Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Attack detection method for device defects in discrete quantum key distribution

A quantum key distribution and discrete quantum technology, applied in the field of attack detection for device defects, can solve problems such as difficult theoretical verification, increased system vulnerabilities, and DVQKD system insecurity, achieving high reliability and good accuracy

Active Publication Date: 2020-11-24
CENT SOUTH UNIV
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, the three attacks are all designed for the defect of the key device InGaAs-based SPAD device in the discrete variable quantum key distribution system
[0004] In order to solve the above problems, some people have proposed a technical solution of adding temperature sensors or light intensity sensors to monitor related attacks, but this solution introduces additional equipment, which may continue to increase system vulnerabilities, making it difficult to conduct theoretical verification. and other issues, the relevant measures are not obvious; some people have proposed the MDI-QKD system, which theoretically avoids the attack on the detection side, but due to the defects of actual devices, the DVQKD system is still not safe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack detection method for device defects in discrete quantum key distribution
  • Attack detection method for device defects in discrete quantum key distribution
  • Attack detection method for device defects in discrete quantum key distribution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Such as figure 1 Shown is a schematic diagram of the method flow of the method of the present invention: the attack detection method for device defects in the discrete quantum key distribution provided by the present invention includes the following steps:

[0045] S1. Build a discrete quantum key distribution system using InGaAs-based SPAD as a single photon detection device;

[0046] S2. In the discrete quantum key distribution system built in step S1, perform quantum key distribution under normal circumstances to obtain positive sample data; specifically, the following rules are used to obtain positive sample data:

[0047] The discrete variable quantum key distribution system adopts the BB84 protocol, the encoding method is polarization encoding, the optical fiber is used as the transmission channel, and the working wavelength is 1550nm;

[0048] In the communication process, a gate mode duty cycle T is used as the unit of measurement; every time T passes, n photon...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attack detection method for device defects in discrete quantum key distribution. The attack detection method comprises the following steps: establishing a discrete quantum key distribution system taking InGaAs-based SPAD as a single-photon detection device; carrying out quantum key distribution under normal and attack conditions and acquiring positive and negative sampledata; making a training data set and training to obtain an attack detection classifier; and using the attack detection classifier to monitor discrete quantum key distribution of normal communicationand complete attack detection for device defects. According to the method, wavelet transform is adopted to process a data set, and the data set is amplified to hide details; a network structure combining LSTM with a Batch Normalization layer, a pooling layer, a full connection layer and a softmax layer is adopted, so that the attack detection effect is ensured; therefore, the method provided by the invention can effectively monitor the attack aiming at the defects of the InGaAs-based SPAD device, and is high in reliability and good in accuracy.

Description

technical field [0001] The invention belongs to the field of quantum communication, and in particular relates to an attack detection method for device defects in discrete quantum key distribution. Background technique [0002] With the development of economy and technology and the improvement of people's living standards, data security has become the focus of people's attention. Quantum key distribution has attracted a large number of researchers to participate in the research because of its secure key transmission capability. Quantum key distribution enables legitimate communication parties to share keys securely in an untrusted quantum channel. It mainly uses the uncertainty principle and the quantum state non-cloning theorem to ensure the unconditional security of the communication process. As quantum cryptography becomes increasingly mature and widely used, the practical security of quantum key distribution systems has become a new hotspot in subject research. [0003]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/08G06K9/62G06N3/04G06N3/08
CPCH04L9/002H04L9/0852G06N3/049G06N3/08G06N3/044G06N3/045G06F18/214G06F18/24
Inventor 黄端吴梓杰王一军
Owner CENT SOUTH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products