量子电子学报 ›› 2019, Vol. 36 ›› Issue (4): 464-470.

• 量子光学 • 上一篇    下一篇

基于退极化信道的量子密钥分配协议安全性能分析

张梓平1,刘国军1,陆旭2,黄兴3,刘云4   

  1. 1全球能源互联网研究院有限公司,北京 102209; 2国网内蒙古东部电力有限公司信息通信分公司,内蒙古 呼和浩特 010020; 3国网辽宁省电力有限公司信息通信分公司,辽宁 沈阳 110006; 4安徽问天量子科技股份有限公司,安徽 芜湖 241000
  • 收稿日期:2018-12-25 修回日期:2019-03-25 出版日期:2019-07-28 发布日期:2019-07-11
  • 通讯作者: 张梓平
  • 作者简介:张梓平(1988- ),北京人,博士,工程师,主要从事电力量子保密通信方面的研究。 E-mail: zhangziping@geiri.sgcc.com.cn
  • 基金资助:
    Supported by Science and Technology Projects of State Grid Corporation of China(国家电网有限公司科技项目,SGRIWLZXJSKF20171082)

Security Performance Analysis of Quantum Key Distribution Protocol Based on Depolarization Channel

ZHANG Ziping1 ,LIU Guojun1 ,LU Xu2,HUANG Xing3,LIU Yun4   

  1. 1 Global Energy Interconnection Research Institute Co., Ltd., Beijing 102209, China; 2 Information Communication Branch, State Grid Eastern Inner Mongolia Electric Power Co., Ltd., Hohhot 010020, China; 3 Information Communication Branch, State Grid Liaoning Electric Power Co., Ltd., Shenyang 110006, China; 4 Anhui Asky Quantum Technology Co., Ltd., Wuhu 241000, China
  • Received:2018-12-25 Revised:2019-03-25 Published:2019-07-28 Online:2019-07-11

摘要: 量子密钥分配协议的安全性能主要是指在一定信道条件下协议所能支持的最高安全密钥生成率,而退极化信道则是量子信息安全性分析中一种常用的信道模型,该模型可以有效刻画量子态在量子信道传输中的扰动。本文利用量子信息论方法推导并仿真分析了在退极化信道条件下BB84协议与设备无关协议的安全性,对于给定的信道退极化参数、光源光强参数、信道衰减参数,进一步结合弱相干态光源与诱骗态方案给出了两种协议在不同信道传输距离下的安全密钥生成率。该成果可用于理论模拟在长距离量子密钥分配条件下的安全密钥生成率,为后续进一步的安全性分析和实验实现建立了理论基础。

关键词: 量子光学, 量子密钥分配, 退极化信道, 安全密钥率

Abstract: The security performance of quantum key distribution protocol mainly refers to the maximum secure key generation rate that the protocol can support under certain channel conditions, and depolarization channel is a common channel model in quantum information security analysis. The security performance of BB84 protocol and device-independent protocol in depolarization channel is deduced and simulated by using quantum information theory. Furthermore, the relationship between the security key generation rate, channel parameters and light source model of the two protocols in a more practical situation is given by combining the weak coherent state light source and decoy state scheme. The results can be used to theoretically simulate the security key generation rate under the condition of long-distance quantum key distribution and establish a theoretical basis for further security analysis and experimental implementation.

Key words: quantum optics, quantum key distribution, depolarizing channel, secure key rate

中图分类号: