CN108306733A - A kind of post-processing approach in discrete modulation continuous variable quantum key distribution - Google Patents

A kind of post-processing approach in discrete modulation continuous variable quantum key distribution Download PDF

Info

Publication number
CN108306733A
CN108306733A CN201810420871.7A CN201810420871A CN108306733A CN 108306733 A CN108306733 A CN 108306733A CN 201810420871 A CN201810420871 A CN 201810420871A CN 108306733 A CN108306733 A CN 108306733A
Authority
CN
China
Prior art keywords
key
sides
data
discrete
quantum
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810420871.7A
Other languages
Chinese (zh)
Inventor
张辰
张一辰
王翔宇
喻松
郭弘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN201810420871.7A priority Critical patent/CN108306733A/en
Publication of CN108306733A publication Critical patent/CN108306733A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of post-processing approach in discrete modulation continuous variable quantum key distribution, and steps are as follows for this method specific implementation:Step 1:Both sides carry out base selection according to the mode that quantum detects in discrete modulation continuous variable quantum key distribution system, and split data into two parts, and a part is used for parameter Estimation, and another part is used for cipher key-extraction.Step 2:Both sides estimate quantum channel feature, including transmission rate, excess noise equivalence using parameter Estimation partial data, and estimate the signal-to-noise ratio of quantum channel and the safe code check of system.Step 3:Both sides utilize key extraction portion data, according to data harmonization and private key amplification is carried out the characteristics of discrete modulating system, finally so that both sides share the key of one group of unconditional security.The post-processing algorithm in discrete modulation continuous variable quantum key distribution may be implemented in method in the present invention, and legitimate correspondence both sides is made to obtain the key of unconditional security.

