量子密钥分发系统由于能够提供一种物理上安全的密钥分发方式,因此成为量子信息领域的研究热点,其中如何在现实条件下保证量子密钥分发的无条件安全性是该领域的一个重要研究课题.从经典保密通信系统中具有完善保密性的一次一密体制出发,介绍了量子密钥分发系统的应用模型和整体保密通信系统的安全性基础,以及自第一个协议被提出以来量子密钥分发现实无条件安全性的研究进展,重点介绍了针对现实条件安全漏洞的各种类型的量子黑客攻击方案、防御方式,以及最近两年被广泛重视的与测量设备无关的量子密钥分发系统的理论和实验进展.
参考文献
[1] | Stinson D R.Cryptography:Theory and Practice[M].3rd Edition,CRC Press,CRC Press LLC.2006.,2006. |
[2] | Shannon C E.Communication theory of secrecy systems[J].Bell Tech.J.,1949,28:656-715.,1949. |
[3] | Wootters W K,Zurek W H.A single quantum cannot be cloned[J].Nature,1982,299:802-803.,1982. |
[4] | Wiesner S.Conjugate coding[J].ACM SIGACT News,1983,15:78-88.,1983. |
[5] | Bennett C H,Bessette F,Brassard G,et al.Experimental quantum cryptography[J].J.Cryptol.,1992,5:3-28.,1992. |
[6] | Ekert A K.Quantum cryptography based on Bell's theorem[J].Phys.Rev.Lett.,1991,67:661-663.,1991. |
[7] | Bennett C H,Brassard G,Crepeau C,et al.Teleporting an unknown quantum state via dual classical and EPR channels[J].Phys.Rev.Lett.,1993,70:1895-1899:,1993. |
[8] | Bennett C H,Brassard G,Robert J M.Privacy amplification by public discussion[J].SIAM J.Comput.,1988,17:210-229.,1988. |
[9] | Bennett C H,Brassard G,Crkpeau C,et al.Generalized privacy amplification[J].IEEE Trans.Inform.Theory,1995,41:1915-1923.,1995. |
[10] | Maurer U M,Wolf S.Privacy amplification secure against active[J].Adv.Cryptol.CRYPTO'91,1996,1294:307-321.,1996. |
[11] | Van Assche G,Lblisdir S,Cerf N J.Secure coherent-state quantum key distribution protocols with efficient reconciliation[J].Phys.Rev.A,2005,71:052304.,2005. |
[12] | Lo H K,Chau H F.Unconditional security of quantum key distribution over arbitrarily long distances[J].Science,1999,283(5410):2050-2056.,1999. |
[13] | Mayers D.Quantum key distribution and string oblivious transfer in noisy channels[C].Advances in CryptologyProceedings of Crypto'96 (Aug.),Springer-Verlag,New York,1996,343-357.,1996. |
[14] | Mayers D,Salvail L.Quantum oblivious transfer is secure against all individual measurements[C].Proceedings of the Workshop on Physics and Computation,PhysComp'94,(Dallas,Tex.,Nov.),1994,69-77.,1994. |
[15] | Mayers D.On the security of the quantum oblivious transfer and key distribution protocols[C].Advances in Cryptology-Proceedings of Crypto'95 (Aug.),Springer-Verlag,New York,1995,124-135.,1995. |
[16] | Deutsch D,Ekert A K,Jozsa R,et al.Quantum privacy amplification and the security of quantum cryptography over noisy channels[J].Phys.Rev.Lett.,1996,77:2818-2821.,1996. |
[17] | Biham E,Mor T.On the security of quantum cryptography against collective attacks[J].Phys.Rev.Lett.,1996,78:2256-225g.,1996. |
[18] | Biham E,Boyer M,Brassard G,et al.Security of quantum key distribution against all collective attacks[EB/OL].LANL archives 1998,quant-ph/9801022.,1998. |
[19] | Mayers D.Unconditional security in quantum cryptography[J].Journal of the ACM,2001,48(3):351-406.,2001. |
[20] | Shor P W,Preskill J.Simple proof of security of the BB84 quantum key distribution protocol[J].Phys.Rev.Lett.,2000,2:441-444.,2000. |
