Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Eavesdropping Discrimination Method Based on Quantum Key Distribution Based on bb84 Protocol

A quantum key distribution, BB84 technology, applied in the field of quantum communication, to achieve the effect of improving efficiency

Active Publication Date: 2018-12-14
XIDIAN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to provide a quantum key distribution wiretapping discrimination method based on the BB84 protocol for the above-mentioned deficiencies in the prior art, to solve the problem of security in quantum encryption produced by non-ideal devices and imperfect experimental conditions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Eavesdropping Discrimination Method Based on Quantum Key Distribution Based on bb84 Protocol
  • Eavesdropping Discrimination Method Based on Quantum Key Distribution Based on bb84 Protocol
  • Eavesdropping Discrimination Method Based on Quantum Key Distribution Based on bb84 Protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0049] refer to figure 1 , the implementation steps of the present invention are as follows:

[0050] Step 1, according to the average photon number parameter in the BB84 protocol, define the Poisson distribution formula that the number of photons in the sent pulse obeys, namely

[0051]

[0052] Among them, μ is the number of photons in the transmitted pulse, η is the transmission efficiency under different channel conditions, η≤1, μη is the average number of photons in the pulse after channel loss, k is the average number of photons in the pulse, P 1 [k] is the probability of the number of photons in the pulse after channel loss, k! is the factorial of k and e is the natural exponent.

[0053] Step 2, according to the distribution state satisfied by the number of re-photons after the eavesdropper intercepts a part of the photons, the overall probability distribution of the number of photons in the received pulse sequence is judged:

[0054] When the eavesdropper interc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a quantum key distribution eavesdropping judgment method based on a BB84 protocol, and mainly aims to solve the safety problem in quantum encryption caused by non-ideal devices and imperfect experimental conditions. According to the technical scheme, the method comprises the following steps: the overall probability distribution of photon number in a received pulse sequence is judged according to the Poisson distribution followed by the number of photons in sent pulses and the Poisson distribution or normal distribution satisfied by the number of retransmitted photons after an eavesdropper intercepts part of photons; the source of received information error is judged according to the overall probability distribution of photon number; if the overall probability distribution of photon number is damaged, that the information error is from an eavesdropping attack is judged, legitimate participants believe that the communication is unsafe and cancel the communication; or, that the information error is from a non-ideal channel is judged, and legitimate participants adjust the parameters of the non-ideal channel to reduce information error. The method improves the efficiency and safety of quantum key distribution, and can be used in the BB84 protocol.

Description

technical field [0001] The invention belongs to the field of quantum communication, in particular to an analysis method of a quantum key distribution wiretapping discrimination scheme based on the BB84 protocol, which is used to solve the problem of low quantum information transmission efficiency and quantum encryption caused by non-ideal devices and imperfect experimental conditions security issues in . Background technique [0002] Quantum communication is a communication technology that uses the basic principles of quantum mechanics, and its specific forms include quantum secret communication, quantum teleportation and quantum safe direct communication. Quantum teleportation is based on the property of entanglement, which can realize the transfer of quantum states over long distances. Quantum safe direct communication can realize the transmission of information under the premise of ensuring channel security. Quantum secure communication is based on quantum key distribut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0852H04L63/1466H04L63/1475
Inventor 赵楠刘传起朱畅华权东晓李坚陈南裴昌幸
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products