天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

有限長誘騙態(tài)量子密鑰分配安全性研究

發(fā)布時(shí)間:2018-04-26 01:27

  本文選題:量子密鑰分配 + 密鑰有限長; 參考:《解放軍信息工程大學(xué)》2014年博士論文


【摘要】:量子密鑰分配(QKD)作為現(xiàn)代密碼學(xué)與量子力學(xué)結(jié)合的產(chǎn)物,已經(jīng)成為一種走向?qū)嵱没男畔踩U霞夹g(shù)。QKD系統(tǒng)能夠使通信雙方可以利用公開信道協(xié)商產(chǎn)生一致的秘密信息,這些秘密信息通常作為雙方保密通信的密鑰,密鑰是否安全將關(guān)系到雙方保密通信的安全,因此QKD系統(tǒng)產(chǎn)生的密鑰信息的安全自然成為人們最為關(guān)注的核心問題。理想條件下QKD系統(tǒng)已經(jīng)被證明是理論上安全的,但是實(shí)際QKD系統(tǒng)與理想QKD系統(tǒng)不可能完全一致,存在諸如非單光子光源、有限長密鑰、非精確調(diào)制量子態(tài)等非理想因素,已有研究表明,這些非理想因素直接對(duì)實(shí)際QKD系統(tǒng)的安全性構(gòu)成了威脅,研究非理想條件下QKD的實(shí)際安全性已成為QKD系統(tǒng)實(shí)用化過程中必須解決的關(guān)鍵問題。誘騙態(tài)方法可以有效解決實(shí)際光源多光子脈沖帶來的安全隱患問題,因此實(shí)際QKD系統(tǒng)通常采用誘騙態(tài)方法來進(jìn)行光源調(diào)制。實(shí)際誘騙態(tài)QKD系統(tǒng)在一定運(yùn)行時(shí)間內(nèi)的光脈沖數(shù)及數(shù)據(jù)處理長度往往是有限的,其產(chǎn)生的密鑰也是有限長的,針對(duì)理想QKD系統(tǒng)的安全性界限不再適用于有限長誘騙態(tài)QKD系統(tǒng),因此研究密鑰有限長條件下誘騙態(tài)QKD系統(tǒng)的安全性界限是實(shí)際安全性分析需要解決的重點(diǎn)問題。本文較系統(tǒng)地研究了有限長誘騙態(tài)QKD系統(tǒng)的安全性,主要解決了有限長誘騙態(tài)QKD系統(tǒng)在認(rèn)證密鑰更新、非理想?yún)⒘肯罗D(zhuǎn)換光源、非平衡基矢選取等實(shí)際條件下的安全性界限度量問題,主要完成的工作包括以下幾個(gè)方面:1、有限長量子密鑰分配認(rèn)證安全性研究。針對(duì)密鑰信息泄漏對(duì)實(shí)際QKD系統(tǒng)安全性的影響問題,基于保密放大分析方法,給出了密鑰有限長條件下認(rèn)證密鑰更新的信息泄漏刻畫方法,分析了認(rèn)證密鑰信息泄漏對(duì)實(shí)際QKD系統(tǒng)認(rèn)證安全性帶來的影響。進(jìn)一步圍繞有限長認(rèn)證密鑰在密鑰更新過程中安全強(qiáng)度遞減的問題,提出了初始認(rèn)證密鑰的使用壽命分析模型,給出了有限長初始認(rèn)證密鑰使用壽命的計(jì)算表達(dá)式,有效度量了密鑰更新過程中有限長認(rèn)證密鑰的安全強(qiáng)度變化。2、相干攻擊下被動(dòng)誘騙態(tài)量子密鑰分配有限長分析。參量下轉(zhuǎn)換光源是一種目前技術(shù)實(shí)現(xiàn)比較成熟的實(shí)際光源,基于參量下轉(zhuǎn)換光源的實(shí)際QKD系統(tǒng)通常采用被動(dòng)誘騙態(tài)方案,但已有的密鑰有限長安全性界限局限于聯(lián)合攻擊環(huán)境。本文針對(duì)基于參量下轉(zhuǎn)換光源的QKD系統(tǒng),提出了相干攻擊環(huán)境下被動(dòng)誘騙態(tài)方案的有限長分析方法,給出了密鑰有限長條件下單光子計(jì)數(shù)率和誤碼率的計(jì)算表達(dá)式,得到了被動(dòng)誘騙態(tài)QKD在有限長條件下嚴(yán)格的安全密鑰率界限。數(shù)值分析表明,在密鑰有限長條件下,參量下轉(zhuǎn)換光源被動(dòng)誘騙態(tài)QKD可以達(dá)到較優(yōu)的實(shí)現(xiàn)性能,系統(tǒng)高工作頻率下的最遠(yuǎn)安全傳輸距離能夠超過弱相干光源主動(dòng)誘騙態(tài)QKD。3、參量下轉(zhuǎn)換光源測量無關(guān)QKD誘騙態(tài)方案設(shè)計(jì)與分析。測量無關(guān)量子密鑰分配(MDI-QKD)能夠克服探測器非理想帶來的安全漏洞問題,比傳統(tǒng)QKD具有更好的實(shí)際安全性,針對(duì)弱相干態(tài)光源MDI-QKD的相關(guān)研究比較成熟,而基于參量下轉(zhuǎn)換光源MDI-QKD的安全性及實(shí)現(xiàn)性能還有待進(jìn)一步研究。本文提出了兩種MDI-QKD誘騙態(tài)方案:被動(dòng)二強(qiáng)度誘騙態(tài)方案和主被動(dòng)三強(qiáng)度誘騙態(tài)方案,給出了相應(yīng)的參數(shù)估計(jì)方法并得到了密鑰有限長條件下主被動(dòng)三強(qiáng)度誘騙態(tài)方案的安全性界限。進(jìn)一步給出了MDI-QKD使用相位隨機(jī)化參量下轉(zhuǎn)換光源時(shí)平均計(jì)數(shù)率和誤碼率的計(jì)算公式,在此基礎(chǔ)上比較了其采用不同誘騙態(tài)方案時(shí)的實(shí)現(xiàn)性能,并分析了密鑰有限長對(duì)主被動(dòng)三強(qiáng)度誘騙態(tài)方案安全性的影響。數(shù)值分析表明,參量下轉(zhuǎn)換光源MDI-QKD的安全密鑰率和最大傳輸距離要優(yōu)于弱相干光源MDI-QKD,主被動(dòng)三強(qiáng)度誘騙態(tài)方案的實(shí)現(xiàn)性能要優(yōu)于主動(dòng)三強(qiáng)度誘騙態(tài)方案,有限長統(tǒng)計(jì)漲落會(huì)顯著影響參量下轉(zhuǎn)換光源MDI-QKD的實(shí)現(xiàn)性能。4、有限長測量無關(guān)QKD非平衡基矢誘騙態(tài)方案設(shè)計(jì)與分析。密鑰有限長引起的統(tǒng)計(jì)漲落顯著影響MDI-QKD的實(shí)現(xiàn)性能,如何提高有限長MDI-QKD的實(shí)用性能是目前人們最為關(guān)注的實(shí)際問題。本文提出了一種適用于MDI-QKD的非平衡基矢誘騙態(tài)協(xié)議,在可組合安全框架內(nèi),給出了密鑰有限長條件下單光子計(jì)數(shù)、單光子誤碼、相位誤碼的計(jì)算方法和安全密鑰率界限,該協(xié)議最大程度地利用了不同光強(qiáng)組合下的Bell態(tài)測量成功計(jì)數(shù),并通過控制基矢選擇概率使有限長統(tǒng)計(jì)漲落下的安全密鑰率達(dá)到最優(yōu),從而有效提升了MDI-QKD的安全密鑰生成效率,延長了密鑰安全傳輸距離。數(shù)值分析表明,使用相同實(shí)驗(yàn)參數(shù)并且在參數(shù)部分最優(yōu)選取的條件下,該協(xié)議的性能要優(yōu)于現(xiàn)有結(jié)果,在總脈沖數(shù)達(dá)到1015量級(jí)時(shí),密鑰安全傳輸光纖距離可以達(dá)到168公里。
