Unlock instant, AI-driven research and patent intelligence for your innovation.

Attack Detection Method for Continuous Variable Quantum Key Distribution System

A quantum key distribution and attack detection technology, applied in the field of quantum communication, can solve the problems of long time consumption, high resource consumption, poor real-time performance, etc., and achieve the effect of less resource consumption, good real-time performance and high reliability

Active Publication Date: 2022-05-06
CENT SOUTH UNIV
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the existing methods, the estimation of these two types of interference can only be carried out after the key transmission process is completed, and there are problems such as long time consumption, large resource consumption, and poor real-time performance in the application.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack Detection Method for Continuous Variable Quantum Key Distribution System
  • Attack Detection Method for Continuous Variable Quantum Key Distribution System
  • Attack Detection Method for Continuous Variable Quantum Key Distribution System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Such as figure 1 Shown is a schematic flow chart of the method of the present invention: the attack detection method of the continuous variable quantum key distribution system provided by the present invention includes the following steps:

[0031] S1. Build a continuous variable quantum key distribution experimental system; figure 2 As shown, it specifically includes the light source at the sending end, the first amplitude modulator at the sending end, the first beam splitter at the sending end, the first polarizer at the sending end, the second amplitude modulator at the sending end, the first phase modulator at the sending end, and the attenuator at the sending end , the second polarizer at the sending end, the second beam splitter at the sending end, the polarization controller at the receiving end, the first polarization beam splitter at the receiving end, the first amplitude modulator at the receiving end, the first beam splitter at the receiving end, and the fir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attack detection method for a continuous variable quantum key distribution system, including building a continuous variable quantum key distribution experimental system; performing quantum communication in an unattacked state and an attacked state, obtaining communication parameters and processing them to obtain Training data set; use the training data set to train the attack detection preliminary classifier to obtain the attack detection classifier; use the attack detection classifier to detect the communication process and realize the attack detection of the continuous variable quantum key distribution system. The present invention obtains an attack classifier from it by establishing a GAN network, and uses the attack classifier as a means of attack detection to detect the process of continuous variable quantum key distribution; the method of the present invention can not only accurately detect and identify the quantum key distribution process The type of attack received in the network, and it has high reliability, good real-time performance and less resource consumption.

Description

technical field [0001] The invention belongs to the field of quantum communication, and in particular relates to an attack detection method of a continuous variable quantum key distribution system. Background technique [0002] With the development of economy and technology and the improvement of people's living standards, data security has become more and more concerned. Therefore, data security transmission has become the focus of research. [0003] Quantum key distribution is one of the most mature technologies in quantum communication. It can provide information-theoretic security keys between communicating parties. The continuous variable quantum key distribution system (CVQKD) is an important implementation method in quantum key distribution. This protocol has absolute security in the coherent state of Gaussian modulation, and general collective attacks and continuous attacks cannot affect the security of the system. [0004] But in the actual Gaussian modulation c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/08H04B10/079H04B10/548H04B10/61H04B10/69G06N3/08
CPCH04L63/1416H04L9/0819H04L9/0852H04B10/0795H04B10/07955H04B10/548H04B10/614H04B10/6911G06N3/08
Inventor 黄端罗海森
Owner CENT SOUTH UNIV