欢迎登录材料期刊网

材料期刊网

高级检索

量子密钥分配协议是近几年研究信息安全的一大热点,它的具体实现方法也备受关注.给出了在经典计算机上表示量子态的制备和测量方法,并编制相应的程序,实现了多种量子密钥分配协议仿真.将获得的结果与理论分析结果相比较,两者的一致性表明在现有计算机上仿真量子密钥分配协议是完全可行的,这为量子加密、乃至量子信息处理的研究提供了一种新的手段.

参考文献

[1] Chen Kefei.Roles and limitations of cryptographic techniques in information security [J].Journal of China Institute of Communications(通信学报),2001,22(8):93-99(in Chinese).
[2] Volovich I V,Volovich Ya I.On Classical and Quantum Cryptography [DK].Eprint quant-ph/0108133.
[3] Shor P W.Algorithms for quantum computation:Discrete logarithms and factoring [C]// Proc.of the 35th Annual Symp.on Foundations of Computer Science.New Mexico:IEEE Computer Society Press,1994,124-134.
[4] Shor P W.Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum conputer [J].SIAM Journal on Computing,1997,26(5):1484-1509.
[5] Gisin N,Ribordy G,Tittel W,et al.Quantum cryptography [DK].Eprint quant-ph/0101098
[6] Bennett C H,Brassard G.Quantum cryptography:public key distribution and coin tossing [C] // Proc.IEEE Int.Conf.Computers,Systems and Signal Processing(Bangalore,India).1984,175-179.
[7] Bennett C H.Quantum cryptography using any two non-orthogonal states [J].Phys.Rev.Lett.,1992,68 :3121-3124
[8] Bruss D.Optimal eavesdropping in quantum cryptography with six states [J].Phys.Rev.Lett.,1998,32(14):3018-3021.
[9] Ekert A.Quantum cryptography based on Bell's theorem [J].Phys.Rev.Lett.,1991,67:661-663.
[10] Bennett C H,Bessette F,Brassard G,et al.Experimental quantum cryptography [J].Journal of Cryptology,1992,5(1):3-28.
[11] Nielsen M A,Chuang I L.Quantum Computation and Quantum Information [M].Cambridge,U.K.:Cambridge University Press,2000.464.
[12] Williams C P,Clearwater S H.Explorations in Quantum Computing [M].Santa Clara,Calif.TELOS,SpringerVerlag,1998.
[13] Lo Hoi-kwong.Proof of unconditional security of six-state quantum key distribution scheme [DK].Eprint quantph/0102138.
[14] Bennett C H,et al.Generalized privacy amplification [J].IEEE Trans.Inform.Theory,1995,41(6):1915-1923.
[15] Bruss D,Macchiavello C.Optimal eavesdropping in cryptography with three-dimensional quantum states [DK].Eprint quant-ph/0106126.
上一张 下一张
上一张 下一张
计量
  • 下载量()
  • 访问量()
文章评分
  • 您的评分:
  • 1
    0%
  • 2
    0%
  • 3
    0%
  • 4
    0%
  • 5
    0%