[Abstract]:As a product of the combination of modern cryptography and quantum mechanics, quantum key distribution (QKD) has become a practical information security guarantee technology.QKD system that enables the two parties to produce unanimous secret information through open channel negotiation. These secret information often acts as the key to the two parties' secret communication, and the key is safe. All will be related to the security of the secure communication between the two parties. Therefore, the security of the key information produced by the QKD system becomes the core problem that people pay most attention to. Under ideal conditions, the QKD system has been proved to be theoretically safe, but the actual QKD system is not exactly the same as the ideal QKD system, and there is a finite length density, such as a non single photon source. The research shows that these non ideal factors directly pose a threat to the security of the actual QKD system, and the real security of QKD has become the key problem that must be solved in the practical process of the QKD system. The decoy state method can effectively solve the multi light source of the actual light source. In the actual QKD system, the actual decoy state method is usually used to modulate the light source. The actual decoy state QKD system is often limited in the number of light pulses and the length of the data processing in a certain running time. The key is also limited, and it is no longer applicable to the security limit of the ideal QKD system. In the finite long decoy state QKD system, the security limit of the decoy state QKD system under the limited long key condition is the key problem to be solved in the actual security analysis. This paper systematically studies the security of the limited long decoy state QKD system, and mainly solves the authentication key update and the non ideal parameter of the finite long decoy state QKD system. The main tasks are as follows: 1, the security of finite long quantum key distribution authentication is studied. In view of the influence of the key information leakage on the security of the actual QKD system, the secret magnification analysis method is given. The information leakage depicting method of authenticated key update under the limited long key condition is used to analyze the impact of authentication key information leakage on the authentication security of the actual QKD system. The service life analysis model of the initial authentication key is proposed, and the analysis model of the initial authentication key is presented. The calculation expression of the lifetime of the finite long initial authentication key is used to effectively measure the security intensity change of the finite length authentication key in the key update process.2, the finite length analysis of the passive decoy state quantum key distribution under the coherent attack. The parametric down conversion light source is a real light source with the mature technology now, based on the parameter The passive decoy state scheme is usually used in the actual QKD system of the converted light source, but the security limit of the existing key limited length is limited to the joint attack environment. In this paper, a finite length analysis method for the passive decoy state scheme in the coherent attack environment is proposed for the QKD system based on the parametric down conversion light source, and the single key length condition is given. The calculation expression of photon counting rate and bit error rate is used to obtain the strict security key rate limit of the passive decoy state QKD under the finite length condition. The numerical analysis shows that the passive decoy state QKD of the parametric down light source can achieve superior performance under the limited long key condition, and the farthest safe transmission distance can be obtained at the high working frequency of the system. More than the weak coherent light source active decoy state QKD.3, the parametric