欢迎登录材料期刊网

材料期刊网

高级检索

对基于微弱相干脉冲的量子密钥分发网络的安全性进行了分析.在该量子密钥分发网络中,由于光学节点的插入损耗及用户之间量子信道损耗的影响,窃听者可以实施路径攻击来获取量子信息.这种路径攻击不会改变脉冲中的光子数分布及系统的密钥生成速率,且这种窃听行为可以利用量子信道的损耗进行隐藏.数据分析显示,即使诱惑态技术也无法防范路径攻击对密钥分发网络安全的威胁,而且随着平均光子数的增加,这种威胁越强.因此,在对量子密钥分发网络系统参数进行选择时,必须考虑路径攻击的影响.

参考文献

[1] Townsend P D.Quantum cryptography on optical fiber networks[J].Optical Fiber Technology,1998,4:345-370.
[2] Elliott C.Building the quantum network[J].New J.Phys.,2002,4(46):1-12.
[3] Elliott C,Colvin A,Pearson D,et al.Current status of the DARPA quantum network[C].SPIE,2005,5815:138-149.
[4] Dianati M,Alléaume R.Architecture of the secoqc quantum key distribution network[C].Quantum,Nano,and Micro Technologies,2007.ICQNM '07.First International Conference on Jan.2007,13.
[5] Lin Y,Lin R F,Li N,et al.Direct deterministic communication on quantum channel[J].Chinese Journal of Quantum Electronics (量子电子学报),2006,23(4):441-450 (in Chinese).
[6] Zhu A D,Zhang S.Quantum key distribution and controlled quantum direct communication applying product state of qurtit[J].Chinese Journal of Quantum Electronics (量子电子学报),2007,24(3):316-322 (in Chinese).
[7] Fa M X,Zhao F,Lu Y,et al.Progress of practical quantumKey distribution network[J].Laser & Optoelectronics Progress (激光与电子学进展),2007,44(10):39-47 (in Chinese).
[8] Chen W.,Han Z F,Zhang T,et al.Field experimental " Star Type " metropolitan quantum key distribution network[OL].arXiv:0708.3546v1[quant-ph].
[9] Braesard G,Bussiéres F,Godbout N,et al.Multi-user quantum key distribution using wavelength division multiplexing[C].SPIE,2003,5260:149-152.
[10] Wang B C,Kumavor P,Yelin S F,et al.Multi-user quantum cryptography[C].SPIE,2005,6014:1-12.
[11] Kumavor P D,Beal A C,Donkor E,et al.Demonstration of a six-user quantum key distribution network on ahus architecture[C].SPIE,2007,6573:1-8.
[12] Kumavor P D,Beal A C,Yelin S,et al.Comparison of four multi-user quantum key distribution schemes over passive optical networks[J].J.Ligh.Tecn.,2005,23(1):268-272.
[13] Fernandez V,Collins R J,Gordon K J,et al.Passive optical network approach to gigahertz-clocked multinser quantum key distribution[J].IEEE J.Quan.Elec.,2007,43(2):130-137.
[14] Xiao T,Lijun M,Mink A,et al.Demonstration of an active quantum key distribution network[C].SPIE,2006,6305:1-2.
[15] Han Z F,Mo X F,Zhang T,et al.Quantum network addressing method and expandable quantum router[C].SPIE,2006,6244:1-2.
[16] Honjo T,Inoue K,Sahara A,et al.Quantum key distribution experiment through a PLC matrix switch[J].Optics Communications,2006,263:120123.
[17] Lütkenhaus N.Security against individual attacks for realistic quantum key distribution[J].Phys.Rev.A,2000,61,052304.
[18] Gottesman D,Lo H K,Lütkenhaus N,et al.Security of quantum key distribution with imperfect devices[J].Quantum Inf.Comput.,2004,4:325.
[19] Wang X B.Beating the photon-number-splitting attack in practical quantum cryptography[J].Phys.Rev.Lett.,2005,94:230503.
[20] Lo H K,Ma X F,Chen K.Decoy state quantum key distribution[J].Phys.Rev.Lett.,2005,94:230504.
[21] Zhao F,Fu M X,Lu Y Q,et al.Influence of multi-photon pulses on practical differential-phase-shift quantum key distribution[J].Chin.Phys.,2007,16(11):3402-3406.
上一张 下一张
上一张 下一张
计量
  • 下载量()
  • 访问量()
文章评分
  • 您的评分:
  • 1
    0%
  • 2
    0%
  • 3
    0%
  • 4
    0%
  • 5
    0%