Unlock instant, AI-driven research and patent intelligence for your innovation.

A method to resist the attack of the detection end of the quantum key distribution system

A quantum key distribution, single-photon detector technology, applied in key distribution, can solve problems such as system security loopholes

Active Publication Date: 2020-08-07
合肥量芯科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The single-photon detector is a complex device, and there are some inconsistencies between its actual characteristics and the theoretical model. These inconsistencies may lead to actual security vulnerabilities of the system, thus giving attackers the opportunity to exploit these vulnerabilities to attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method to resist the attack of the detection end of the quantum key distribution system
  • A method to resist the attack of the detection end of the quantum key distribution system
  • A method to resist the attack of the detection end of the quantum key distribution system

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0035] A method for resisting the attack of the detection end of the quantum key distribution system, characterized in that: such as figure 2 As shown, the Bob end includes an optical path, a single photon detector and a first gate jumping module, the optical path is a decoding optical path, and the optical signal reaches the single photon detector after being decoded by the optical path, and the first gate jumping module is It is used to set the gate signal of the single photon detector; in each cycle T, the arrival time of the gate signal is randomly adjusted through the first jump gate module, and the arrival time of the optical signal remains unchanged, ensuring that the attacker Eve cannot know every time the detector opens the door time. There are two implementations in this hardware mode:

[0036] The first implementation method: the first jump door module is divided into two modes when it works, such as image 3 As shown, the two modes are respectively the transmiss...

specific Embodiment 2

[0043] A method for resisting the attack of the detection end of the quantum key distribution system, characterized in that: such as Figure 7 As shown, the Bob end includes an optical path, a single photon detector, a second optical jump gate module and a second electric jump gate module, the optical path is a decoding optical path, and the optical signal passes through the second optical jump gate after being decoded by the optical path After the module reaches the single photon detector, the second electric jump gate module is used to set the gate signal of the single photon detector, and the second optical jump gate module is used to select the delay time of multiple optical signals, The delay time of the optical signal changes randomly throughout the period T, and the time difference is at least greater than half of the time of the rising edge or falling edge of the gate signal;

[0044] Wherein, the second optical jumping door module is divided into two modes during oper...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for resisting attack of a detection end of a quantum key distribution system. The system comprises an optical path, a single-photon detector and a gate jumping module, the optical path is a decoding optical path, an optical signal reaches the single-photon detector after being decoded by the optical path, the gate jumping module is used for setting a gate pulse signal of the single-photon detector, or the optical gate jumping module is arranged between the single-photon detector and the decoding optical path, and the optical gate jumping module is used for selecting time delay of various optical signals. When an attacker attacks by Eve, the attacker cannot be attacked. The optical signal arrived at the Bob end is not always at the position where the optical signal arrives when the system is not attacked; a transmission mode and a detection mode are set; in the detection mode, the time delay of the gate signal of the detection end is randomly changed; therefore, the attacker Eve generates an unexpected signal at the Bob end, or the generated response counting rate is unstable, or the error code of the system is suddenly increased and is perceived bythe Bob, and the attack of the detection end of the quantum key distribution system is resisted.

Description

technical field [0001] The invention relates to the technical field of quantum secret communication, and specifically relates to a method for resisting the attack of a detection end of a quantum key distribution system. Background technique [0002] Cryptography technology has a wide range of applications in the field of information security. Quantum cryptography based on the principle of quantum mechanics has been developed for more than 30 years, and the quantum key distribution technology has been applied. The security of the earliest quantum key distribution protocol, BB84 protocol, has been strictly and completely proved. However, practical security needs to consider the actual characteristics of the device, and there is always a certain mismatch between the actual characteristics of the device and the theoretical model. These gaps may bring actual security loopholes to the quantum key distribution system, thus threatening the security of the actual quantum key distrib...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0819H04L9/0852H04L63/1441
Inventor 钱泳君宋红岩章丽丁禹阳安雪碧郝鹏磊
Owner 合肥量芯科技有限公司