High-speed privacy amplification method for supporting large-scale input blocks in quantum key distribution system

A technology of quantum key distribution and security enhancement, which is applied to key distribution, can solve the problems of large-scale input processing, reduction of calculation speed and calculation accuracy, and inability to meet the quantum key distribution system, so as to improve system security and reduce limited The code length effect and the effect of improving the throughput rate

Pending Publication Date: 2020-08-04
广东天镝科技有限公司
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when FFT processes the input of large-scale input blocks, its calculation speed and calculation accuracy will be reduced, which cannot meet the requirements of the quantum key distribution system.
[0007] Second, due to the limitation of proprietary hardware resources, it is impossible to process large-scale input while mainta

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-speed privacy amplification method for supporting large-scale input blocks in quantum key distribution system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0029] The present invention uses a simplified Toeplitz matrix as a general hash function family, and on this basis, splits the Toeplitz matrix into a plurality of sub-blocks of the same size, and uses fast Fourier transform to accelerate the corresponding Toeplitz matrix blocks respectively. product. That is, by splitting the Toeplitz matrix and using FFT for each sub-block to accelerate, the input scale of FFT is reduced from n to 2m-1. After the operation is divided into multiple sub-parts, the calculations among the multiple sub-parts are independent of each other, so further acceleration can be achieved in a parallel manner.

[0030] In specific application examples, such as figure 1 As shown, the present invention is used in a quantum key distribution system to support a high-speed security enhancement method for large-scale i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a high-speed privacy amplification method for supporting large-scale input blocks in a quantum key distribution system. The high-speed privacy amplification method adopts a simplified Toeplitz matrix as a universal hash function family, splits the Toeplitz matrix into a plurality of sub-blocks with the same size, and utilizes fast Fourier transform for accelerating a product of corresponding Toeplitz matrix blocks. The high-speed privacy amplification method has the advantages of better system safety, higher processing speed and the like.

Description

technical field [0001] The invention mainly relates to the technical field of quantum key distribution, in particular to a high-speed security enhancement method for supporting large-scale input blocks in a quantum key distribution system. Background technique [0002] Quantum key distribution technology based on quantum mechanics can achieve unconditionally secure communication. In recent years, various quantum key distribution systems have been realized and widely used in society. A quantum key distribution system mainly includes two stages: the quantum interaction part stage and the post-processing stage. Among them, the post-processing stage uses traditional computer algorithms to extract the final security key from the qubits obtained in the quantum interaction part. The traditional post-processing stage mainly includes: base comparison and data screening, error correction and security enhancement. Through security enhancement, the information that may be leaked in t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06H04L9/08
CPCH04L9/0643H04L9/0852
Inventor 吴纯青
Owner 广东天镝科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products