[21] | 张权,唐朝京,张森强.B92量子密钥分配协议的变形及其无条件安全性证明[J].物理学报,2002(07):1439-1447. |
[22] | Tamaki K,Koashi M,Imoto N.Unconditionally secure key distribution based on two nonorthogonal states[J].Phys.Rev.Lett.,2003,90:167904.,2003. |
[23] | Masato Koashi,John Preskill.Secure quantum key distribution with an uncharacterized source[J].Phys.Rev.Lett.,2003,90(5):057902.,2003. |
[24] | Koashi M.Simpl(e) security proof of quantum key distribution based on complementarity[J].New J.Phys.,2009,11:045018-045018.,2009. |
[25] | Koashi M.Efficient quantum key distribution with practical sources and detectors[EB/OL].2006,arXiv:quantph/0609180.,2006. |
[26] | Kai Wen,Kiyoshi Tamaki,Yoshihisa Yamamoto.Unconditional security of single-photon differential phase shift quantum key distribution[J].Phys.Rev.Lett.,2009,103:0401141.,2009. |
[27] | Zhao Yibo,Fred Fung Chihang,Han Zhengfu,et al.Security proof of differential phase shift quantum key distribution in the noiseless case[J].Phys.Rev.A,2008,78:042330.,2008. |
[28] | Gottesman D,Lo H K,et al.Security of quantum key distribution with imperfect devices[J].Quantum Inf.Comput.,2004,4:325.,2004. |
[29] | Hwang W Y.Quantum key distribution with high loss:toward global secure communication[J].Phys.Rev.Lett.,2003,91:057901.,2003. |
[30] | Lo H K,Ma X,Chen K.Decoy state quantum key distribution[J].Phys.Rev.Lett.,2005,94:230504.,2005. |
[31] | Wang X B.Beating the photon-number-splitting attack in practical quantum cryptography[J].Phys.Rev.Lett.,2005,94:230503.,2005. |
[32] | Zhao Y,Qi B,Ma X,et al.Experimental quantum key distribution with decoy states[J].Phys.Rev.Lett.,2006,96:070502.,2006. |
[33] | Rosenberg D,Harrington J W,Rice P R,et al.Long-distance decoy-state quantum key distribution in optical fiber[J].Phys.Rev.Lett.,2007,98:010503.,2007. |
[34] | Inamori H,Liitkenhaus N,Mayers D.Unconditional security of pratical quantum key distribution[J].Eur.Phys.J.D.,2007,41:599-627.,2007. |
[35] | Huttner B,Imoto N,Gisin N,et al.Quantum cryptography with coherent states[J].Phys.Rev.A,1995,51:1863-1869.,1995. |
[36] | Hwang W Y,Wang X B,Matsumoto K,et al.Shor-preskill-type security proof for quantum key distribution without public announcement of bases[J].Phys.Rev.A,2003,67:012302.,2003. |
[37] | Wen K,Long G L.Modified Bennett-Brassard 1984 quantum key distribution protocol with two-way classical communications[J].Phys.Rev.A,2005,72:022336.,2005. |
[38] | Wang X B.Decoy-state protocol for quantum cryptography with four different intensities of coherent light[J].Phys.Rev.A,2005,72:12322.,2005. |
[39] | Zhao Yi,Qi Bing,Lo Hoi-Kwong.Quantum key distribution with an unknown and untrusted source[J].Phys.Rev.A,2008,77:052327.,2008. |
[40] | Peng Xiang,Jiang Hao,Xu Bingjie,et al.Experimental quantum key distribution with an untrusted source[J].Opt.Lett.,2008,33(18):2077-2079.,2008. |
[41] | Vakhitov A,Makarov V,Hjelme D.Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography[J].Journal of Modern Optics,2001,48(13):2023-2038.,2001. |