Description

A kind of post-processing approach in discrete modulation continuous variable quantum key distribution
Technical field
The present invention relates to continuous variable quantum key distribution technical fields, one be mainly applied in discrete modulating system Kind post-processing approach.The post-processing of discrete modulating system may be implemented in this method, obtains the key of unconditional security.
Background technology
Continuous variable quantum key distribution (Continuous-variable Quantum Key Distribution, CV- QKD it is) to develop more mature technology in quantum information technology, safe key can be provided for encryption and decryption, has prodigious Application advantage.
Discrete modulation CV-QKD systems, which need to only prepare a small amount of coherent state, to be met the requirements, and complexity is relatively low.Discrete tune CV-QKD systems processed include mainly two parts, first, physical part, includes the preparation of quantum state, transmission and detection etc..When Data Post part includes mainly that base selects, parameter Estimation, data harmonization and private key amplification etc..After physical part, close The shared one group of initial key with correlation of method communicating pair.It is lost since quantum channel exists, noise, potential eavesdropping etc. is dry It disturbs, the initial key of both sides is inconsistent, and is unsafe.Therefore it needs by post-processing step both sides to be obtained Consistent and safe key.Make the shared one group of initial key with identical base of both sides first with base selection step;Then Estimate quantum channel feature, and computing system safety code check etc. using parametric estimation step;Next selection is suitable negotiates Algorithm and error correcting code realize that efficient data is coordinated;Unsafe information is removed finally by private key amplification procedure.By above-mentioned Post-processing step, both sides can obtain the key of one group of unconditional security.But the above process is for Gaussian modulation CV-QKD System, all do not need design a kind of in order to ensure the safety of final key suitable for discrete modulation CV-QKD systems It is suitble to the post-processing approach of discrete modulation CV-QKD systems, it is necessary for the safety and performance boost of system.
Invention content
The object of the present invention is to provide a kind of post-processing approach in discrete modulation continuous variable quantum key distribution. This method propose a kind of post-processing approach suitable for discrete modulation CV-QKD systems, and legitimate correspondence both sides can be made to obtain Obtain the key of one group of unconditional security.
The present invention realizes the above method by following steps:
Step 1:Both sides carry out base according to the mode that quantum detects in discrete modulation continuous variable quantum key distribution system Selection, and two parts are splitted data into, a part is used for parameter Estimation, and another part is used for cipher key-extraction.
Step 2:Both sides estimate that quantum channel feature, including transmission rate, excess are made an uproar using parameter Estimation partial data Sound is equivalent, and estimates the signal-to-noise ratio of quantum channel and the safe code check of system.
Step 3:Both sides utilize key extraction portion data, according to progress data harmonization and private the characteristics of discrete modulating system Key amplifies, final so that both sides share the key of one group of unconditional security.
Step 1 is as follows:
Step 1A:Both sides carry out base according to the mode that quantum detects in discrete modulation continuous variable quantum key distribution system Selection.If using zero-difference detection, then the one of component of receiving terminal random measurement discloses measurement base, transmitting terminal Preserve the data of identical measurement base.If using heterodyne detection, both sides preserve all data.It should be noted that due to being Discrete modulating system, so the discrete Gaussian Profile of end data obedience, i.e. data discrete are sent, but envelope Gaussian distributed;
Step 1B:Data after both sides select base are randomly divided into two parts, and a part is used for parameter Estimation, another part For cipher key-extraction.Usual two parts ratio data is one to one, and actual ratio needs to be obtained according to systematic parameter estimation.
Step 2 is as follows:
Step 2A:Both sides estimate that quantum channel feature, including transmission rate, excess are made an uproar using parameter Estimation partial data Sound is equivalent;
Step 2B:Signal variance, noise side are further calculated out using transmission rate, the excess noise etc. that estimate Difference, the signal-to-noise ratio etc. of quantum channel, then selects suitable error correcting code accordingly, row decoding of going forward side by side initialization etc.;
Step 2C:According to parameter estimation result and discrete modulation format, corresponding safe code check computational methods are selected, Further estimate the safe code check of discrete modulating system.In order to ensure the physical security of system, need to consider limited code length Etc. factors influence.
Step 3 is as follows:
Step 3A:Both sides utilize key extraction portion data, and select association according to the signal-to-noise ratio equivalence that parameter Estimation obtains Quotient's method.Generally for high s/n ratio system, slice is selected to coordinate.For low signal-to-noise ratio system, multidimensional is selected to negotiate;
Step 3B:Both sides quantify or rotate to key extraction portion data using selected machinery of consultation so that Both sides can carry out error correction using classical channel coding technology;
Step 3C:According to parameter estimation result, mainly quantum channel signal-to-noise ratio, suitable error correcting code is selected.Then sharp It is compiled code with this error correcting code;
Step 3D:Key after judging successfully error correction carries out error checking, and key is after further confirming that both sides' error correction It is no consistent;
Under normal conditions, the data harmonization part in post-processing include cipher key-extraction data negotiation (quantization, rotation etc.), Error correction and error checking etc..
Step 3E:Private key amplification is carried out to key after the error correction by error checking, obtains final security key.In private When key amplifies, in order to ensure security of system, the influence of limited code length etc. is also considered.
Compared with prior art, advantage of the invention is that:
Existing post-processing algorithm is based on Gaussian modulation CV-QKD systems, and the method in the present invention is according to discrete modulation The characteristics of system, realizes the post-processing algorithm of discrete modulation.And actual conditions are considered, such as limited code length etc., it is ensured that The safety of key.The system that different signal-to-noise ratio can also be applicable in is selected suitable machinery of consultation and is entangled by actual conditions Error code realizes that efficient data is coordinated.
Description of the drawings
Fig. 1 is discrete modulation CV-QKD system post-processing algorithms flow chart (forward direction is coordinated)
Specific implementation mode
The method that citing illustrates the present invention below.The present invention provides a kind of close for discrete modulation continuous variable quantum Post-processing approach in key distribution, by taking forward direction is coordinated as an example, specific implementation mode is as follows:
Legitimate correspondence both sides carry out base selection according to protocol information used in discrete modulation CV-QKD systems.If receiving terminal Using zero-difference detection, then it preserves the detection data of corresponding measurement base, and records measurement base used, then by measurement base public affairs It opens, transmitting terminal preserves the data of same base.If receiving terminal uses heterodyne detection, both sides to preserve all original numbers According to.
After completing base selection step, primary data is divided into two parts by both sides, and a part carries out parameter Estimation, another portion Divide and carries out cipher key-extraction.What parametric estimation step was mainly estimated is the transmission rate of quantum channel, and excess noise is equivalent, is based on The above results estimate transmitting terminal signal variance, noise variance, the signal-to-noise ratio of channel and the safe code check of system etc., wherein estimating When counting the safe code check of discrete modulating system, need to select corresponding computational methods according to different discrete modulation formats.In parameter In estimation procedure, in order to ensure the safety of system, the influence for considering the factors such as limited code length is needed.
Next, both sides are according to the suitable machinery of consultation of the selections such as the signal-to-noise ratio of quantum channel.For high s/n ratio system, Generally use slice negotiation algorithms.Both sides are according to parameter estimation result and discrete modulation CV-QKD systematic parameters etc., selected amount Change digit, calculate optimum quantization section, suitable error correcting code is selected to carry out quantization encoding, hierarchical decoder etc..For low signal-to-noise ratio System, generally use multidimensional negotiation algorithm.Both sides select the dimension that multidimensional is negotiated, and are then grouped normalization respectively, send End randomly generates binary system random number, and calculates mapping relations, and receiving terminal carries out data rotation with same mapping relations.It connects down It selects suitable error correcting code to be compiled code, obtains consistent key.Two kinds of negotiation algorithms are required for after error correction completion Whether key still has error code after further confirming that error correction, therefore also needs to carry out error checking.
After key is by error checking after the error correction of both sides, although key is consistent, potential listener-in may slap Hold which part information, it is therefore desirable to by private key amplification procedure, compress key, remove unsafe information, to obtain without item The key of part safety.This process is realized by universal hash function.When executing private key amplification procedure, also need to consider The influence of the factors such as limited code length.
By examples detailed above, the last handling process how present invention realizes discrete modulation CV-QKD systems is described in detail.
The invention is not limited in examples detailed above, every any type of deformation made within the scope of the claims or Modification, all belongs to the scope of protection of the present invention.

