A Verifiably Secure Privacy Enhancement Method for Quantum Key Distribution

A quantum key distribution, security and confidentiality technology, applied in the field of verifiable security and security enhancement, to achieve easy-to-implement effects

Active Publication Date: 2020-09-08
NAT UNIV OF DEFENSE TECH
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The technical problem to be solved by the present invention is that, aiming at the security threats faced by the random number source selection and construction existing in the security enhancement method in the existing quantum key distribution system, the present invention provides a verifiable security security method for quantum key distribution Enhanced method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Verifiably Secure Privacy Enhancement Method for Quantum Key Distribution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0034] Such as figure 1 As shown, a verifiable security enhancement method for quantum key distribution of the present invention, the steps are:

[0035] S1: Generate an initial random number string W, and the two communicating parties (Alice and Bob) generate a random number string K respectively during the base comparison process of quantum key distribution mis,A and K mis,B , and then Alice combines the two into a random number string W=[K mis,A ,K mis,B ].

[0036]S101: During the base comparison process of quantum key distribution, when the base selections of Alice and Bob are opposite to each other, the two parties respectively save the random bit strings detected at this time, denoted as K mis,A and K mis,B ;

[0037] S102: Bob sends K mis,B Send to Alice;

[0038] S103: Alice's random number string K mis,A and K mis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed in the present invention is a verifiable and secure privacy amplification method for quantum key distribution, comprising the steps of: S1. generating an initial random number string W, two communication parties (Alice and Bob) respectively generating random number strings Kmis,A and Kmis,B during the basis comparison process of quantum key distribution, and then Alice merging the two random number strings into a random number string W = [Kmis,A, Kmis,B]; S2. performing randomness verification: after an error correction stage of quantum key distribution ends, estimating the lower limit of the minimum entropy Hmin(W|E) ≥ 1-H2(e) of W with respect to an attacker Eve; S3. calculating a final security key length Nf; S4. extracting a perfect random string W*: by pre-sharing part of the security key between the two communication parties, constructing a Toeplitz matrix HR, and extracting a perfect random number string W* from W according to HR; S5. issuing a negotiation-size universal hash function HPA according to W*; and S6. the two communication parties respectively performing, according to HPA, a hash operation on the error-corrected key string, so as to generate a final security key. The present invention has advantages such as being verifiable and secure, being easy to implement, and being able to simplify the design and implementation of a quantum key distribution system.

Description

technical field [0001] The invention relates to a verifiable security enhancement method, in particular to a verifiable security enhancement method for quantum key distribution. Background technique [0002] Quantum key distribution, based on the basic principles of quantum physics, can distribute information-theoretical security keys for both parties in communication. Privacy Amplification (Privacy Amplification) is a crucial step for the quantum key distribution system to achieve secure key distribution. The ultimate key that is information-theoretic secure against an attacker. [0003] During the security enhancement process, the communication parties negotiate the Universal Hash Function (Universal Hash Function) through an open channel, and obtain the final security key by hashing the weak security key string generated and error-corrected through negotiation between the two parties. In an actual quantum key distribution system, an additional source of random numbers i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0819H04L9/0852H04L9/0869
Inventor 吴纯青
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products