• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

用于量子密钥分发的基于极化码的改进高效后处理算法

Improved polar-code-based efficient post-processing algorithm for quantum key distribution.

作者信息

Fang Junbin, Yi Zhengzhong, Li Jin, Liang Zhipeng, Wu Yulin, Lei Wen, Jiang Zoe Lin, Wang Xuan

机构信息

Department of Optoelectronic Engineering, Jinan University, Guangzhou, 510632, China.

Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, 518055, China.

出版信息

Sci Rep. 2022 Jun 16;12(1):10155. doi: 10.1038/s41598-022-14145-6.

DOI:10.1038/s41598-022-14145-6
PMID:35710795
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9203549/
Abstract

Combined with one-time pad encryption scheme, quantum key distribution guarantees the unconditional security of communication in theory. However, error correction and privacy amplification in the post-processing phase of quantum key distribution result in high time delay, which limits the final secret key generation rate and the practicability of quantum key distribution systems. To alleviate this limitation, this paper proposes an efficient post-processing algorithm based on polar codes for quantum key distribution. In this algorithm, by analyzing the channel capacity of the main channel and the wiretap channel respectively under the Wyner's wiretap channel model, we design a codeword structure of polar codes, so that the error correction and privacy amplification could be completed synchronously in a single step. Through combining error correction and privacy amplification into one single step, this efficient post-processing algorithm reduces complexity of the system and lower the post-processing delay. Besides, the reliable and secure communicaiton conditions for this algorithm has been given in this paper. Simulation results show that this post-processing algorithm satisfies the reliable and secure communication conditions well.

摘要

量子密钥分发与一次性密码本加密方案相结合,在理论上保证了通信的无条件安全性。然而,量子密钥分发后处理阶段的纠错和隐私放大导致了高时延,这限制了最终的秘密密钥生成速率和量子密钥分发系统的实用性。为了缓解这一限制,本文提出了一种基于极化码的量子密钥分发高效后处理算法。在该算法中,通过在Wyner窃听信道模型下分别分析主信道和窃听信道的信道容量,设计了极化码的码字结构,使得纠错和隐私放大能够在一步中同步完成。通过将纠错和隐私放大合并为一步,这种高效的后处理算法降低了系统的复杂度并减少了后处理延迟。此外,本文还给出了该算法可靠且安全的通信条件。仿真结果表明,这种后处理算法很好地满足了可靠且安全的通信条件。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4433/9203549/aca2f1c1a168/41598_2022_14145_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4433/9203549/dc65bed04c55/41598_2022_14145_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4433/9203549/ffb59bd12b5d/41598_2022_14145_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4433/9203549/caaad0a5ebf4/41598_2022_14145_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4433/9203549/9dc942b32ff3/41598_2022_14145_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4433/9203549/20811b782e3c/41598_2022_14145_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4433/9203549/c530a558a217/41598_2022_14145_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4433/9203549/dfcd047d898c/41598_2022_14145_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4433/9203549/b8207955edbc/41598_2022_14145_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4433/9203549/df725b76f8b8/41598_2022_14145_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4433/9203549/aca2f1c1a168/41598_2022_14145_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4433/9203549/dc65bed04c55/41598_2022_14145_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4433/9203549/ffb59bd12b5d/41598_2022_14145_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4433/9203549/caaad0a5ebf4/41598_2022_14145_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4433/9203549/9dc942b32ff3/41598_2022_14145_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4433/9203549/20811b782e3c/41598_2022_14145_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4433/9203549/c530a558a217/41598_2022_14145_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4433/9203549/dfcd047d898c/41598_2022_14145_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4433/9203549/b8207955edbc/41598_2022_14145_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4433/9203549/df725b76f8b8/41598_2022_14145_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4433/9203549/aca2f1c1a168/41598_2022_14145_Fig10_HTML.jpg

