• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

量子密钥分发:使用Python3通过BB84协议进行建模与仿真。

Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3.

作者信息

Adu-Kyere Akwasi, Nigussie Ethiopia, Isoaho Jouni

机构信息

Department of Computing, University of Turku, Vesilinnatie 5, 20500 Turku, Finland.

出版信息

Sensors (Basel). 2022 Aug 21;22(16):6284. doi: 10.3390/s22166284.

DOI:10.3390/s22166284
PMID:36016045
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9413261/
Abstract

Autonomous "Things" is becoming the future trend as the role, and responsibility of IoT keep diversifying. Its applicability and deployment need to re-stand technological advancement. The versatile security interaction between IoTs in human-to-machine and machine-to-machine must also endure mathematical and computational cryptographic attack intricacies. Quantum cryptography uses the laws of quantum mechanics to generate a secure key by manipulating light properties for secure end-to-end communication. We present a proof-of-principle via a communication architecture model and implementation to simulate these laws of nature. The model relies on the BB84 quantum key distribution (QKD) protocol with two scenarios, without and with the presence of an eavesdropper via the interception-resend attack model from a theoretical, methodological, and practical perspective. The proposed simulation initiates communication over a quantum channel for polarized photon transmission after a pre-agreed configuration over a Classic Channel with parameters. Simulation implementation results confirm that the presence of an eavesdropper is detectable during key generation due to Heisenberg's uncertainty and no-cloning principles. An eavesdropper has a 0.5 probability of guessing transmission qubit and 0.25 for the polarization state. During simulation re-iterations, a base-mismatch process discarded about 50 percent of the total initial key bits with an Error threshold of 0.11 percent.

摘要

随着物联网的作用和责任不断多样化,自主“事物”正成为未来的趋势。其适用性和部署需要重新适应技术进步。物联网在人机和机器对机器之间的通用安全交互还必须经受数学和计算加密攻击的复杂性。量子密码学利用量子力学定律,通过操纵光的特性来生成安全密钥,以实现安全的端到端通信。我们通过一个通信架构模型和实现方式给出了一个原理证明,以模拟这些自然规律。该模型依赖于BB84量子密钥分发(QKD)协议,有两种场景,从理论、方法和实践的角度,分别是不存在窃听者以及存在窃听者(通过拦截重发攻击模型)的情况。所提出的模拟在通过经典信道预先商定配置参数后,通过量子信道发起通信以进行偏振光子传输。模拟实现结果证实,由于海森堡不确定性原理和不可克隆原理,在密钥生成过程中可以检测到窃听者的存在。窃听者猜对传输量子比特的概率为0.5,猜对偏振态的概率为0.25。在模拟迭代过程中,一个碱基不匹配过程在错误阈值为0.11%的情况下,丢弃了约50%的初始密钥位。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2f8/9413261/aa733b5aeb88/sensors-22-06284-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2f8/9413261/0e131f13e12e/sensors-22-06284-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2f8/9413261/55a2fa5b00c7/sensors-22-06284-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2f8/9413261/3c004655541c/sensors-22-06284-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2f8/9413261/7fedb7aef857/sensors-22-06284-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2f8/9413261/c904f47feb9a/sensors-22-06284-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2f8/9413261/bfd9d4fcae35/sensors-22-06284-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2f8/9413261/aa733b5aeb88/sensors-22-06284-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2f8/9413261/0e131f13e12e/sensors-22-06284-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2f8/9413261/55a2fa5b00c7/sensors-22-06284-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2f8/9413261/3c004655541c/sensors-22-06284-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2f8/9413261/7fedb7aef857/sensors-22-06284-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2f8/9413261/c904f47feb9a/sensors-22-06284-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2f8/9413261/bfd9d4fcae35/sensors-22-06284-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2f8/9413261/aa733b5aeb88/sensors-22-06284-g008.jpg