Claims (4)

1. a kind of post-processing approach in discrete modulation continuous variable quantum key distribution includes the following steps:
Step 1:Both sides carry out base selection according to the mode that quantum detects in discrete modulation continuous variable quantum key distribution system, And two parts are splitted data into, a part is used for parameter Estimation, and another part is used for cipher key-extraction;
Step 2:Both sides utilize parameter Estimation partial data estimation quantum channel feature, including transmission rate, excess noise etc. Value, and estimate the signal-to-noise ratio of quantum channel and the safe code check of system;
Step 3:Both sides utilize key extraction portion data, are put according to progress data harmonization and private key the characteristics of discrete modulating system Greatly, finally so that both sides share the key of one group of unconditional security.
2. a kind of post-processing approach in discrete modulation continuous variable quantum key distribution according to claim 1, Step 1 is as follows:
Step 1A:Both sides carry out base choosing according to the mode that quantum detects in discrete modulation continuous variable quantum key distribution system It selects.If using zero-difference detection, then the one of component of receiving terminal random measurement discloses measurement base, and transmitting terminal is protected Deposit the data of identical measurement base.If using heterodyne detection, both sides preserve all data.It should be noted that due to be from Modulating system is dissipated, so the discrete Gaussian Profile of end data obedience, i.e. data discrete are sent, but envelope Gaussian distributed;
Step 1B:Data after both sides select base are randomly divided into two parts, and a part is used for parameter Estimation, and another part is used for Cipher key-extraction.Usual two parts ratio data is one to one, and actual ratio needs to be obtained according to systematic parameter estimation.
3. a kind of post-processing approach in discrete modulation continuous variable quantum key distribution according to claim 1, Step 2 is as follows:
Step 2A:Both sides utilize parameter Estimation partial data estimation quantum channel feature, including transmission rate, excess noise etc. Value;
Step 2B:Signal variance, noise variance, amount are further calculated out using transmission rate, the excess noise etc. that estimate The signal-to-noise ratio etc. of subchannel, then selects suitable error correcting code accordingly, row decoding of going forward side by side initialization etc.;
Step 2C:According to parameter estimation result and discrete modulation format, corresponding safe code check computational methods are selected, into one Step estimates the safe code check of discrete modulating system, in order to ensure the physical security of system, need to consider limited code length etc. because The influence of element.
4. a kind of post-processing approach in discrete modulation continuous variable quantum key distribution according to claim 1, Step 3 is as follows:
Step 3A:Both sides utilize key extraction portion data, and select negotiation side according to the signal-to-noise ratio equivalence that parameter Estimation obtains Method.Generally for high s/n ratio system, slice is selected to coordinate.For low signal-to-noise ratio system, multidimensional is selected to negotiate;
Step 3B:Both sides quantify or rotate to key extraction portion data using selected machinery of consultation so that both sides Error correction can be carried out using classical channel coding technology;
Step 3C:According to parameter estimation result, mainly quantum channel signal-to-noise ratio, suitable error correcting code is selected.Then this is utilized Error correcting code is compiled code;
Step 3D:Key after judging successfully error correction carries out error checking, further confirm that after both sides' error correction key whether one It causes;
Under normal conditions, the data harmonization part in post-processing includes negotiation (quantization, rotation etc.), the error correction of cipher key-extraction data With error checking etc..
Step 3E:Private key amplification is carried out to key after the error correction by error checking, obtains final security key.It is put in private key When big, in order to ensure security of system, the influence of limited code length etc. is also considered.
CN201810420871.7A 2018-05-04 2018-05-04 A kind of post-processing approach in discrete modulation continuous variable quantum key distribution Pending CN108306733A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810420871.7A CN108306733A (en) 2018-05-04 2018-05-04 A kind of post-processing approach in discrete modulation continuous variable quantum key distribution

