计算机科学 ›› 2018, Vol. 45 ›› Issue (6A): 356-363.
郑祎能
ZHENG Yi-neng
摘要: 随着网络的发展,网络传播的信息日益增多,其中某些信息需要较高的安全性,因此信息加密手段的研究具有重大意义。量子密钥分发(Quantum Key Distribution,QKD)技术基于量子力学中的不可克隆定理,即不可能复制一个未知的量子态而不对其造成扰动,保证了其无条件的安全性,能够实现安全的密钥分发。但目前QKD网络规模较小,不能满足大规模组网的需求。同时,经典网络的路由技术已经不能适应QKD网络,量子信道寻径成为了一个需要解决的问题。鉴于以上问题,提出了一种能够满足较大规模QKD通信的基于光开关切换的QKD网络模型,并重点设计了其网络结构和信令体系,在此基础上设计了一个用于量子信道寻径的先导信号协议,并提出了量子信道管理机制。经实验验证,该模型的性能良好。
中图分类号:
[1]王剑,王振国.量子密码协议理论研究[M].长沙:国防科技大学出版社,2011:79-100. [2]ID-Quantique(Geneva,Switzerland)[OL].http://www.idqu-antique.com. [3]万骏.浅谈量子通信理论及其应用[J].科技传播,2018(6):1674-6708. [4]BENNET C H,BRASSARD G.Quantum cryptography:Public key distribution andcointossing[C]∥IEEE International Conference on Computers Systems and Signal Processing Bangalore.1984:175-179. [5]BECHMANN-PASQUINUCCI H,PERES A.Quantum cryp- tography with 3-state systems[J].Physical Review Letters,2000,85(15):3313-3316. [6]BRUSS D.Optimal eavesdropping in quantum cryptography with six states[J].Physical Review Letters,1998,81(14):3018-3021. [7]BIHAM E,HUNTTER B,MOR T.Quantum cryptographic network based on quantum memories[J].Physical Review A,1996,54(4):2651. [8]TOWNSEND P.Quantum cryptography on optical fibernet- works in European 98 Parallel Processing[J].Springer,1998,1470:35-46. [9]TOWNSEND P.Quantum cryptography on multiuser optical fiber network[J].Nature,1997,385(6611):47-49. [10]LONGDELL,FRAVEL J J,SELLARS E,et al.Stopped light with storage times Greater than one second using electrom agentically induced transparency in a solid[J].Physical Review Letters,2005,95:63-601. [11]CHEN Z,BCHE N,ZHAO B.Experimental demonstration of a BDCZ quantum repeater node[J].Nature,2008,454(28):1098-1101. [12]YUAN Z S,CHEN Y A.Fault-tolerent quantum repeater with atomic ensembles and linear optical[J].Physical Review A,2007,76(2):22-29. [13]CLAUSEN C,USMANI I,BUSSIERES F.Quatum storage of photonic entanglement in a crystal[J].Nature,2011,469:508-511. [14]TOLIVER P,CHAPURAN T E,RUNSEP R J,et al.Experimental investigation of quantum key distribution through transparent optical switch elements[J].IEEE Photonics Technology Letters,2003,15(11):1669-1671. [15]BEIGE A,ENGLERT B G,KURTSIEFER C,et al.Secure communication with single-photon two-qubit states[J].Physical Review A,2002,35(28):407-413. [16]CAI Q Y.The “Ping-Pong” protocol can be attacked without eavesdropping[J].Physical Review Letters,2003,91(10):109801. [17]CAI Q Y,LI B W.Deterministic secure communication without using entanglement[J].China Physical Letters,2004,21(4):601-603. [18]MAN Z X,ZHANG Z J,LI Y.Deterministic secure direct communication by using swapping quantum entanglement and local unitary operations[J].China Physical Letters,2005,22(1):18-21. [19]WANG J,ZHANG Q,TANG C J.Multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state[J].Optics Communications,2006,266(2):732-737. |
[1] | 张亮亮,张翌维,梁洁,孙瑞一,王新安. 新量子技术时代下的信息安全 Information Security in New Quantum Technology Age 计算机科学, 2017, 44(7): 1-7. https://doi.org/10.11896/j.issn.1002-137X.2017.07.001 |
[2] | 邢莉娟 李卓 白宝明 王新梅. 基于纯态的量子通信系统模型 计算机科学, 2008, 35(9): 97-99. |
[3] | 刘吉. 量子进程 计算机科学, 2007, 34(1): 203-207. |
|