down conversion light measurement unrelated QKD decoy state scheme design and analysis. Measurement independent quantum key distribution (MDI-QKD) can overcome the non ideal security vulnerabilities caused by the detector, and have better practical security than the traditional QKD, related research on the weak coherent state light source MDI-QKD The security and performance of MDI-QKD based on parametric down conversion light source still need further study. Two MDI-QKD decoy schemes, passive two intensity decoy state scheme and passive three intensity decoy state scheme, are proposed in this paper. The corresponding parameter estimation method is given and the main and passive three are obtained under the key finite length condition. The security limit of the intensity decoy state scheme is given. The calculation formula of the average counting rate and bit error rate of MDI-QKD using the phase randomization of the down light source is given. On this basis, the implementation performance of the scheme with different decoy states is compared, and the security of the main and passive three intensity decoy state scheme is analyzed. The numerical analysis shows that the security key rate and the maximum transmission distance of the parametric down conversion light source MDI-QKD are superior to the weak coherent light source MDI-QKD. The implementation performance of the passive three intensity decoy state scheme is better than the active three intensity decoy state scheme, and the finite length statistical fluctuation will significantly improve the performance of the MDI-QKD of the parametric down conversion light source. The design and analysis of the finite length measurement irrelevant QKD nonequilibrium base vector decoy state scheme. The statistical fluctuation caused by the key limited length significantly affects the performance of the MDI-QKD. How to improve the practical performance of the finite length MDI-QKD is the most concerned practical problem at present. This paper proposes a non balanced base vector decoy protocol suitable for MDI-QKD. In the combinable security framework, the calculation method of single photon counting, single photon error code, phase error code and security key rate limit are given under the limited long key condition. This protocol maximally uses the Bell state measurement under different light intensity combinations and controls the safety of the finite length statistical fluctuation by controlling the selection probability of the base vector. The key rate is optimal, which effectively improves the security key generation efficiency of MDI-QKD and prolongs the key security transmission distance. The numerical analysis shows that the performance of the protocol is better than the existing results with the same experimental parameters and the optimal selection of the parameters. The key is safe to transmit when the total number of pulses is up to 1015. The fiber distance can reach 168 kilometers.

【學(xué)位授予單位】:解放軍信息工程大學(xué)
【學(xué)位級(jí)別】:博士
【學(xué)位授予年份】:2014
【分類號(hào)】:TN918.4

【參考文獻(xiàn)】

中國期刊全文數(shù)據(jù)庫 前2條

1 周淳;鮑皖蘇;付向群;;基于態(tài)關(guān)聯(lián)性不完美的誘騙態(tài)量子密鑰分配[J];電子學(xué)報(bào);2012年10期

2 ;Decoy-state quantum key distribution for the heralded pair coherent state photon source with intensity fluctuations[J];Science China(Information Sciences);2010年12期

中國碩士學(xué)位論文全文數(shù)據(jù)庫 前1條

1 周淳;量子密鑰分配的安全性研究[D];解放軍信息工程大學(xué);2011年

,

本文編號(hào):1803882

資料下載
論文發(fā)表

本文鏈接:http://www.sikaile.net/kejilunwen/wltx/1803882.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶e8e5d***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com