Safe key rate computing method and system
A technology of security key and calculation method, which is applied in the field of security key rate calculation method and system, which can solve the problems of security loopholes, underestimate the upper limit of information stolen by Eve, etc., achieve the effect of protocol security and eliminate potential security loopholes
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0044] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
[0045] The present invention is based on the non-monotonicity of the amount of information stolen by the eavesdropping party changing with the transmission efficiency of the channel under the reverse coordination of the continuous variable quantum key distribution system. By optimizing the parameter estimation step and selecting an appropriate parameter estimation value, a more secure method is proposed. key rate calculation method.
[0046] In order to make t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


