• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

关于半设备无关量子密钥分发协议的安全性。

On the security of semi-device-independent QKD protocols.

作者信息

Chaturvedi Anubhav, Ray Maharshi, Veynar Ryszard, Pawłowski Marcin

机构信息

1Institute of Theoretical Physics and Astrophysics, National Quantum Information Centre, Faculty of Mathematics, Physics and Informatics, University of Gdańsk, Wita Stwosza 57, 80-308 Gdańsk, Poland.

2Center for Computational Natural Sciences and Bioinformatics, International Institute of Information Technology, Hyderabad, Gachibowli, Hyderabad, 500032 India.

出版信息

Quantum Inf Process. 2018;17(6):131. doi: 10.1007/s11128-018-1892-z. Epub 2018 Apr 21.

DOI:10.1007/s11128-018-1892-z
PMID:31007638
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC6448325/
Abstract

While fully device-independent security in (BB84-like) prepare-and-measure quantum key distribution (QKD) is impossible, it can be guaranteed against individual attacks in a semi-device-independent (SDI) scenario, wherein no assumptions are made on the characteristics of the hardware used except for an upper bound on the dimension of the communicated system. Studying security under such minimal assumptions is especially relevant in the context of the recent attacks wherein the eavesdroppers can not only construct the devices used by the communicating parties but are also able to remotely alter their behavior. In this work, we study the security of a SDIQKD protocol based on the prepare-and-measure quantum implementation of a well-known cryptographic primitive, the random access code (RAC). We consider imperfect detectors and establish the critical values of the security parameters (the observed success probability of the RAC and the detection efficiency) required for guaranteeing security against eavesdroppers with and without quantum memory. Furthermore, we suggest a minimal characterization of the preparation device in order to lower the requirements for establishing a secure key.

摘要

虽然在(类似BB84的)制备与测量量子密钥分发(QKD)中完全与设备无关的安全性是不可能的,但在半设备无关(SDI)场景中可以保证抵御个体攻击,在该场景中,除了对通信系统维度的上限外,不对所使用硬件的特性做任何假设。在最近的攻击背景下,研究在如此最小假设下的安全性尤为重要,在这些攻击中,窃听者不仅可以构建通信方使用的设备,还能够远程改变其行为。在这项工作中,我们基于一种著名的密码原语——随机访问码(RAC)的制备与测量量子实现,研究了一种SDIQKD协议的安全性。我们考虑了不完美探测器,并确定了针对有无量子存储器的窃听者保证安全性所需的安全参数(RAC的观测成功概率和探测效率)的临界值。此外,我们提出了制备设备的最小特征描述,以降低建立安全密钥的要求。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f2f/6448325/bd73e567dcae/11128_2018_1892_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f2f/6448325/9527e6b1725b/11128_2018_1892_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f2f/6448325/9e5e5d048426/11128_2018_1892_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f2f/6448325/b5975c47e538/11128_2018_1892_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f2f/6448325/dfc0e612d78b/11128_2018_1892_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f2f/6448325/fb8bd677df1a/11128_2018_1892_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f2f/6448325/bd73e567dcae/11128_2018_1892_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f2f/6448325/9527e6b1725b/11128_2018_1892_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f2f/6448325/9e5e5d048426/11128_2018_1892_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f2f/6448325/b5975c47e538/11128_2018_1892_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f2f/6448325/dfc0e612d78b/11128_2018_1892_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f2f/6448325/fb8bd677df1a/11128_2018_1892_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6f2f/6448325/bd73e567dcae/11128_2018_1892_Fig6_HTML.jpg