相似文献

1
Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3.量子密钥分发:使用Python3通过BB84协议进行建模与仿真。
Sensors (Basel). 2022 Aug 21;22(16):6284. doi: 10.3390/s22166284.
2
An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy.一种利用量子计算优越性解决物联网(IoT)中公共密钥加密问题的增强架构。
Sensors (Basel). 2022 Oct 25;22(21):8151. doi: 10.3390/s22218151.
3
Quantum man-in-the-middle attack on the calibration process of quantum key distribution.量子密钥分发校准过程中的量子中间人攻击。
Sci Rep. 2018 Mar 9;8(1):4283. doi: 10.1038/s41598-018-22700-3.
4
Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications.用于医疗应用的无线人体传感器网络中安全通信的增强型BB84量子密码协议。
Pers Ubiquitous Comput. 2023;27(3):875-885. doi: 10.1007/s00779-021-01546-z. Epub 2021 Mar 18.
5
Full-field implementation of a perfect eavesdropper on a quantum cryptography system.全场实现量子密码系统的完美窃听者。
Nat Commun. 2011 Jun 14;2:349. doi: 10.1038/ncomms1348.
6
Quantum key distribution with prepare-and-measure Bell test.基于制备与测量贝尔测试的量子密钥分发
Sci Rep. 2016 Oct 13;6:35032. doi: 10.1038/srep35032.
7
Practical quantum key distribution protocol without monitoring signal disturbance.实用的量子密钥分发协议,无需监控信号干扰。
Nature. 2014 May 22;509(7501):475-8. doi: 10.1038/nature13303.
8
How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack?在中间人攻击下,双向乒乓协议和LM05量子密钥分发协议的安全性如何?
Entropy (Basel). 2021 Jan 29;23(2):163. doi: 10.3390/e23020163.
9
Security of the Decoy-State BB84 Protocol with Imperfect State Preparation.基于不完美态制备的诱骗态BB84协议的安全性
Entropy (Basel). 2023 Nov 17;25(11):1556. doi: 10.3390/e25111556.
10
Unconditional security of a three state quantum key distribution protocol.一种三态量子密钥分发协议的无条件安全性。
Phys Rev Lett. 2005 Feb 4;94(4):040503. doi: 10.1103/PhysRevLett.94.040503. Epub 2005 Jan 31.

引用本文的文献

1
Securing Optical Networks Using Quantum-Secured Blockchain: An Overview.利用量子安全区块链保障光网络:概述。
Sensors (Basel). 2023 Jan 20;23(3):1228. doi: 10.3390/s23031228.

本文引用的文献

1
Nonclassical Attack on a Quantum Key Distribution System.对量子密钥分发系统的非经典攻击。
Entropy (Basel). 2021 Apr 23;23(5):509. doi: 10.3390/e23050509.
2
All-Optical Optimal N-to-M Quantum Cloning of Coherent States.相干态的全光最优N到M量子克隆
Phys Rev Lett. 2021 Feb 12;126(6):060503. doi: 10.1103/PhysRevLett.126.060503.
3
Practical Security Analysis of Reference Pulses for Continuous-Variable Quantum Key Distribution.连续变量量子密钥分发参考脉冲的实用安全性分析
Sci Rep. 2019 Dec 3;9(1):18155. doi: 10.1038/s41598-019-54249-0.
4
Security of subcarrier wave quantum key distribution against the collective beam-splitting attack.子载波量子密钥分发抵御集体分束攻击的安全性
Opt Express. 2018 Apr 30;26(9):11292-11308. doi: 10.1364/OE.26.011292.
5
Feasible attack on detector-device-independent quantum key distribution.对探测器无关量子密钥分发的可行攻击。
Sci Rep. 2017 Mar 27;7(1):449. doi: 10.1038/s41598-017-00531-y.
6
Creating a Superposition of Unknown Quantum States.创建未知量子态的叠加。
Phys Rev Lett. 2016 Mar 18;116(11):110403. doi: 10.1103/PhysRevLett.116.110403. Epub 2016 Mar 17.
7
Simple proof of security of the BB84 quantum key distribution protocol.BB84量子密钥分发协议安全性的简单证明。
Phys Rev Lett. 2000 Jul 10;85(2):441-4. doi: 10.1103/PhysRevLett.85.441.