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810420871.7A CN108306733A (en) 2018-05-04 2018-05-04 A kind of post-processing approach in discrete modulation continuous variable quantum key distribution

Publications (1)

Publication Number Publication Date
CN108306733A true CN108306733A (en) 2018-07-20

Family

ID=62846640

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810420871.7A Pending CN108306733A (en) 2018-05-04 2018-05-04 A kind of post-processing approach in discrete modulation continuous variable quantum key distribution

Country Status (1)

Country Link
CN (1) CN108306733A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108599949A (en) * 2018-08-06 2018-09-28 山西大学 A kind of security key rate calculations method and system
CN111464300A (en) * 2020-04-14 2020-07-28 山西大学 High-speed post-processing method suitable for continuous variable quantum key distribution
CN111901113A (en) * 2020-08-12 2020-11-06 中国科学技术大学 Continuous variable quantum key distribution method based on Gaussian dense modulation
CN112398650A (en) * 2020-11-20 2021-02-23 中南大学 Performance improvement method of continuous variable quantum key distribution system based on AO unit discrete modulation
CN112449748A (en) * 2018-09-14 2021-03-05 杜塞尔多夫华为技术有限公司 Quantum key distribution system and method
CN112886970A (en) * 2021-01-11 2021-06-01 哈尔滨工业大学 Negotiation method for continuous variable quantum key distribution
CN114389805A (en) * 2021-12-31 2022-04-22 广东国腾量子科技有限公司 Post-processing method of CV-QKD based on Gaussian modulation coherent state
CN114884658A (en) * 2022-05-13 2022-08-09 中国电子科技集团公司第三十研究所 Encrypted data negotiation method and device for discrete modulation CV-QKD and data post-processing system
WO2024027375A1 (en) * 2022-08-01 2024-02-08 华为技术有限公司 Quantum key distribution method and apparatus, and quantum key distribution system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103402200A (en) * 2013-07-11 2013-11-20 北京邮电大学 Secret key generation method based on wireless channel characteristics in frequency division duplex system
US20140136462A1 (en) * 2012-11-14 2014-05-15 Repsol System, method and program product for automatically supplying missing parameters for matching new members of a population with analogous members
CN106100835A (en) * 2016-07-19 2016-11-09 北京邮电大学 A kind of Highly precise FFT method in continuous variable quantum key distribution and high post processing data user rate method
CN106254072A (en) * 2016-10-18 2016-12-21 清华大学 A kind of quantum key distribution system and method
CN106850057A (en) * 2017-01-18 2017-06-13 北京邮电大学 A kind of continuous variable quantum key distribution detection system without Polarization Controller

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140136462A1 (en) * 2012-11-14 2014-05-15 Repsol System, method and program product for automatically supplying missing parameters for matching new members of a population with analogous members
CN103402200A (en) * 2013-07-11 2013-11-20 北京邮电大学 Secret key generation method based on wireless channel characteristics in frequency division duplex system
CN106100835A (en) * 2016-07-19 2016-11-09 北京邮电大学 A kind of Highly precise FFT method in continuous variable quantum key distribution and high post processing data user rate method
CN106254072A (en) * 2016-10-18 2016-12-21 清华大学 A kind of quantum key distribution system and method
CN106850057A (en) * 2017-01-18 2017-06-13 北京邮电大学 A kind of continuous variable quantum key distribution detection system without Polarization Controller