相似文献

1
On the security of semi-device-independent QKD protocols.关于半设备无关量子密钥分发协议的安全性。
Quantum Inf Process. 2018;17(6):131. doi: 10.1007/s11128-018-1892-z. Epub 2018 Apr 21.
2
Counterfactual quantum key distribution with untrusted detectors.基于不可信探测器的反事实量子密钥分发
Heliyon. 2023 Feb 13;9(2):e13719. doi: 10.1016/j.heliyon.2023.e13719. eCollection 2023 Feb.
3
Finite-key bound for semi-device-independent quantum key distribution.半设备无关量子密钥分发的有限密钥界限
Opt Express. 2017 Jul 24;25(15):16971-16980. doi: 10.1364/OE.25.016971.
4
Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications.用于医疗应用的无线人体传感器网络中安全通信的增强型BB84量子密码协议。
Pers Ubiquitous Comput. 2023;27(3):875-885. doi: 10.1007/s00779-021-01546-z. Epub 2021 Mar 18.
5
Reference-frame-independent, measurement-device-independent quantum key distribution using fewer quantum states.使用较少量子态的与参考系无关、与测量设备无关的量子密钥分发。
Opt Lett. 2020 May 1;45(9):2624-2627. doi: 10.1364/OL.389440.
6
Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources.实验性测量设备无关型量子密钥分发与有缺陷和相关源。
Sci Bull (Beijing). 2022 Nov 15;67(21):2167-2175. doi: 10.1016/j.scib.2022.10.010. Epub 2022 Oct 14.
7
Enhancing the Security of the BB84 Quantum Key Distribution Protocol against Detector-Blinding Attacks via the Use of an Active Quantum Entropy Source in the Receiving Station.通过在接收站使用有源量子熵源增强BB84量子密钥分发协议抵御探测器致盲攻击的安全性。
Entropy (Basel). 2023 Nov 6;25(11):1518. doi: 10.3390/e25111518.
8
Security of the Decoy-State BB84 Protocol with Imperfect State Preparation.基于不完美态制备的诱骗态BB84协议的安全性
Entropy (Basel). 2023 Nov 17;25(11):1556. doi: 10.3390/e25111556.
9
Security of subcarrier wave quantum key distribution against the collective beam-splitting attack.子载波量子密钥分发抵御集体分束攻击的安全性
Opt Express. 2018 Apr 30;26(9):11292-11308. doi: 10.1364/OE.26.011292.
10
Parallel Device-Independent Quantum Key Distribution.并行设备无关量子密钥分发
IEEE Trans Inf Theory. 2020;66(9). doi: 10.1109/tit.2020.2986740.

本文引用的文献

1
Bounding the Set of Finite Dimensional Quantum Correlations.界定有限维量子关联集
Phys Rev Lett. 2015 Jul 10;115(2):020501. doi: 10.1103/PhysRevLett.115.020501. Epub 2015 Jul 7.
2
A universal setup for active control of a single-photon detector.一种用于单光子探测器主动控制的通用装置。
Rev Sci Instrum. 2014 Jan;85(1):013108. doi: 10.1063/1.4854615.
3
Memory attacks on device-independent quantum cryptography.对设备无关量子密码学的记忆攻击。
Phys Rev Lett. 2013 Jan 4;110(1):010503. doi: 10.1103/PhysRevLett.110.010503. Epub 2013 Jan 2.
4
Measurement-device-independent quantum key distribution.测量设备无关的量子密钥分发。
Phys Rev Lett. 2012 Mar 30;108(13):130503. doi: 10.1103/PhysRevLett.108.130503.
5
Side-channel-free quantum key distribution.无侧信道的量子密钥分发。
Phys Rev Lett. 2012 Mar 30;108(13):130502. doi: 10.1103/PhysRevLett.108.130502.
6
Device calibration impacts security of quantum key distribution.设备校准影响量子密钥分发的安全性。
Phys Rev Lett. 2011 Sep 9;107(11):110501. doi: 10.1103/PhysRevLett.107.110501.
7
Full-field implementation of a perfect eavesdropper on a quantum cryptography system.全场实现量子密码系统的完美窃听者。
Nat Commun. 2011 Jun 14;2:349. doi: 10.1038/ncomms1348.
8
Proposal for implementing device-independent quantum key distribution based on a heralded qubit amplifier.基于量子位放大器的量子密钥分发设备独立实现的提案。
Phys Rev Lett. 2010 Aug 13;105(7):070501. doi: 10.1103/PhysRevLett.105.070501. Epub 2010 Aug 12.
9
Preparation contextuality powers parity-oblivious multiplexing.制备关联性赋予了与奇偶无关的复用能力。
Phys Rev Lett. 2009 Jan 9;102(1):010401. doi: 10.1103/PhysRevLett.102.010401. Epub 2009 Jan 5.
10
Device-independent security of quantum cryptography against collective attacks.量子密码学针对集体攻击的与设备无关的安全性。
Phys Rev Lett. 2007 Jun 8;98(23):230501. doi: 10.1103/PhysRevLett.98.230501. Epub 2007 Jun 4.