[42] | Ribordy G,Gautier J D,Gisin N,et al.Fast and user-friendly quantum key distribution[J].Journal of Modern Optics,2000,47:517-531.,2000. |
[43] | Fred Fung Chihang,Qi Bing,Tamaki Kiyoshi,et al.Phase-remapping attack in practical quantum-keydistribution systems[J].Phys.Rev.A,2007,75:032314.,2007. |
[44] | Xu Feihu,Qi Bing,Lo HoiKwong.Experimental demonstration of phase-remapping attack in a practical quantum key distribution system[J].New Journal of Physics,2010,12:113026.,2010. |
[45] | Makarov V,Hjelme Dag R.Faked states attack on quantum cryptosystems[J].Journal of Modern Optics,2005,52(5):691-705.,2005. |
[46] | Makarov V,Anisimov A,et al.Effects of detector efficiency mismatch on security of quantum cryptosystems[J].Phys.Rev.A,2006,74:022313.,2006. |
[47] | Qi Bing,Fred Fung Chihang,Lo Hoi-Kwong,et al.Time-shift attack in practical quantum cryptosystems[J].Quantum Information and Computation,2007,7:73-82.,2007. |
[48] | Nitin Jain,Christoffer Wittmann,Lars Lydersen,et al.Device calibration impacts security of quantum key distribution[J].Phys.Rev.Lett.,2011,107:110501.,2011. |
[49] | Lars Lydersen,Carlos Wiechers,Christoffer Wittmann,et al.Hacking commercial quantum cryptography systems by tailored bright illumination[J].Nature Photonics,2000,4:686-689.,2000. |
[50] | Vadim Makarov.Controlling passively quenched single photon detectors by bright light[J].New J.Phys.,2009,11:065003.,2009. |
[51] | Kwong Lo H,Curty M,Bing Q.Measurement device independent quantum key distribution[J].Phys.Rev.Lett.,2012,108:1305031.,2012. |
[52] | Mayers D,Yao A C C.Quantum cryptography with imperfect apparatus[C].Proceeding of the 39th Annual Symposium on Foundations of Computer Science (FOCS98),(IEEE Computer Society,Washington,DC,1998),1998,503.,1998. |
[53] | Acin A,et al.Device-independent security of quantum cryptography against collective attacks[J].Phys.Rev.Lett.,2007,98:230501.,2007. |
[54] | Tamaki K,Lo H K,Fung C H F,et al.Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw[J].Phys.Rev.A,2012,85:042307.,2012. |
[55] | Ma X,Razavi M.Alternative schemes for measurement-device-independent quantum key distribution[J].Phys.Rev.A,2012,86:062319.,2012. |
[56] | Ma X,Fred Fung ChiHang,Razavi Mohsen.Statistical fluctuation analysis for measurement-device-independent quantum key distribution[J].Phys.Rev.A,2012,86:052305.,2012. |
[57] | Liu Y,Chen T Y,et al.Experimental measurement-device-independent quantum key distribution[J].Phys.Rev.Lett.,2013,111:130502.,2013. |
[58] | Tang Zhiyuan,Liao Zhongfa,Xu Feihu,et al.Experimental demonstration of polarization encoding measurementdevice-independent quantum key distribution[EB/OL].2013,arXiv:1306.6134.,2013. |
[59] | Ferreira da Silva T,Vitoreti D,Xavier G B,et al.Proof-of-principle demonstration of measurement-deviceindependent quantum key distribution using polarization qubits[J].Phys.Rev.A,2013,88:052303.,2013. |
上一张
下一张
上一张
下一张
计量
- 下载量()
- 访问量()
文章评分
- 您的评分:
-
10%
-
20%
-
30%
-
40%
-
50%