Continuous variable quantum key distribution attack detection method and detection system thereof

A technology for quantum key distribution and attack detection, which is applied in the field of quantum communication and can solve problems such as application limitations in the quantum key distribution process.

Active Publication Date: 2020-11-20
CENT SOUTH UNIV
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, there is no reliable, scientific and highly accurate attack detection method or tool fo...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Continuous variable quantum key distribution attack detection method and detection system thereof
  • Continuous variable quantum key distribution attack detection method and detection system thereof
  • Continuous variable quantum key distribution attack detection method and detection system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Such as figure 1 Shown is a schematic process flow diagram of the method of the present invention. The continuous variable quantum key distribution attack detection method provided by the present invention comprises the following steps:

[0051] S1. The sender divides the coherent light source into signal light and local oscillator light, modulates the signal light, and sends the modulated signal light and local oscillator light to the receiver; specifically, the sender divides the coherent light source into signal light and local oscillator light, phase modulation and amplitude modulation on the signal light, and send the modulated signal light and local oscillator light to the receiver through polarization multiplexing;

[0052] In the specific implementation, the coherent state normal components X and P are encoded and modulated by phase and amplitude modulation, so that the signal light obeys a Gaussian distribution with a mean value of zero and a variance of VA; w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a continuous variable quantum key distribution attack detection method. The method comprises the steps that a sending end modulates signal light and sends the signal light andlocal oscillation light to a receiver; the receiver separates the signal to obtain the signal light and the local oscillation light; the receiver performs real-time granular noise estimation on the signal light; the receiver segments the local oscillation light so that one part of the local oscillation light is used for randomly measuring the value of the regular position X or the canonical momentum P of the received signal light, and the other part of the local oscillation light is used for obtaining a clock signal and local oscillation light power; and the receiver calculates the mean valueof the key data, the variance of the key data, the LO average power and the lens noise variance, and inputs the same into a pre-established attack detection model for detection to obtain an attack detection result in the communication process. The invention also discloses a detection system for realizing the continuous variable quantum key distribution attack detection method. According to the invention, the attack mode detection of the continuous variable quantum key distribution process is realized, the reliability is high, the practicability is good, and the accuracy is high.

Description

technical field [0001] The invention belongs to the field of quantum communication, and in particular relates to a continuous variable quantum key distribution attack detection method and a detection system thereof. Background technique [0002] With the development of economy and technology and the improvement of people's living standards, people pay more and more attention to the security of data. Quantum key distribution (QKD) is one of the important applications of quantum cryptography, which allows two legitimate parties, Alice and Bob, to exchange a public key through an untrusted environment without being eavesdropped by the third-party eavesdropper Eve. Therefore, quantum key distribution is the mainstream data transmission method in the future. [0003] At present, the commonly used key distribution methods in quantum communication include discrete variable (DV) QKD and continuous variable (CV) QKD. CVQKD encodes the quadratic property information of the Gaussian ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08H04B10/079H04B10/548H04B10/61H04B10/69G06N3/08
CPCH04L63/1416H04L9/0819H04L9/0852H04B10/0795H04B10/07955H04B10/548H04B10/614H04B10/6911G06N3/08Y02D30/70
Inventor 黄端金迪毛宜珏
Owner CENT SOUTH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products