在量子密码中应用量子测量信道的概念及信息论理论,并以马尔可夫链串联信道模型计算了量子保密通信的B92协议在非透明攻击方式下敌手和合法接收方能获得的信息量,为合法者的安全通信和对敌手的检测提供了理论依据和标准.
参考文献
[1] | Bennett C H, et al. Proceedings of IEEE International Conf. Computer, Systems, and Signal Processing [C]∥Bangalore, India (New York): 1984, 175. |
[2] | Ekert A K. Quantum cryptography based on Bell's theorem [J]. Phys. Rev. Lett.,1991, 67: 661-663. |
[3] | Bennett C H. Quantum cryptography using two non-orthogonal states [J]. Phys. Rev. Lett., 1992, 68: 3121-3124. |
[4] | Lo H K, Chau H F. Unconditional security of quantum key distribution over arbitrary long distances [J]. Science,1999, 283: 2050-2056. |
[5] | Mayers D. On the security of the quantum oblivious transfer and key distribution protocol [J]. Proc. Crypto,1996, 343. |
[6] | Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol [J]. Phys. Rev.Lett., 2000, 85: 441. |
[7] | Hughes R J, Morgan G L, Peterson C G. Quantum key distribution over 48 km optical fibre network [J]. J. Mod.Opt., 2000, 47: 533. |
[8] | Chen Zhixin, Tang Zhilie, et al. Quantum cryptography and secure communications [J]. Chinese Journal of Quantum Electronics (量子电子学报), 2003, 20:385 (in Chinese). |
[9] | Zeng Guihua, Wang Xinmei, et al. Information investigation for BB84 protocol in quantum cryptography [J].Journal of China Institute of Communications (通信学报), 2000, 21(6) (in Chinese). |
[10] | Ekert A K, Huttner B, et al. Eavesdropping on quantum cryptographical systems [J]. Phys. Rev. A, 1994, 50:1047-1055. |
上一张
下一张
上一张
下一张
计量
- 下载量()
- 访问量()
文章评分
- 您的评分:
-
10%
-
20%
-
30%
-
40%
-
50%