Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Single-step quantum key distribution post-processing method and system based on polarization code, medium and equipment

A technology of quantum key distribution and polar code, which is applied in the post-processing field of single-step quantum key distribution based on polar code, can solve the problem of increasing bit overhead, reducing the practicability of quantum key distribution system, and affecting the generation of security keys Speed ​​and other issues

Active Publication Date: 2019-07-12
JINAN UNIVERSITY
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, error correction and encryption amplification increase the bit overhead of the system and introduce high processing delays, which become the bottleneck of the high-speed QKD system and affect the final security key generation rate, thereby reducing the quantum key distribution system. practicality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Single-step quantum key distribution post-processing method and system based on polarization code, medium and equipment
  • Single-step quantum key distribution post-processing method and system based on polarization code, medium and equipment
  • Single-step quantum key distribution post-processing method and system based on polarization code, medium and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] Such as figure 1 As shown, this embodiment provides a polar code-based single-step quantum key distribution post-processing method, including the following steps:

[0071]S1. Alice at the sending end and Bob at the receiving end respectively obtain a series of original keys KA and KB of equal length through quantum channel transmission, and then Alice at the sending end discloses all the modulation bases when preparing qubits, and at the same time Bob at the receiving end discloses his measurement All measurement bases when qubits are used; when Alice and Bob receive the base information of the other party and compare it with their own base information, they discard the original keys with different bases and keep the original keys with the same base, thus completing Key screening to obtain the screened key of equal length;

[0072] S2. After completing the key screening, Alice at the sending end and Bob at the receiving end select some of the screened keys for public c...

Embodiment 2

[0116] Such as image 3 As shown, this embodiment also provides a polar code-based single-step quantum key distribution post-processing system, including:

[0117] Key screening module: the sending end and the receiving end respectively obtain the original key of the sending end and the original key of the receiving end through quantum channel transmission, the sending end and the receiving end respectively disclose the modulation base and the measurement base, and discard the original key with different bases, The original key with the same base is retained, and both the sender and the receiver get a sieved key of equal length;

[0118] Bit error calculation module: select some keys in the sieved keys of the sending end and the receiving end for public comparison, and obtain the qubit bit error rate according to the comparison result. If the qubit bit error rate is higher than or equal to the set safety threshold, Abandon all the key bits of this transmission; if it is less ...

Embodiment 3

[0124] This embodiment also provides a storage medium, the storage medium can be a storage medium such as ROM, RAM, magnetic disk, optical disk, etc., and the storage medium stores one or more programs. When the programs are executed by the processor, the implementation of Embodiment 1 based on Post-processing method of single-step quantum key distribution of polar code:

[0125] S1: After the sending end and the receiving end transmit information through the quantum channel, the sending end and the receiving end obtain a series of original keys of equal length respectively, and then the sending end discloses the modulation base, and the receiving end discloses the measurement base; when the sending end and the receiving end Receive the base information of the other party and compare it with the base information held by yourself, discard the original keys with different bases, and keep the original keys with the same base, and both the sending end and the receiving end will get...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a single-step quantum key distribution post-processing method and system based on a polarization code, a medium and equipment. The system comprises a secret key screening module, an error code calculation module, a polarization code construction module, a polarization code coding module, a polarization code decoding module and a consistency checking module, and the method comprises the steps that a sending end and a receiving end carry out base comparison on an original secret key to obtain a screened secret key; a quantum bit error rate is calculated through error codeestimation, and if the quantum bit error rate is smaller than a threshold value, remaining screened keys are reserved; a quantum bit error rate is combined with reliability and safety conditions to construct a polarization code word structure, and system polarization code coding generates coded code words corresponding to check bits and random bits; and the receiving end receives the encoded codeword and combines the reserved key bits to obtain a decoded bit value through decoding, wherein decoded bit value and the encoded codeword corresponding to the key bit of the sending end constitute akey pair, carries out consistency verification, and obtains the final secret key, so that the post-processing time consumption and the system complexity are reduced, and the final secret key generation rate of quantum secret key distribution is improved.

Description

technical field [0001] The present invention relates to the field of quantum secure communication and information security, and in particular to a polar code-based single-step quantum key distribution post-processing method, system, medium and equipment. Background technique [0002] Quantum Key Distribution (Quantum Key Distribution, QKD) can realize the safe sharing of keys among spatially separated users, combined with the "one-time pad" encryption method, it can ensure the unconditional security of the communication system, and overcome the inherent limitations of classical encryption technology. Potential safety hazards have very important practical significance and key roles in the information security protection of the military and government. my country has issued a number of national policies such as the "Thirteenth Five-Year Plan" to support the development of quantum secure communication, and quantum key distribution, as the first practical technology and the core...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L1/00
CPCH04L1/0057H04L9/0852H04L9/0858
Inventor 方俊彬蒋琳李锦方俊键
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products