欢迎登录材料期刊网

材料期刊网

高级检索

基于量子物理原理的量子密码术已被证明是保密通信中密钥安全分配的有效手段.本文介绍了量子密码的基本原理,探讨了实现量子密码的几种方案,并研究了各自的密钥分配机制.还讨论了量子密码通信的历史发展和指出现存在的问题以及未来的发展前景.

参考文献

[1] Wiesner S. Conjugate coding [J]. Sigact News, 1983, 15:78-88
[2] Bennett C H, Brassard G. Quantum cryptography: public-key distribution and coin tossing [C]//Proceedings ofthe IEEE International Conference on Computers, Systems and Signal Processing, 1984. 175-179
[3] Bennett C H, Brassard G, et al. Experimental quantum cryptography [J]. Journal of Cryptology, 1992, 5:3-28
[4] Ekert A K. Quantum cryptography based on Bell's theorem [J]. Phys. Rev. Lett., 1991, 67:661-663
[5] Bennett C H. Quantum cryptography using any two nonorthogonal states [J]. Phys. Rev. Lett., 1992, 68: 3121- 3123
[6] Muller A, et al. Quantum cryptography over 23 km in installed under-lake telecom fibre [J]. Europhys. Lett., 1996, 30:335-339
[7] Townsend P. Optical encrytion makes networks more secure [J]. Fiber Systems International, 2000, 1:30-32
[8] Hughes R J, et al. Quantum key distribution over a 48 km optical fibre network [J]. J. Mod. Opt., 2000, 47: 533-547
[9] Buttler W T, et al. Daylight quantum key distribution over 1.6 km [J]. Phys. Rev. Lett., 2000, 84:5652-5655
[10] Philip H A, et al. Eighty kilometer transmission experiment using an InGaAs/InP SPAD-based quantum cryp- tography receiver operating at 1.55 μm [J]. Journal of Modern Optics, 2001, 48:1957-1966
[11] Liao J, et al. True random number generator based on a photon beamsplitter [J]. Acta Physica Sinica (物理学报),2001, 50:467-472 (in Chinese)
[12] 张涌.量子保密通信研究[D].华东师大博士学位论文,上海:1997.
[13] Liang C, et al. Quantum key distribution over 1.1 km in an 850 nm experimental all-fiber system [J]. Acta Physica Sinica (物理学报), 2001, 50:1429-1433 (in Chinese)
[14] Li X Y, et al. Quantum dense coding exploiting a bright Einstein-Podolsky-Rosen beam [J]. Phys. Rev. Lett,2002, 88:047904
[15] Xiong Y Q, et al. Quantum Effect and Modern Technology (量子效应与现代科技) [M]. Guangzhou: Guangdong Science and Technology Press, 2000. 110 (in Chinese)
[16] Wu L A. Quantum cryptography [J]. Physics (物理), 1998, 27:544-551 (in Chinese)
[17] Zeng G H, et al. Improvement of quantum cryptographic protocols [J]. Journal of China Institute of Communi-cations (通信学报), 2001, 21:60-63 (in Chinese)
[18] Zeng GH, et al. Information investigation for BB84 protocol in quantum cryptography [J]. Journal of China Institute of communications (通信学报), 2000, 21:70-73 (in Chinese)
[19] Duan L M, et al. Long-distance quantum communication with atomic ensembles and linear optics [J]. Nature, 2001, 414:413-418
[20] Lounis B, Moerner W E. Single photons on demand from a single molecule at room temperature [J]. Nature, 2000,407:491-493
[21] Wang T H. Gather the research development of the single electronics transistor [J]. Physics (物理), 2000, 29:58-59 (in Chinese)
[22] Liang C, et al. Performance of a silicon avalanche-diode as a single photon detector [J]. Acta. Photonica. Sinica (光子学报), 2000, 29:1142-1147 (in Chinese)
[23] Cai W H. The quantum point makes the single photon on the fixed position [J]. Laser & Optoelectronics Progress(激光与光电子学进展),2001,8:18-19(in Chinese)
[24] Zheng S B, Guo G C. Efficient scheme for two-atom entanglement and quantum information processing in cavity QED [J]. Phys. Rev. Lett., 2000, 85:2392-2395
[25] Hood C J, et al. The atom-cavity microscope: single atoms bound in orbit by single photons [J], Science, 2000,287:1447-1453
上一张 下一张
上一张 下一张
计量
  • 下载量()
  • 访问量()
文章评分
  • 您的评分:
  • 1
    0%
  • 2
    0%
  • 3
    0%
  • 4
    0%
  • 5
    0%