Font Size: a A A

Research On The Authenticated Quantum Key Distribution Protocol Based On Single Photon Interference

Posted on:2022-04-10Degree:MasterType:Thesis
Country:ChinaCandidate:F HouFull Text:PDF
GTID:2480306536972039Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The development of quantum computing has made it possible to rapidly increase computing power,which has brought unprecedented challenges to classical cryptography.Therefore,people began to research new types of crypto-system that can resist quantum computing,such as quantum cryptography,whose security is dependent on the laws of physics.At present,scholars have achieved fruitful research results in various fields of quantum cryptography.Among them,Quantum key distribution(QKD),which can theoretically realize information-theoretic security,is more mature and closer to practical applications.It is worth noting that one of the important prerequisites for QKD to realize information-theoretic security is that the identity of the communication participants is reliable.The reliability of the participant's identity can be achieved through classical identity authentication protocols based on symmetric cryptography,or the identity authentication process embedded in the QKD protocols,that is,authenticated QKD protocols.This thesis mainly researches how to implement authenticated QKD protocols in a quantum communication system based on single-photon interference.The research includes the security analysis of the recently proposed quantum identity authentication(QIA)protocols based on single photon interference when applied to QKD,and how QIA protocols ensure the information-theoretic security of QKD protocols.This thesis includes the following work: First,the basic concepts of quantum mechanics and the QKD protocol(GV95 protocol)and the QIA protocol(LGXHLX protocol)based on the single-photon interference system are introduced.Subsequently,we analyze whether the LGXHLX protocol can provide a reliable identity authentication for the GV95 protocol during extending the authentication keys.However,we find that there are serious security risks during this process.Then we further analyze the reasons for the risks and research possible solutions.On this basis,we propose three authenticated QKD protocols based on single-photon interference quantum communication systems,named authenticated QKD protocol based on coil modulation and non-orthogonal state,authenticated QKD protocol based on timeliness,and authenticated QKD protocol based on coil modulation and orthogonal state.In addition,we prove the information-theoretic security of these protocols.The first two protocols can be seen as improved protocols of the LGXHLX protocol.The quantum communication equipment required by the two protocols is different,and the performance requirements of the communication system are also different.In application,participants can choose according to actual conditions.In the third protocol,we propose a new authentication scheme,and based on this scheme,we design a simpler and more efficient authenticated QKD protocol compared to the first protocol.Furthermore,the new scheme retains the characteristic of using one set of orthogonal-base in the GV95 protocol,and makes minimal changes to the original quantum communication system based on single-photon interference.
Keywords/Search Tags:quantum computing, quantum cryptography, quantum key distribution protocol, quantum identity authentication protocol, information-theoretic security
PDF Full Text Request
Related items