J4 ›› 2015, Vol. 32 ›› Issue (4): 452-458.

• 量子光学 • 上一篇    下一篇

基于挑战-应答机制的量子密钥分发协议

王海红,赵生妹,巩龙延   

  1. 1 南京邮电大学信息物理研究中心, 应用物理系,江苏 南京 210003; 
    2 南京邮电大学信号与信息处理研究院,江苏 南京 210003
  • 收稿日期:2014-09-25 修回日期:2014-11-27 出版日期:2015-07-28 发布日期:2015-08-04
  • 通讯作者: 巩龙延(1976- )江苏人,教授,硕士生导师,从事量子信息与统计物理交叉、量子信息处理以及安全协议的研究和教学。 E-mail:lygong@njupt.edu.cn
  • 作者简介:王海红(1990- ),女,山东人,研究生,从事量子信息处理以及安全协议的研究。Email: happy.haihong@163.com
  • 基金资助:

    国家自然科学基金( 61271238 ),江苏省青蓝工程基金,南京邮电大学校基金( XK0070913126 )

A Quantum Key Distribution Protocol Based on Challenge-Response Mechanism

WANG Hai-hong, ZHAO Sheng-mei, GONG Long-yan   

  1. 1 Research Center of Information Physics, Department of Applied Physics , Nanjing University of Posts and Telecommunications, Nanjing 210003,China; 
    2 Institute of Signal Processing and Transmission, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
  • Received:2014-09-25 Revised:2014-11-27 Published:2015-07-28 Online:2015-08-04

摘要:

基于BB84协议,利用挑战-应答机制,提出了一种量子密钥分发协议。发送方Alice和接收方Bob通过安全信道共享三个不同的Hash函数( , 和 ),以及随机比特串 。在每次密钥分发时,Alice产生随机比特串 (挑战信息)和 (密钥),结合 和 ,基于BB84协议产生光子串 ;Alice将 和 发送给Bob,Bob接收到对应的 和光子串 ;Bob利用 ,结合 和 ,基于BB84协议对光子串 进行测量得到 。理想情况下共享密钥 。另外,Bob利用 , , 及 产生应答序列 ;Alice和Bob利用各自拥有的序列及 分别产生序列 和 ,并对各自的 做更新。在密钥分发过程中光子的利用率为百分百,该协议既有BB84协议类似的安全性,又有单向身份认证功能。

关键词: 量子光学, 量子密钥分发协议, 挑战-应答机制, BB84协议, 光子利用率, 身份认证

Abstract:

A quantum key distribution protocol based on BB84 protocol and a challenge-response mechanism is proposed. Through a secure channel, Alice and Bob have pre-shared three different Hash functions (denoted by , and ) and a random bit string . Every time, Alice first generates two random bit strings (challenge) and (key), then prepares a photon sequence based on BB84 protocol using , , and . Alice sends and to Bob and Bob receives the corresponding and . Bob measures according to BB84 protocol and gets corresponding . In the ideal case, should be the same as . Bob uses , , and to generate (response). At last, Alice and Bob use their own sequences and to generate and respectively, then they update their own . In our protocol, the utilization rate of photons is 100. The security of the protocol is similar as that of the BB84 protocol. Furthermore, it is a one-way identification authentication protocol.

Key words: quantum optics, quantum key distribution protocol, challenge-response mechanism, BB84 protocol, utilization rate of photons, identification authentication

中图分类号: