send to Alice;

[0038] S103: Alice's random number string K mis,A and K mi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a verifiable and secure privacy amplification method based on quantum key distribution. The method comprises the steps of S1, generating an initial random number string W, respectively generating random number strings K<mis,A> and K<mis,B> by two communication parties (Alice and Bob) in a base comparison process of quantum key distribution, and combining the two random number strings into a random number string W=[<Kmis,A>, K<mis,B>] by the Alice; S2, verifying randomness, after an error correction phase of the quantum key distribution is finished, estimating the minimum entropy lower limit of the W relative to an attacker Eve, wherein H<min>(W|E) is greater than or equal to 1-H<2>(e); S3, calculating a final secure key length N<f>; S4, extracting a perfect random string W*, through adoption of a partial pre-shared secure key of the two communication parties, constructing a Toeplitz matrix H<R>, and extracting the perfect random number string W* from the W according to the H<R>; S5, negotiating a universal hash function H<PA> through a public channel according to the W*; and S6, respectively carrying out hash operation on error corrected key strings by the two communication parties according to the H<PA>, and generating a final secure key. The method has the advantages of verifiability, security, easy realization and simplification of quantum key distribution system design and realization.

Description

technical field [0001] The invention relates to a verifiable security enhancement method, in particular to a verifiable security enhancement method for quantum key distribution. Background technique [0002] Quantum key distribution, based on the basic principles of quantum physics, can distribute information-theoretical security keys for both parties in communication. Privacy Amplification is a crucial step for the quantum key distribution system to achieve secure key distribution. Its goal is to remove part of the key string information that the attacker may obtain during quantum physical communication and post-processing, and generate The ultimate key that is information-theoretic secure against an attacker. [0003] In the process of confidentiality enhancement, the communication parties negotiate the Universal Hash Function (Universal Hash Function) through an open channel, and obtain the final security key by hashing the weak security key string generated and error-co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0819H04L9/0852H04L9/0869
Inventor 吴纯青
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products