Apparatus and method with enhanced security and reduced trust requirements for quantum key distribution

A quantum key distribution, quantum key technology, applied in the field of quantum key distribution, can solve the problem of not allowing QKD users to modify the parameters of the QKD system

Active Publication Date: 2021-09-14
ID QUANTUM TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing technology does not allow QKD users to modify the QKD system parameters in such a way that the QKD manufacturer does not know the QKD system parameters in advance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Apparatus and method with enhanced security and reduced trust requirements for quantum key distribution
  • Apparatus and method with enhanced security and reduced trust requirements for quantum key distribution
  • Apparatus and method with enhanced security and reduced trust requirements for quantum key distribution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The description of the invention is based on several drawings.

[0039] The main objective of the present invention is to enhance the security provided by the QKD system and reduce the trust requirements of the QKD users on the equipment manufacturers.

[0040] like figure 1 As shown in , the present invention can be used to securely exchange encryption keys between a transmitter (100) and a receiver (200). It is based on a conventional QKD system modified to accept additional custom parameters. The hardware of the QKD system consists of a QKD transmitter (120) and a QKD receiver (220) connected by a quantum channel (quantum channel (500)). The QKD transmitter (120) and receiver (220) generally consist of optical and electronic components suitable for generating and detecting a stream of qubits (520). The QKD transmitter (120) and receiver (220) are controlled by QKD controllers (110 and 210) via communication lines (115 and 215). These controllers consist, for exa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A QKD system for securely exchanging encryption keys between a transmitter (100) and a receiver (200) modified to accept additional customization parameters. The QKD system consists of a QKD transmitter (120) and a QKD receiver (220) capable of implementing multiple QKD protocols forming a protocol family. The QKD transmitter (120) and receiver (220) connected by a quantum channel (500) consist of optical and electronic components suitable for generating and detecting qubit streams. The qubits (520) exchanged on the quantum channel (500) are grouped into blocks (510) of at least one qubit and of length Li (511). For each block (510) of qubits (520), one of the QKD protocols (530) selected from the family of protocols that can be implemented using the transmitter (100) and transmitter (200) is used.

Description

technical field [0001] The present invention relates generally to the field of quantum key distribution, and more specifically to apparatus and methods for enhancing the security of quantum key distribution (QKD) systems. Background technique [0002] The main goal of quantum cryptography or quantum key distribution (QKD) is to be able to share a sequence of bits between a transmitter and a receiver whose privacy can be proven with a limited set of hypotheses. [0003] If two users possess shared random secret information (hereafter referred to as the "key"), they can use provable security to achieve two of the goals of cryptography: 1) Make their messages unavailable to eavesdroppers Understand and 2) distinguish legitimate messages from forged or altered ones. One-time pad encryption achieves the first goal, and Wegman-Carter authentication achieves the second. Unfortunately, both encryption schemes consume key material and make it unsuitable for further use. Therefore,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0852H04L9/0858G06N10/00
Inventor 格雷瓜尔·利波第
Owner ID QUANTUM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products