Font Size: a A A

Research On Two-Party Quantum Cryptography Protocols And Their Application In Quantum Networks

Posted on:2022-03-13Degree:MasterType:Thesis
Country:ChinaCandidate:Z S ZhouFull Text:PDF
GTID:2480306725481554Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The security of classical communication is based on the difficulty of solving large number problems,and with the increase of computer arithmetic power and the emergence of quantum computers,the security of classical communication is seriously threatened.Quantum communication technology,on the other hand,can fundamentally guarantee the unconditional security of communication.In the past 30 years,the research of quantum communication has achieved fruitful results both theoretically and experimentally.In this paper,we study quantum communication in two-party scenarios and quantum network communication in multiple scenarios respectively.The main contents are as follows:1)Based on measurement-device-independent and error estimation,two novel two-party quantum cryptography protocols,namely MDI-QBC protocol and MDI-PID protocol,are proposed to achieve the realistic security of these two protocols.Specifically,first of all,QBC protocols in the standard mode are not able to achieve unconditional security,while in our protocol,the realistic security of the protocol is achieved by introducing partial number-theoretic knowledge to make it not satisfies the requirement of perfect unilateral secure computation,in order to circumvent the no-go theorem.In the PID protocol,unconditional security is also guaranteed due to it is based on the characteristics of 2 out of 1 QOT.We have considered some attacking scenarios along with mathematical proofs for the above two protocols and believe that security can still be maintained.2)A concept of a server/client quantum self-organizing network is proposed,which solves quantum communication problems in some special scenarios and realizes multiuser data interaction in these scenarios.In particular,a plug and play(Plug & Play,PP)quantum key distribution protocol encoded in polarization method is used as the communication protocol,and the corresponding topological structure,protocols and nodes are designed,followed by a basic experimental scheme of key distribution for two-way communication and an experimental scheme of network access.Finally,we simulate and analyze the Trojan horse attack on two-way quantum communication,and propose a single detector approach for detecting the attack,and compare it with the photon number splitter detection,and find that single detector is not only more efficient in detection,but also cheaper and easier to deploy on a large scale.At the same time,we apply the proposed two-party quantum cryptographic protocol to a self-organizing quantum network and demonstrate that it is able to maintain security.
Keywords/Search Tags:Two-party Quantum Cryptographic Protocol, Measurement-device-independent, Quantum Self-organizing network, Trojan Horse Attack
PDF Full Text Request
Related items