J4 ›› 2010, Vol. 27 ›› Issue (1): 40-45.

• 量子光学 • 上一篇    下一篇

一种基于光子偏振旋转的量子身份认证方案

季思1,3,4 谭政1,3,4  孙献平1,2,3 罗军1,3   

  1. 1 中国科学院武汉物理与数学研究所波谱与原子分子物理国家重点实验室,武汉 430071; 
    2 武汉光电国家实验室, 武汉 430074; 
    3 中国科学院冷原子物理中心,武汉 430071; 
    4 中国科学院研究生院, 北京 100080
  • 出版日期:2010-01-28 发布日期:2009-12-30
  • 通讯作者: 孙献平(1954~) 男,高级工程师,硕士生导师,主要从事量子通信、激光增强原子与原子核极化方面的研究。 E-mail:xpsun@wipm.ac.cn
  • 作者简介:季思(1984~) 男,湖北武汉人,硕士研究生,主要从事量子信息方面的研究。E-mail: jisi@wipm.ac.cn
  • 基金资助:

    国家自然科学基金(10674155), 武汉光电国家实验室基金(P080002)资助

A quantum identity authentication protocol based on polarization rotation

JI Si1,3,4, TAN Zheng1,3,4, SUN Xian-Ping1,2,3, LUO Jun1,3   

  1. 1 State Key Laboratory of Magnetic Resonance and Atomic and Molecular Physics, Wuhan Institute of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071, China ; 
    2 Wuhan National Laboratory for Optoelectronics; Wuhan 430074; China; 
    3 Center for Cold Atom Physics, Chinese Academy of Science, Wuhan 430071, China; 
    4 Graduate School, Chinese Academy of Sciences, Beijing 100080, China
  • Published:2010-01-28 Online:2009-12-30

摘要:

实际的量子密钥分发过程中,传输损耗和探测器的效率都直接影响密钥的产生效率。量子身份认证需要通信双方保证认证信息的完整性。针对以上问题,提出了一种基于光子偏振旋转的量子身份认证协议,利用对认证信息的重复编码解决传输损耗问题。考虑到协议的安全性,该协议在相邻的有效认证量子态间编入随机态。安全性分析表明该协议可成功抵御截取重发攻击以及光子数劈裂攻击。在此基础上,设计了现有技术条件下可操作的认证系统方案,考虑了传输损耗和探测效率,具有实用意义。

关键词: 量子光学, 量子身份认证, 偏振旋转, 重复编码, 传输损耗

Abstract:

In the practical distribution process of quantum key, the transmission loss and the efficiency of detectors have a direct impact on the efficiency of key generated. The quantum identity authentication requires both communication sides to ensure the integrity of the authentication information. Considering the problems above, a quantum identity authentication protocol based on photon polarization rotation is proposed, in which repetition coding is used to solve the problem of transmission loss. In order to guarantee the security of protocol, random states are inserted into the adjacencies of the useful authentication quantum states. Security analysis shows that the protocol can successfully resist the intercept-resent attack and the beam-splitting attack. Furthermore, a useful authentication system practicable under present technical conditions is designed. It is helpful in applications that transmission loss and the detection efficiency are taken into consideration.

Key words: quantum optics, quantum identity authentication, polarization rotation, repetition coding, transmission loss