相似文献

1
Improved polar-code-based efficient post-processing algorithm for quantum key distribution.用于量子密钥分发的基于极化码的改进高效后处理算法
Sci Rep. 2022 Jun 16;12(1):10155. doi: 10.1038/s41598-022-14145-6.
2
Smoothing of Binary Codes, Uniform Distributions, and Applications.二进制码的平滑处理、均匀分布及其应用
Entropy (Basel). 2023 Nov 5;25(11):1515. doi: 10.3390/e25111515.
3
Efficient Integration of Rate-Adaptive Reconciliation with Syndrome-Based Error Estimation and Subblock Confirmation for Quantum Key Distribution.用于量子密钥分发的速率自适应协调与基于综合征的错误估计及子块确认的高效集成
Entropy (Basel). 2024 Jan 7;26(1):0. doi: 10.3390/e26010053.
4
High throughput error correction in information reconciliation for semiconductor superlattice secure key distribution.用于半导体超晶格安全密钥分发的信息协调中的高通量纠错
Sci Rep. 2021 Feb 16;11(1):3909. doi: 10.1038/s41598-021-82684-5.
5
Multi-matrix error estimation and reconciliation for quantum key distribution.量子密钥分发的多矩阵误差估计与协调
Opt Express. 2019 May 13;27(10):14545-14566. doi: 10.1364/OE.27.014545.
6
An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions.最优性总结:基于物理不可克隆函数的密钥协商
Entropy (Basel). 2020 Dec 24;23(1):16. doi: 10.3390/e23010016.
7
Continuous-variable quantum key distribution with low-complexity information reconciliation.具有低复杂度信息协调的连续变量量子密钥分发
Opt Express. 2022 Aug 15;30(17):30455-30465. doi: 10.1364/OE.461665.
8
Quantum photonic network and physical layer security.量子光子网络与物理层安全
Philos Trans A Math Phys Eng Sci. 2017 Aug 6;375(2099). doi: 10.1098/rsta.2016.0243.
9
A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security.一种安全增强加密方案及其密码安全性评估。
Entropy (Basel). 2019 Jul 17;21(7):701. doi: 10.3390/e21070701.
10
Implementation and security analysis of practical quantum secure direct communication.实用量子安全直接通信的实现与安全性分析
Light Sci Appl. 2019 Feb 6;8:22. doi: 10.1038/s41377-019-0132-3. eCollection 2019.

本文引用的文献

1
Polar Codes for Quantum Key Distribution.用于量子密钥分发的极化码
J Res Natl Inst Stand Technol. 2017 Dec 14;122:1-10. doi: 10.6028/jres.122.042. eCollection 2017.
2
An integrated space-to-ground quantum communication network over 4,600 kilometres.跨越 4600 公里的天地一体化量子通信网络。
Nature. 2021 Jan;589(7841):214-219. doi: 10.1038/s41586-020-03093-8. Epub 2021 Jan 6.
3
Chip-based quantum key distribution.基于芯片的量子密钥分发。
Nat Commun. 2017 Feb 9;8:13984. doi: 10.1038/ncomms13984.
4
Key reconciliation for high performance quantum key distribution.高性能量子密钥分发的关键协调。
Sci Rep. 2013;3:1576. doi: 10.1038/srep01576.
5
Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation.基于离散调制的长距离连续变量量子密钥分发的无条件安全性证明
Phys Rev Lett. 2009 May 8;102(18):180504. doi: 10.1103/PhysRevLett.102.180504. Epub 2009 May 6.
6
Simple proof of security of the BB84 quantum key distribution protocol.BB84量子密钥分发协议安全性的简单证明。
Phys Rev Lett. 2000 Jul 10;85(2):441-4. doi: 10.1103/PhysRevLett.85.441.
7
Unconditional security of quantum key distribution over arbitrarily long distances.
Science. 1999 Mar 26;283(5410):2050-6. doi: 10.1126/science.283.5410.2050.