Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Attack Detection Method for Device Defects in Discrete Quantum Key Distribution

A quantum key distribution, discrete quantum technology, applied in the field of attack detection for device defects, can solve problems such as difficult theoretical verification, increased system vulnerabilities, and insecurity of DVQKD systems, achieving high reliability and good accuracy.

Active Publication Date: 2022-06-07
CENT SOUTH UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, the three attacks are all designed for the defects of InGaAs-based SPAD devices, the key devices in the discrete quantum key distribution system
[0004] In order to solve the above problems, some people have proposed a technical solution of adding temperature sensors or light intensity sensors to monitor related attacks, but this solution introduces additional equipment, which may continue to increase system vulnerabilities, making it difficult to conduct theoretical verification. and other issues, the relevant measures are not obvious; some people have proposed the MDI-QKD system, which theoretically avoids the attack on the detection side, but due to the defects of actual devices, the DVQKD system is still not safe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack Detection Method for Device Defects in Discrete Quantum Key Distribution
  • Attack Detection Method for Device Defects in Discrete Quantum Key Distribution
  • Attack Detection Method for Device Defects in Discrete Quantum Key Distribution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] like figure 1 Shown is a schematic diagram of the method flow of the method of the present invention: the attack detection method for device defects in the discrete quantum key distribution provided by the present invention includes the following steps:

[0045] S1. Build a discrete quantum key distribution system using InGaAs-based SPAD as a single photon detection device;

[0046] S2. In the discrete quantum key distribution system built in step S1, perform quantum key distribution under normal circumstances to obtain positive sample data; specifically, the following rules are used to obtain positive sample data:

[0047] The discrete quantum key distribution system adopts the BB84 protocol, the encoding method is polarization encoding, the optical fiber is used as the transmission channel, and the working wavelength is 1550nm;

[0048] In the communication process, a gate mode duty cycle T is used as the measurement unit; every time t elapses, the number n of photon...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attack detection method for device defects in discrete quantum key distribution, including building a discrete quantum key distribution system using InGaAs-based SPAD as a single photon detection device; performing quantum key distribution in normal and attack situations And obtain positive and negative sample data; make a training data set and train an attack detection classifier; use the attack detection classifier to monitor the distribution of discrete quantum keys in normal communication and complete the attack detection for device defects. The present invention uses wavelet transform to process the data set, enlarges the data set to hide details; adopts the network structure of LSTM combined with Batch Normalization layer, pooling layer, fully connected layer and softmax layer to ensure the effect of attack detection; therefore, the present invention can effectively monitor the InGaAs ‑based SPAD device defect attack, and high reliability and good accuracy.

Description

technical field [0001] The invention belongs to the field of quantum communication, and in particular relates to an attack detection method for device defects in discrete quantum key distribution. Background technique [0002] With the development of economy and technology and the improvement of people's living standards, data security has become the focus of people's attention. Quantum key distribution has attracted a large number of researchers to participate in the research because of its secure key transmission capability. Quantum key distribution enables legitimate communication parties to share keys securely in an untrusted quantum channel. It mainly uses the uncertainty principle and the quantum state non-cloning theorem to ensure the unconditional security of the communication process. As quantum cryptography becomes increasingly mature and widely used, the practical security of quantum key distribution systems has become a new hotspot in subject research. [0003]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/08G06K9/62G06N3/04G06N3/08
CPCH04L9/002H04L9/0852G06N3/049G06N3/08G06N3/044G06N3/045G06F18/214G06F18/24
Inventor 黄端吴梓杰王一军
Owner CENT SOUTH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products