有限长诱骗态量子密钥分配安全性研究
发布时间:2018-04-26 01:27
本文选题:量子密钥分配 + 密钥有限长 ; 参考:《解放军信息工程大学》2014年博士论文
【摘要】:量子密钥分配(QKD)作为现代密码学与量子力学结合的产物,已经成为一种走向实用化的信息安全保障技术。QKD系统能够使通信双方可以利用公开信道协商产生一致的秘密信息,这些秘密信息通常作为双方保密通信的密钥,密钥是否安全将关系到双方保密通信的安全,因此QKD系统产生的密钥信息的安全自然成为人们最为关注的核心问题。理想条件下QKD系统已经被证明是理论上安全的,但是实际QKD系统与理想QKD系统不可能完全一致,存在诸如非单光子光源、有限长密钥、非精确调制量子态等非理想因素,已有研究表明,这些非理想因素直接对实际QKD系统的安全性构成了威胁,研究非理想条件下QKD的实际安全性已成为QKD系统实用化过程中必须解决的关键问题。诱骗态方法可以有效解决实际光源多光子脉冲带来的安全隐患问题,因此实际QKD系统通常采用诱骗态方法来进行光源调制。实际诱骗态QKD系统在一定运行时间内的光脉冲数及数据处理长度往往是有限的,其产生的密钥也是有限长的,针对理想QKD系统的安全性界限不再适用于有限长诱骗态QKD系统,因此研究密钥有限长条件下诱骗态QKD系统的安全性界限是实际安全性分析需要解决的重点问题。本文较系统地研究了有限长诱骗态QKD系统的安全性,主要解决了有限长诱骗态QKD系统在认证密钥更新、非理想参量下转换光源、非平衡基矢选取等实际条件下的安全性界限度量问题,主要完成的工作包括以下几个方面:1、有限长量子密钥分配认证安全性研究。针对密钥信息泄漏对实际QKD系统安全性的影响问题,基于保密放大分析方法,给出了密钥有限长条件下认证密钥更新的信息泄漏刻画方法,分析了认证密钥信息泄漏对实际QKD系统认证安全性带来的影响。进一步围绕有限长认证密钥在密钥更新过程中安全强度递减的问题,提出了初始认证密钥的使用寿命分析模型,给出了有限长初始认证密钥使用寿命的计算表达式,有效度量了密钥更新过程中有限长认证密钥的安全强度变化。2、相干攻击下被动诱骗态量子密钥分配有限长分析。参量下转换光源是一种目前技术实现比较成熟的实际光源,基于参量下转换光源的实际QKD系统通常采用被动诱骗态方案,但已有的密钥有限长安全性界限局限于联合攻击环境。本文针对基于参量下转换光源的QKD系统,提出了相干攻击环境下被动诱骗态方案的有限长分析方法,给出了密钥有限长条件下单光子计数率和误码率的计算表达式,得到了被动诱骗态QKD在有限长条件下严格的安全密钥率界限。数值分析表明,在密钥有限长条件下,参量下转换光源被动诱骗态QKD可以达到较优的实现性能,系统高工作频率下的最远安全传输距离能够超过弱相干光源主动诱骗态QKD。3、参量下转换光源测量无关QKD诱骗态方案设计与分析。测量无关量子密钥分配(MDI-QKD)能够克服探测器非理想带来的安全漏洞问题,比传统QKD具有更好的实际安全性,针对弱相干态光源MDI-QKD的相关研究比较成熟,而基于参量下转换光源MDI-QKD的安全性及实现性能还有待进一步研究。本文提出了两种MDI-QKD诱骗态方案:被动二强度诱骗态方案和主被动三强度诱骗态方案,给出了相应的参数估计方法并得到了密钥有限长条件下主被动三强度诱骗态方案的安全性界限。进一步给出了MDI-QKD使用相位随机化参量下转换光源时平均计数率和误码率的计算公式,在此基础上比较了其采用不同诱骗态方案时的实现性能,并分析了密钥有限长对主被动三强度诱骗态方案安全性的影响。数值分析表明,参量下转换光源MDI-QKD的安全密钥率和最大传输距离要优于弱相干光源MDI-QKD,主被动三强度诱骗态方案的实现性能要优于主动三强度诱骗态方案,有限长统计涨落会显著影响参量下转换光源MDI-QKD的实现性能。4、有限长测量无关QKD非平衡基矢诱骗态方案设计与分析。密钥有限长引起的统计涨落显著影响MDI-QKD的实现性能,如何提高有限长MDI-QKD的实用性能是目前人们最为关注的实际问题。本文提出了一种适用于MDI-QKD的非平衡基矢诱骗态协议,在可组合安全框架内,给出了密钥有限长条件下单光子计数、单光子误码、相位误码的计算方法和安全密钥率界限,该协议最大程度地利用了不同光强组合下的Bell态测量成功计数,并通过控制基矢选择概率使有限长统计涨落下的安全密钥率达到最优,从而有效提升了MDI-QKD的安全密钥生成效率,延长了密钥安全传输距离。数值分析表明,使用相同实验参数并且在参数部分最优选取的条件下,该协议的性能要优于现有结果,在总脉冲数达到1015量级时,密钥安全传输光纤距离可以达到168公里。
[Abstract]:As a product of the combination of modern cryptography and quantum mechanics, quantum key distribution (QKD) has become a practical information security guarantee technology.QKD system that enables the two parties to produce unanimous secret information through open channel negotiation. These secret information often acts as the key to the two parties' secret communication, and the key is safe. All will be related to the security of the secure communication between the two parties. Therefore, the security of the key information produced by the QKD system becomes the core problem that people pay most attention to. Under ideal conditions, the QKD system has been proved to be theoretically safe, but the actual QKD system is not exactly the same as the ideal QKD system, and there is a finite length density, such as a non single photon source. The research shows that these non ideal factors directly pose a threat to the security of the actual QKD system, and the real security of QKD has become the key problem that must be solved in the practical process of the QKD system. The decoy state method can effectively solve the multi light source of the actual light source. In the actual QKD system, the actual decoy state method is usually used to modulate the light source. The actual decoy state QKD system is often limited in the number of light pulses and the length of the data processing in a certain running time. The key is also limited, and it is no longer applicable to the security limit of the ideal QKD system. In the finite long decoy state QKD system, the security limit of the decoy state QKD system under the limited long key condition is the key problem to be solved in the actual security analysis. This paper systematically studies the security of the limited long decoy state QKD system, and mainly solves the authentication key update and the non ideal parameter of the finite long decoy state QKD system. The main tasks are as follows: 1, the security of finite long quantum key distribution authentication is studied. In view of the influence of the key information leakage on the security of the actual QKD system, the secret magnification analysis method is given. The information leakage depicting method of authenticated key update under the limited long key condition is used to analyze the impact of authentication key information leakage on the authentication security of the actual QKD system. The service life analysis model of the initial authentication key is proposed, and the analysis model of the initial authentication key is presented. The calculation expression of the lifetime of the finite long initial authentication key is used to effectively measure the security intensity change