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
黄鹏: "连续变量量子密钥分发实际安全性", 《信息网络安全》 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108599949B (en) * 2018-08-06 2020-06-12 山西大学 Method and system for calculating security key rate
CN108599949A (en) * 2018-08-06 2018-09-28 山西大学 A kind of security key rate calculations method and system
CN112449748B (en) * 2018-09-14 2024-05-03 杜塞尔多夫华为技术有限公司 Quantum key distribution system and method
CN112449748A (en) * 2018-09-14 2021-03-05 杜塞尔多夫华为技术有限公司 Quantum key distribution system and method
CN111464300A (en) * 2020-04-14 2020-07-28 山西大学 High-speed post-processing method suitable for continuous variable quantum key distribution
CN111901113A (en) * 2020-08-12 2020-11-06 中国科学技术大学 Continuous variable quantum key distribution method based on Gaussian dense modulation
CN111901113B (en) * 2020-08-12 2021-08-13 中国科学技术大学 Continuous variable quantum key distribution method based on Gaussian dense modulation
CN112398650A (en) * 2020-11-20 2021-02-23 中南大学 Performance improvement method of continuous variable quantum key distribution system based on AO unit discrete modulation
CN112398650B (en) * 2020-11-20 2021-08-17 中南大学 Performance improvement method of continuous variable quantum key distribution system based on AO unit discrete modulation
CN112886970A (en) * 2021-01-11 2021-06-01 哈尔滨工业大学 Negotiation method for continuous variable quantum key distribution
CN112886970B (en) * 2021-01-11 2022-07-01 哈尔滨工业大学 Negotiation method for continuous variable quantum key distribution
CN114389805A (en) * 2021-12-31 2022-04-22 广东国腾量子科技有限公司 Post-processing method of CV-QKD based on Gaussian modulation coherent state
CN114884658A (en) * 2022-05-13 2022-08-09 中国电子科技集团公司第三十研究所 Encrypted data negotiation method and device for discrete modulation CV-QKD and data post-processing system
CN114884658B (en) * 2022-05-13 2024-04-02 中国电子科技集团公司第三十研究所 Encryption data negotiation method, device and data post-processing system of discrete modulation CV-QKD
WO2024027375A1 (en) * 2022-08-01 2024-02-08 华为技术有限公司 Quantum key distribution method and apparatus, and quantum key distribution system

Similar Documents

Publication Publication Date Title
CN108306733A (en) A kind of post-processing approach in discrete modulation continuous variable quantum key distribution
US20180054299A1 (en) Encrypting and decrypting information
US20110126011A1 (en) Method of user-authenticated quantum key distribution
US9467284B2 (en) Transmitter, receiver, quantum key distribution (QKD) system and quantum key distribution method
KR20150031245A (en) Secure communication
US9794067B2 (en) Method for active content fingerprinting
CN108616356A (en) A kind of multidimensional machinery of consultation in discrete modulation continuous variable quantum key distribution
CN111026359B (en) Method and device for judging numerical range of private data in multi-party combination manner
Hamghalam et al. Geometric modelling of the wavelet coefficients for image watermarking using optimum detector
Abed et al. Secure medical image steganography method based on pixels variance value and eight neighbors
US20150381365A1 (en) Network device configured to derive a shared key
Hosny et al. Robust image hashing using exact Gaussian–Hermite moments
Umamageswari et al. Security in medical image communication with arnold's cat map method and reversible watermarking
FR3021777A1 (en) SECURE DISTRIBUTED STORAGE BY MULTIPARTITE CALCULATION
Huang et al. High-quality visually secure image cryptosystem using improved Chebyshev map and 2D compressive sensing model
CN108650083A (en) A kind of slice machineries of consultation in discrete modulation continuous variable quantum key distribution
Al-Saggaf Secure Method for Combining Cryptography with Iris Biometrics.
Vinoth Kumar et al. Encrypted separable reversible watermarking with authentication and error correction
Duy et al. An intelligent learning-based watermarking scheme for outsourced biomedical time series data
CN109547441B (en) Method for encrypting longitude and latitude coordinates
Yu et al. A channel coding information hiding algorithm for images based on uniform cyclic shift
Shin et al. Content based image authentication using HOG feature descriptor
Chang et al. Distortion‐free secret image sharing method with two meaningful shadows
Tabatabaei et al. AACI: The mechanism for approximate authentication and correction of images
CN108199839A (en) A kind of method that parameter Estimation and cipher key-extraction are carried out with all data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180720