计算机科学 ›› 2018, Vol. 45 ›› Issue (6A): 356-363.

• 信息安全 • 上一篇    下一篇

QKD网络量子信道管理关键技术研究

郑祎能   

  1. 华中科技大学电子信息与通信学院 武汉430074
  • 出版日期:2018-06-20 发布日期:2018-08-03
  • 作者简介:郑祎能(1997-),女,主要研究方向为网络通信与多媒体信息处理,E-mail:915230866@qq.com。

Research on Key Technologies of Quantum Channel Management in QKD Network

ZHENG Yi-neng   

  1. School of Electronic Information and Communications,Huazhong University of Science and Technology,Wuhan 430074,China
  • Online:2018-06-20 Published:2018-08-03

摘要: 随着网络的发展,网络传播的信息日益增多,其中某些信息需要较高的安全性,因此信息加密手段的研究具有重大意义。量子密钥分发(Quantum Key Distribution,QKD)技术基于量子力学中的不可克隆定理,即不可能复制一个未知的量子态而不对其造成扰动,保证了其无条件的安全性,能够实现安全的密钥分发。但目前QKD网络规模较小,不能满足大规模组网的需求。同时,经典网络的路由技术已经不能适应QKD网络,量子信道寻径成为了一个需要解决的问题。鉴于以上问题,提出了一种能够满足较大规模QKD通信的基于光开关切换的QKD网络模型,并重点设计了其网络结构和信令体系,在此基础上设计了一个用于量子信道寻径的先导信号协议,并提出了量子信道管理机制。经实验验证,该模型的性能良好。

关键词: 量子密钥分发网络, 量子通信, 量子信道管理

Abstract: With the development of the Internet,the information dissemination is increasing and the information security is more and more important.As some information requires higher security,researches on information encryption me-thods are of great significance.Quantum key distribution (QKD) technology is based on the no-cloning theorem,which states that it is impossible to create an identical copy of an arbitrary unknown quantum state.That is why QKD is unconditionally secure and it enables keys distribution to be safe.However,the current QKD network is small in size and cannot meet the needs of large-scale network.At the same time,the routing techniques on the classical networks can not apply to the QKD network.Finding out feasible quantum paths becomes a problem to be solved.In view of the above issues,a QKD network model which can meet the large-scale QKD communication was put forward according to optical switch,and its network structure and signaling systems were designed.Based on this,the pilot signal protocol and the quantum channel management mechanism were proposed.The results show that the model works well.

Key words: Quantum channel management, Quantum communication, Quantum key distribution network

中图分类号: 

  • TP393
[1]王剑,王振国.量子密码协议理论研究[M].长沙:国防科技大学出版社,2011:79-100.
[2]ID-Quantique(Geneva,Switzerland)[OL].http://www.idqu-antique.com.
[3]万骏.浅谈量子通信理论及其应用[J].科技传播,2018(6):1674-6708.
[4]BENNET C H,BRASSARD G.Quantum cryptography:Public key distribution andcointossing[C]∥IEEE International Conference on Computers Systems and Signal Processing Bangalore.1984:175-179.
[5]BECHMANN-PASQUINUCCI H,PERES A.Quantum cryp- tography with 3-state systems[J].Physical Review Letters,2000,85(15):3313-3316.
[6]BRUSS D.Optimal eavesdropping in quantum cryptography with six states[J].Physical Review Letters,1998,81(14):3018-3021.
[7]BIHAM E,HUNTTER B,MOR T.Quantum cryptographic network based on quantum memories[J].Physical Review A,1996,54(4):2651.
[8]TOWNSEND P.Quantum cryptography on optical fibernet- works in European 98 Parallel Processing[J].Springer,1998,1470:35-46.
[9]TOWNSEND P.Quantum cryptography on multiuser optical fiber network[J].Nature,1997,385(6611):47-49.
[10]LONGDELL,FRAVEL J J,SELLARS E,et al.Stopped light with storage times Greater than one second using electrom agentically induced transparency in a solid[J].Physical Review Letters,2005,95:63-601.
[11]CHEN Z,BCHE N,ZHAO B.Experimental demonstration of a BDCZ quantum repeater node[J].Nature,2008,454(28):1098-1101.
[12]YUAN Z S,CHEN Y A.Fault-tolerent quantum repeater with atomic ensembles and linear optical[J].Physical Review A,2007,76(2):22-29.
[13]CLAUSEN C,USMANI I,BUSSIERES F.Quatum storage of photonic entanglement in a crystal[J].Nature,2011,469:508-511.
[14]TOLIVER P,CHAPURAN T E,RUNSEP R J,et al.Experimental investigation of quantum key distribution through transparent optical switch elements[J].IEEE Photonics Technology Letters,2003,15(11):1669-1671.
[15]BEIGE A,ENGLERT B G,KURTSIEFER C,et al.Secure communication with single-photon two-qubit states[J].Physical Review A,2002,35(28):407-413.
[16]CAI Q Y.The “Ping-Pong” protocol can be attacked without eavesdropping[J].Physical Review Letters,2003,91(10):109801.
[17]CAI Q Y,LI B W.Deterministic secure communication without using entanglement[J].China Physical Letters,2004,21(4):601-603.
[18]MAN Z X,ZHANG Z J,LI Y.Deterministic secure direct communication by using swapping quantum entanglement and local unitary operations[J].China Physical Letters,2005,22(1):18-21.
[19]WANG J,ZHANG Q,TANG C J.Multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state[J].Optics Communications,2006,266(2):732-737.
[1] 张亮亮,张翌维,梁洁,孙瑞一,王新安.
新量子技术时代下的信息安全
Information Security in New Quantum Technology Age
计算机科学, 2017, 44(7): 1-7. https://doi.org/10.11896/j.issn.1002-137X.2017.07.001
[2] 邢莉娟 李卓 白宝明 王新梅.
基于纯态的量子通信系统模型

计算机科学, 2008, 35(9): 97-99.
[3] 刘吉.
量子进程

计算机科学, 2007, 34(1): 203-207.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!