of the finite length authentication key in the key update process.2, the finite length analysis of the passive decoy state quantum key distribution under the coherent attack. The parametric down conversion light source is a real light source with the mature technology now, based on the parameter The passive decoy state scheme is usually used in the actual QKD system of the converted light source, but the security limit of the existing key limited length is limited to the joint attack environment. In this paper, a finite length analysis method for the passive decoy state scheme in the coherent attack environment is proposed for the QKD system based on the parametric down conversion light source, and the single key length condition is given. The calculation expression of photon counting rate and bit error rate is used to obtain the strict security key rate limit of the passive decoy state QKD under the finite length condition. The numerical analysis shows that the passive decoy state QKD of the parametric down light source can achieve superior performance under the limited long key condition, and the farthest safe transmission distance can be obtained at the high working frequency of the system. More than the weak coherent light source active decoy state QKD.3, the parametric down conversion light measurement unrelated QKD decoy state scheme design and analysis. Measurement independent quantum key distribution (MDI-QKD) can overcome the non ideal security vulnerabilities caused by the detector, and have better practical security than the traditional QKD, related research on the weak coherent state light source MDI-QKD The security and performance of MDI-QKD based on parametric down conversion light source still need further study. Two MDI-QKD decoy schemes, passive two intensity decoy state scheme and passive three intensity decoy state scheme, are proposed in this paper. The corresponding parameter estimation method is given and the main and passive three are obtained under the key finite length condition. The security limit of the intensity decoy state scheme is given. The calculation formula of the average counting rate and bit error rate of MDI-QKD using the phase randomization of the down light source is given. On this basis, the implementation performance of the scheme with different decoy states is compared, and the security of the main and passive three intensity decoy state scheme is analyzed. The numerical analysis shows that the security key rate and the maximum transmission distance of the parametric down conversion light source MDI-QKD are superior to the weak coherent light source MDI-QKD. The implementation performance of the passive three intensity decoy state scheme is better than the active three intensity decoy state scheme, and the finite length statistical fluctuation will significantly improve the performance of the MDI-QKD of the parametric down conversion light source. The design and analysis of the finite length measurement irrelevant QKD nonequilibrium base vector decoy state scheme. The statistical fluctuation caused by the key limited length significantly affects the performance of the MDI-QKD. How to improve the practical performance of the finite length MDI-QKD is the most concerned practical problem at present. This paper proposes a non balanced base vector decoy protocol suitable for MDI-QKD. In the combinable security framework, the calculation method of single photon counting, single photon error code, phase error code and security key rate limit are given under the limited long key condition. This protocol maximally uses the Bell state measurement under different light intensity combinations and controls the safety of the finite length statistical fluctuation by controlling the selection probability of the base vector. The key rate is optimal, which effectively improves the security key generation efficiency of MDI-QKD and prolongs the key security transmission distance. The numerical analysis shows that the performance of the protocol is better than the existing results with the same experimental parameters and the optimal selection of the parameters. The key is safe to transmit when the total number of pulses is up to 1015. The fiber distance can reach 168 kilometers.
【学位授予单位】:解放军信息工程大学
【学位级别】:博士
【学位授予年份】:2014
【分类号】:TN918.4
【参考文献】
中国期刊全文数据库 前2条
1 周淳;鲍皖苏;付向群;;基于态关联性不完美的诱骗态量子密钥分配[J];电子学报;2012年10期
2 ;Decoy-state quantum key distribution for the heralded pair coherent state photon source with intensity fluctuations[J];Science China(Information Sciences);2010年12期
中国硕士学位论文全文数据库 前1条
1 周淳;量子密钥分配的安全性研究[D];解放军信息工程大学;2011年
,本文编号:1803882
本文链接:https://www.wllwen.com/kejilunwen/wltx/1803882.html