Unlock instant, AI-driven research and patent intelligence for your innovation.

Safe key rate computing method and system

A technology of security key and calculation method, which is applied in the field of security key rate calculation method and system, which can solve the problems of security loopholes, underestimate the upper limit of information stolen by Eve, etc., achieve the effect of protocol security and eliminate potential security loopholes

Inactive Publication Date: 2018-09-28
SHANXI UNIV +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Using the traditional parameter estimation method will underestimate the upper boundary of Eve stealing information, resulting in security holes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe key rate computing method and system
  • Safe key rate computing method and system
  • Safe key rate computing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0045] The present invention is based on the non-monotonicity of the amount of information stolen by the eavesdropping party changing with the transmission efficiency of the channel under the reverse coordination of the continuous variable quantum key distribution system. By optimizing the parameter estimation step and selecting an appropriate parameter estimation value, a more secure method is proposed. key rate calculation method.

[0046] In order to make t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe key rate computing method and system. The method comprises the following steps: performing interval estimation on system noise and channel transmission efficiency to obtain a system noise confidence interval and a channel transmission efficiency confidence interval; selecting an upper boundary of the system noise confidence interval as a system noise estimation value; if the maximum value of the channel transmission efficiency confidence interval is less than peak transmission efficiency, selecting the upper boundary of the channel transmission efficiency confidence interval as the channel transmission efficiency estimation value; if the minimum value of the channel transmission efficiency confidence interval is greater than the peak transmission efficiency,selecting the lower boundary of the channel transmission efficiency confidence interval as the channel transmission efficiency estimation value; and finally computing the lower boundary of the safe key rate according to the system noise estimation value and the channel transmission efficiency estimation value. Through the method disclosed by the invention, the potential security loophole of the system is eliminated, and the protocol is safer.

Description

technical field [0001] The invention relates to the field of quantum key distribution, in particular to a method and system for calculating a security key rate applied in a continuous variable quantum key distribution system. Background technique [0002] Quantum key distribution is an important practical application in the field of quantum technology. It allows both parties to communicate to establish a set of unconditionally secure random keys through quantum channels and certified classical channels. Early quantum key distribution systems were based on discrete variables, requiring single-photon sources and single-photon detectors. Different from the discrete variable quantum key distribution system, the continuous variable quantum key distribution system uses the regular component of the signal light field to encode information, and uses high-efficiency homodyne or heterodyne detectors to receive information. At the same time, the system is compatible with existing Clas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/0852
Inventor 李永民王普张清萍王旭阳马俊明张游杰
Owner SHANXI UNIV