-
半量子密钥分发允许一个全量子用户Alice和一个经典用户Bob共享一对由物理原理保障的安全密钥. 在半量子密钥分发被提出的同时其鲁棒性获得了证明, 随后半量子密钥分发系统的无条件安全性被理论验证. 2021年基于镜像协议的半量子密钥分发系统的可行性被实验验证. 然而, 可行性实验系统仍旧采用强衰减的激光脉冲, 已有文献证明, 半量子密钥分发系统在受到光子数分裂攻击时仍旧面临密钥比特泄露的风险, 因此, 在密钥分发过程中引入诱骗态并且进行有限码长分析, 可以进一步合理评估密钥分发的实际安全性. 本文基于四态协议的半量子密钥分发系统, 针对仅在发送端Alice处加入单诱骗态的模型, 利用Hoeffding不等式进行了有限码长情况的安全密钥长度分析, 进而求得安全密钥率公式, 其数值模拟结果表明, 当选择样本量大小为
$ {10}^{5} $ 时, 能够在近距离情况下获得$ {10}^{-4} $ bit/s安全密钥速率, 与渐近情况下的安全密钥率相近, 这对半量子密钥分发系统的实际应用具有非常重要的意义.-
关键词:
- 半量子密钥分发/
- 诱骗态/
- Hoeffding不等式/
- 有限码长
Semi-quantum key distribution allows a full quantum user Alice and a classical user Bob to share a pair of security keys guaranteed by physical principles. Semi-quantum key distribution is proposed while verifying its robustness. Subsequently, its unconditional security of semi-quantum key distribution system is verified theoretically. In 2021, the feasibility of semi-quantum key distribution system based on mirror protocol was verified experimentally. However, the feasibility experimental system still uses the laser pulse with strong attenuation. It has been proved in the literature that the semi-quantum key distribution system still encounters the risk of secret key leakage under photon number splitting attack. Therefore, the actual security of key distribution can be further reasonably evaluated by introducing the temptation state and conducting the finite-key analysis in the key distribution process. In this work, for the model of adding one-decoy state only to Alice at the sending based on a four state semi-quantum key distribution system, the length of the security key in the case of finite-key is analyzed by using Hoeffding inequality, and then the formula of the security key rate is obtained. It is found in the numerical simulation that when the sample size is$ {10}^{5} $ , the security key rate of$ {10}^{-4} $ , which is close to the security key rate of the asymptotic limits, can be obtained in the case of close range. It is very important for the practical application of semi-quantum key distribution system.[1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] [38] [39] [40] [41] [42] [43] [44] [45] [46] [47] [48] [49] [50] [51] [52] [53] [54] -
传输距离/km $ {\mu }_{1} $ $ {v}_{1} $ $ {v}_{2} $ 密钥率 0 0.68 0.48 0.07 0.001745822 5 0.68 0.48 0.07 0.000785235 10 0.68 0.48 0.07 0.000483058 15 0.68 0.48 0.07 0.000331894 20 0.68 0.48 0.07 0.000240990 25 0.68 0.48 0.07 0.000180301 30 0.68 0.48 0.08 0.000137404 35 0.68 0.48 0.08 0.000105438 40 0.68 0.49 0.09 0.000081846 45 0.68 0.49 0.10 0.000063533 50 0.68 0.49 0.10 0.000049545 -
[1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] [38] [39] [40] [41] [42] [43] [44] [45] [46] [47] [48] [49] [50] [51] [52] [53] [54]
计量
- 文章访问数:1684
- PDF下载量:67
- 被引次数:0