Device and method for defending attack of avalanche transition region

A transition zone and multiplexer technology, applied in countermeasures against encryption mechanisms, secure communication devices, and key distribution, can solve problems such as QKD bit errors or bit rate changes, and achieve the effect of ensuring counting stability

Active Publication Date: 2020-01-24
ANHUI QASKY QUANTUM SCI & TECH CO LTD
View PDF12 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the position of the gating signal or the arrival delay of the light pulse is changed, the response of the detector will change drastically, which will cause a significant change in the bit error or bit rate of QKD, so as to discover this transition zone attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device and method for defending attack of avalanche transition region
  • Device and method for defending attack of avalanche transition region

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] Such as figure 1 , the device for resisting the attack of the avalanche transition zone includes a clock fan-out device, a delay module, a multiplexer device, a random source device and a gate signal generation circuit device; the clock fan-out device detector is used to pass through the detector The starting input signal is divided into two independent clock signals T1 and clock signal T2; the output terminal of the delay module is connected with the input terminal IN1 of the multiplexer, and the delay module is used to delay the clock signal T1 After inputting the multiplexer, the delay amount of the delay module is Δt, and the delay amount Δt is greater than or equal to half of the edge time of the gating signal; the clock signal T2 is connected with the input terminal IN2 of the multiplexer device, and multiple The selection switch S of the selector device is connected with the random source module; the random source module is used to randomly select the input clock...

Embodiment 2

[0046] see figure 1 , the method for resisting the attack of the avalanche transition zone is implemented by means of a device for resisting the attack of the avalanche transition zone, including the following steps:

[0047] The trigger input signal passing through the detector is divided into two independent clock signals T1 and clock signal T2 through the clock fan-out device detector;

[0048] The clock signal T1 is delayed by the delay module and then input to the multiplexer, the delay amount of the delay module is Δt, and the delay amount Δt is greater than or equal to half of the edge time of the gate control signal;

[0049] The clock signal T2 is input to the multiplexer through the input terminal IN2 of the multiplexer device, and the selection switch S of the multiplexer device is connected to the random source module;

[0050] The input clock T1 of the input terminal IN1 or the input clock T2 of the input terminal IN2 is randomly selected by the random source mod...

Embodiment 3

[0052] see figure 2 , the device for resisting the attack of the avalanche transition zone includes a light source input module, a delay controllable optical module, a random source module and a light source output module; the light source input module is connected to the input terminal IN of the delay controllable optical module for Input the light source into the delay controllable optical module; the delay controllable optical module is used to modulate the input light source, so that after the light source is modulated by the delay controllable optical module, it is divided into two different delay times of t or t+Δt Output: The output interface of the random source module is connected to the control terminal S of the delay controllable optical module, and the random source module is used to randomly select the delayed output of t or t+Δt as the final light source output through the light source output module. The delay controllable optical module is an optical controllab...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a device for defending the attack of an avalanche transition region. The device comprises a clock fan-out device, a delay module, a multiplexer device, a random source device and a gate signal generating circuit device; the clock fan-out device is used for dividing a departure input signal passing by a detector into two paths of independent clock signals T1 and T2; an output end OUT of a multiplexer is connected with the gate signal generating circuit, the minimum delay between a trigger input signal and a gating output signal is t, and the gating output signal output by the gate signal generating circuit generates random jitter at a time t or t+ delta t and is output by an output joint J2 to APD. The invention also discloses a method for defending the attack of theavalanche transition region. By adopting the device and the method disclosed by the invention, the attack of the avalanche transition region is detected while ensuring the counting stability of the detector.

Description

technical field [0001] The invention relates to the field of mid-infrared single-photon detectors in optical fiber quantum key distribution systems, in particular to a device and method for resisting attacks in an avalanche transition zone. Background technique [0002] The quantum cryptography technology based on the basic principles of quantum mechanics is theoretically unconditionally safe. However, with the gradual maturity of the quantum cryptography technology, it is turning to more and more practical applications. Actual security is not as perfect as described in theory. The reason is that there is a gap between the equipment used in the actual system and the theoretical model, such as the imperfection of the light source (not a true single-photon source), the loss on the channel and the non-ideal detector. These imperfections lead to loopholes in the QKD system, and eavesdroppers can take advantage of these loopholes to obtain some or even all keys without being det...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G01J11/00H04L9/00H04L9/08
CPCG01J11/00H04L9/002H04L9/0852H04L2209/12
Inventor 徐焕银刘云王宝慧黄敦锋凌杰吕利影马伟朱文正王立霞薛坤
Owner ANHUI QASKY QUANTUM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products