Unlock instant, AI-driven research and patent intelligence for your innovation.

Attack Detection Method for Continuous Variable Quantum Key Distribution System

A technology of quantum key distribution and attack detection, which is applied in the field of quantum communication, can solve the problems of stealing communication systems, detection technology feasibility, poor applicability and reliability, etc., and achieve the effect of wide applicability, low cost and good effect

Active Publication Date: 2022-04-08
CENT SOUTH UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the security proof of both CVQKD and DVQKD is based on the ideal state; in actual implementation, due to the security loopholes in the system equipment, various attacks are launched by exploiting the imperfection of the equipment, thereby stealing the data of the communication system the occurrence of the situation
[0004] For this kind of problem, the existing technology has adopted the way of detection and defense one by one for attack defense and detection; however, the existing technology can only detect a single attack mode, and may need to introduce additional hardware devices, so that the current Some detection techniques are poor in feasibility, applicability and reliability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack Detection Method for Continuous Variable Quantum Key Distribution System
  • Attack Detection Method for Continuous Variable Quantum Key Distribution System
  • Attack Detection Method for Continuous Variable Quantum Key Distribution System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Such as figure 1 Shown is a schematic flow chart of the method of the present invention: the attack detection method for the continuous variable quantum key distribution system provided by the present invention includes the following steps:

[0026] S1. The sender and the receiver communicate under normal conditions and under attack, and collect communication data under normal conditions and under attack; specific attack conditions include calibration attacks and local oscillator strength attacks , saturation attack, calibration-saturation hybrid attack and local oscillator strength-saturation hybrid attack, a total of five attack types; at the same time, the communication data under normal conditions and the communication data under attack are combined into a training matrix Y={y 0 ,y 1 ,y 2 ,y 3 ,y 4 ,y 5}; where y 0 Communication data under normal circumstances;

[0027] S2. Build a continuous variable quantum key distribution system attack detection model bas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attack detection method for a continuous variable quantum key distribution system, which includes communicating and collecting communication data between a sender and a receiver under normal conditions and attacked conditions; constructing a continuous variable quantum key distribution system based on machine learning The attack detection model is trained to obtain the attack detection model for the continuous variable quantum key distribution system; the actual quantum key communication process is monitored by using the attack detection for the continuous variable quantum key distribution system. The present invention studies the attack methods that may be involved, and uses machine learning methods at the software level to establish a recognition model for data in known attack situations, accurately detects and recognizes attack methods, and trains to obtain recognition that meets performance requirements model, and complete the corresponding attack detection; therefore, the method of the present invention can realize the detection and identification of attacks without adding hardware devices, and has lower cost, better effect and wider applicability.

Description

technical field [0001] The invention belongs to the field of quantum communication, and in particular relates to an attack detection method for a continuous variable quantum key distribution system. Background technique [0002] Quantum Key Distribution (Quantum Key Distribution, QKD) is considered to be the most mature quantum information processing technology at this stage; this technology can fundamentally improve the cryptographic defense capabilities in the field of cyberspace security, so it has received extensive attention. QKD can be divided into discrete variable quantum key distribution (DVQKD) and continuous variable quantum key distribution (CVQKD) according to different photon sources. Compared with DVQKD, CVQKD has a higher key distribution rate and better compatibility with current optical networks, and has gradually become a research hotspot in quantum key distribution in recent years. [0003] The Gaussian modulated coherent state protocol is the most popul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/08G06N3/08G06N3/04
CPCH04L63/1416H04L9/0852G06N3/08G06N3/045
Inventor 黄端付永远
Owner CENT SOUTH UNIV