Unlock instant, AI-driven research and patent intelligence for your innovation.

Wavelength attack method, active defense method and continuous variable quantum communication system using wavelength attack method and active defense method

A wavelength and channel technology, used in photon quantum communication, transmission systems, optical transmission systems, etc., to achieve the effect of good active defense, ensure security, and reduce the probability of being discovered

Active Publication Date: 2022-02-08
CENT SOUTH UNIV
View PDF15 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Continuous-Variable Quantum Key Distribution (CV-QKD) uses I\Q modulation to encode the key information on the quadrature amplitude and quadrature phase of the light field, and uses a balanced detector for measurement, so It has the advantage of being compatible with coherent optical systems, and has been widely studied and concerned by scholars at home and abroad; in particular, the use of Gaussian modulation coherent state can make the information rate reach the channel capacity of additive Gaussian white noise, and can resist single attack and collective attack And coherent attacks, although the theoretical security of Gaussian modulation coherent state CVQKD has been strictly proved, in actual distribution, the defects of real devices will still bring some serious security loopholes, using these security loopholes, the eavesdropping end can Steal part of the key in case of discovery, making CVQKD no longer absolutely safe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wavelength attack method, active defense method and continuous variable quantum communication system using wavelength attack method and active defense method
  • Wavelength attack method, active defense method and continuous variable quantum communication system using wavelength attack method and active defense method
  • Wavelength attack method, active defense method and continuous variable quantum communication system using wavelength attack method and active defense method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0079] The wavelength attack process is as follows:

[0080] Step 1. The eavesdropping terminal intercepts the coupling beam sent by the transmitting terminal at a channel adjacent to the receiving terminal, uses a polarization beam splitter 1 to separate the local oscillator light and signal light, and sends the local oscillator light into the beam splitter 1 to split 90% Local oscillator light and 10% intensity reference light, 90% of the local oscillator light is input to the heterodyne detector, and 10% of the intensity reference light is input to the 50:50 beam splitter;

[0081] Input the signal light into the microcontroller 1, compensate the delay of the signal light during time-division multiplexing, align the signal light with 90% of the local oscillator light, and input the aligned signal light into the heterodyne detector;

[0082] Step 2, the heterodyne detector takes 90% of the local oscillator light as the reference light, and detects the quadrature amplitude X ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wavelength attack method, an active defense method and a continuous variable quantum communication system using the same, the wavelength attack method can cause two communication parties to overestimate additional noise of the communication system, so that the additional noise generated by an eavesdropping end can be hidden in the method, and the probability that the eavesdropping end is found is reduced; when the defense method is used for attack defense, possible false data can be comprehensively removed, and the security of quantum communication is ensured.

Description

technical field [0001] The invention belongs to the technical field of quantum communication, in particular to a wavelength attack method, an active defense method and a continuous variable quantum communication system using the method. Background technique [0002] Continuous-Variable Quantum Key Distribution (CV-QKD) uses I\Q modulation to encode the key information on the quadrature amplitude and quadrature phase of the light field, and uses a balanced detector for measurement, so It has the advantage of being compatible with coherent optical systems, and has been widely studied and concerned by scholars at home and abroad; in particular, the use of Gaussian modulation coherent state can make the information rate reach the channel capacity of additive Gaussian white noise, and can resist single attack and collective attack And coherent attacks, although the theoretical security of Gaussian modulation coherent state CVQKD has been strictly proved, in actual distribution, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04B10/85H04B10/70H04L9/08
CPCH04B10/85H04B10/70H04L9/0858Y02D30/70
Inventor 郭迎黄一轩彭清泉莫伟史文昊黎胤
Owner CENT SOUTH UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More