首页 | 本学科首页   官方微博 | 高级检索  
     

基于挑战-应答机制的量子密钥分发协议
引用本文:王海红,赵生妹,巩龙延.基于挑战-应答机制的量子密钥分发协议[J].量子电子学报,2015,32(4):452-458.
作者姓名:王海红  赵生妹  巩龙延
作者单位:1 南京邮电大学信息物理研究中心, 应用物理系,江苏 南京 210003; 2 南京邮电大学信号与信息处理研究院,江苏 南京 210003
基金项目:国家自然科学基金( 61271238 ),江苏省青蓝工程基金,南京邮电大学校基金( XK0070913126 )
摘    要:基于BB84协议,利用挑战-应答机制,提出了一种量子密钥分发协议。发送方Alice和接收方Bob通过安全信道共享三个不同的Hash函数( , 和 ),以及随机比特串 。在每次密钥分发时,Alice产生随机比特串 (挑战信息)和 (密钥),结合 和 ,基于BB84协议产生光子串 ;Alice将 和 发送给Bob,Bob接收到对应的 和光子串 ;Bob利用 ,结合 和 ,基于BB84协议对光子串 进行测量得到 。理想情况下共享密钥 。另外,Bob利用 , , 及 产生应答序列 ;Alice和Bob利用各自拥有的序列及 分别产生序列 和 ,并对各自的 做更新。在密钥分发过程中光子的利用率为百分百,该协议既有BB84协议类似的安全性,又有单向身份认证功能。

关 键 词:量子光学  量子密钥分发协议  挑战-应答机制  BB84协议  光子利用率  身份认证
收稿时间:2014-09-25
修稿时间:2014-11-27

A quantum key distribution protocol based on challenge-response mechanism
WANG Hai-hong,ZHAO Sheng-mei,GONG Long-yan.A quantum key distribution protocol based on challenge-response mechanism[J].Chinese Journal of Quantum Electronics,2015,32(4):452-458.
Authors:WANG Hai-hong  ZHAO Sheng-mei  GONG Long-yan
Affiliation:1 Research Center of Information Physics, Department of Applied Physics , Nanjing University of Posts and Telecommunications, Nanjing 210003,China;  2 Institute of Signal Processing and Transmission, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
Abstract:A quantum key distribution protocol based on BB84 protocol and a challenge-response mechanism is proposed. Through a secure channel, Alice and Bob have pre-shared three different Hash functions (denoted by , and ) and a random bit string . Every time, Alice first generates two random bit strings (challenge) and (key), then prepares a photon sequence based on BB84 protocol using , , and . Alice sends and to Bob and Bob receives the corresponding and . Bob measures according to BB84 protocol and gets corresponding . In the ideal case, should be the same as . Bob uses , , and to generate (response). At last, Alice and Bob use their own sequences and to generate and respectively, then they update their own . In our protocol, the utilization rate of photons is 100. The security of the protocol is similar as that of the BB84 protocol. Furthermore, it is a one-way identification authentication protocol.
Keywords:quantum optics  quantum key distribution protocol  challenge-response mechanism  BB84 protocol  utilization rate of photons  identification authentication
本文献已被 万方数据 等数据库收录!
点击此处可从《量子电子学报》浏览原始摘要信息
点击此处可从《量子电子学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号