[1]许娟,陈汉武,刘文杰,等.基于相位编码的高效量子密钥分配方案[J].东南大学学报(自然科学版),2009,39(2):216-219.[doi:10.3969/j.issn.1001-0505.2009.02.006]
 Xu Juan,Chen Hanwu,Liu Wenjie,et al.Efficient phase-coded quantum key distribution scheme[J].Journal of Southeast University (Natural Science Edition),2009,39(2):216-219.[doi:10.3969/j.issn.1001-0505.2009.02.006]
点击复制

基于相位编码的高效量子密钥分配方案()
分享到:

《东南大学学报(自然科学版)》[ISSN:1001-0505/CN:32-1178/N]

卷:
39
期数:
2009年第2期
页码:
216-219
栏目:
计算机科学与工程
出版日期:
2009-03-20

文章信息/Info

Title:
Efficient phase-coded quantum key distribution scheme
作者:
许娟1 陈汉武1 刘文杰12 刘志昊1
1 东南大学计算机科学与工程学院, 南京 210096; 2 南京信息工程大学计算机与软件学院, 南京 210044
Author(s):
Xu Juan1 Chen Hanwu1 Liu Wenjie12 Liu Zhihao1
1 School of Computer Science and Engineering, Southeast University, Nanjing 210096, China
2 School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China
关键词:
量子密钥分配 相位编码 量子干涉 效率 安全性
Keywords:
quantum key distribution phase coding quantum interference efficiency security
分类号:
TP309.7;TP393
DOI:
10.3969/j.issn.1001-0505.2009.02.006
摘要:
提出了一种新的单向量子密钥分配方案.该方案利用光子的两列子波之间相位差关系形成的干涉结果进行编码,并且利用与干涉结果独立的光子偏振态进行窃听检测.并对该方案的效率和安全性进行了分析.理论分析表明,该方案的光子利用率为100%,而经典通信量仅约为BB84方案的一半,信息传输效率约为2n/(3n+4),高于BB84方案25%的效率值,随着传输光子数n的增大,效率值将趋近于66.7%.而且,该方案对于截获重发、测量重发、纠缠测量等常见的攻击,都具有很好的安全性.此外,对于现在的技术而言,该方案较易实现.
Abstract:
A one-way quantum key distribution scheme is proposed. The scheme utilizes the interference between two sub-waves of a photon with different phases for coding and uses the polarization of the photon which is independent of the interference to check the eavesdropping. Efficiency and security analyses are also given. The theoretical analysis shows that the utilization ratio of the photons is 100%, accompanying with about half volume of classical communications of BB84. And the information transmission efficiency is approximately 2n/(3n+4)which is higher than 25% of BB84 and runs to 66.7% when the amount of transit photons n increases. Furthermore, it can effectively resist the common attack such as intercept-resend, measure-resend and entanglement-measure attack. Besides, this scheme is feasible with present-day technique.

参考文献/References:

[1] Rivert R L,Shamir A,Adleman L.A method for obtaining digital signatures and public-key cryptosystems [J].Communications of the ACM,1978,21(2):120-126.
[2] Bennett C H,Brassard G.Quantum cryptography:public key distribution and coin tossing [C] //Proceedings of IEEE International Conference on Computers,Systems and Signal Processing.Bangalore,India,1984:175-179.
[3] Ekert A K.Quantum cryptography based on Bell’s theorem [J].Phys Rev Lett,1991,67(6):661-663.
[4] Bennett C H.Quantum cryptography using any two nonorthogonal states [J]. Phys Rev Lett,1992,68(21):3121-3124.
[5] Long G L,Liu X S.Theoretically efficient high-capacity quantum-key-distribution scheme [J].Phys Rev A,2002,65(3):032302/1-3.
[6] Li X Y.Efficient quantum key distribution scheme using the Bell state measurement [J].Int J Modern Phys C,2003,14(6):757-763.
[7] Deng F G,Long G L.Controlled order rearrangement encryption for quantum key distribution [J]. Phys Rev A,2003,68(4):042315/1-4.
[8] Deng F G,Long G L,Wang Y,et al.Increasing the efficiencies of random-choice-based quantum communication protocols with delayed measurement [J].Chin Phys Lett,2004,21(11):2097-2100.
[9] Deng F G,Long G L.Bidirectional quantum key distribution protocol with practical faint laser pulses [J]. Phys Rev A,2004,70(1):012311/1-7.
[10] Gao M,Liang L M,Li C Z,et al.Robust quantum key distribution with two-photon polarization states [J].Phys Lett A,2006,359(2):126-128.
[11] Cabello A.Quantum key distribution in the Holevo limit [J].Phys Rev Lett,2000,85(26):5635-5638.
[12] Walls D F.A simple field description of photon interference [J].American J Phys,1977,45(10):952-956.
[13] Long G L.General quantum interference principle and duality computer [J]. Commun Theor Phys,2006,45(5):825-844.
[14] 喀兴林.高等量子力学 [M].2版.北京:高等教育出版社,2001.
[15] Wootters W K,Zurek W H.A single quantum cannot be cloned [J].Nature,1982,299(5886):802-803.
[16] Gisin N,Fasel S,Kraus B,et al.Trojan-horse attacks on quantum-key-distribution systems [J]. Phys Rev A,2006,73(2):022320/1-6.
[17] Sun C P,Li Y,Liu X F.Quasi-spin-wave quantum memories with a dynamical symmetry [J].Phys Rev Lett,2003,91(14):147903/1-4.

备注/Memo

备注/Memo:
作者简介: 许娟(1981—),女,博士生; 陈汉武(联系人),男,博士,教授,博士生导师, hw_chen@seu.edu.cn.
基金项目: 国家自然科学基金资助项目(60572071,60873101)、江苏省自然科学基金资助项目(BK2005053, BM2006504, BK2007104, BK2008209)、江苏省高校自然科学基金资助项目(06KJB520137).
引文格式: 许娟,陈汉武,刘文杰,等.基于相位编码的高效量子密钥分配方案[J].东南大学学报:自然科学版,2009,39(2):216-219.
更新日期/Last Update: 2009-03-20