期刊文献+

一种更加安全的密码技术——量子密码 被引量:4

One Kind of Safer Cryptographic Technique: Quantum Cryptography
下载PDF
导出
摘要 信息安全技术备受世人关注,由于现有的加密方法存在着很多弊端,人们将目光转向了量子密码。根据量子力学中的海森堡不确定性原理,任何窃听者都无法窃听量子密码通信中的信息而不被发现,笔者正是从量子不确定性基本原理出发来研究量子密码技术的,结合量子密码协议在通信网络中的应用来探讨了在量子通信过程中量子密钥生成、分发的详尽过程及量子密钥的分发协议在通信中应该遵循的原则,介绍了当前实验研究的进展,分析了量子密码研究存在的问题,并针对这些问题提出了一些建设性意见,最后对量子密码的发展前景和方向进行展望。 With the development of computer and communication technology, many people pay close attention to information security technology. Considering that the current encryption has many malpractices, some persons turn attention to quantum cryptography. Quantum Key Distribution is based on the principles of Heisenberg's uncertainty which guarantees that no eavesdropper can escape detection. According to this principle, this paper makes a study of the quantum cryptography technique, discusses the course of quantum key production and distribution in the quantum communication and the principle of quantum key distribution protocol in the communication by combining the application of quantum key protocol in the communication network. Current experimental progress on this aspect is introduced, existing problems are analyzed and some constructive suggestions are proposed. Finally, the developing trend for the theory of quantum password is prospected.
出处 《中国安全科学学报》 CAS CSCD 2007年第1期107-110,共4页 China Safety Science Journal
关键词 量子密码术 量子不确定性原理 量子密码 量子密钥 量子密钥的分发协议 quantum cryptography quantum uncertainty principle quantum password quantum key quantum key distribution protocol
  • 相关文献

参考文献10

  • 1桂有珍,韩正甫,郭光灿.量子密码术[J].物理学进展,2002,22(4):371-382. 被引量:10
  • 2成桢 范璟.量子密码术及其通信[J].科技信息,2006,(4):53-55. 被引量:1
  • 3Bennett.C.H,Brassard.G.Quantum cryptography:publish-key distribution and coin tossing[A].IEEE International Conference on Computers,Systems and Signal Processing[C],1984:175-179 被引量:1
  • 4Bennett.C.H,Brassard.G.Experimental quantum cryptography[J].Journal of Cryptology,1992,5:3-28 被引量:1
  • 5Ekert.A.K.Quantum cryptography based on bell's theoremc[J].Physical Review Letters,1991,67(6):661-663 被引量:1
  • 6Bennett.C.H,Quantum cryptography using any two nonorthogonal states[J].Physical Review Letters,1992,68:3121-3123 被引量:1
  • 7苏晓琴,郭光灿.量子隐形传态[J].物理学进展,2004,24(3):259-273. 被引量:36
  • 8曾贵华,王新梅.量子密码协议的改进[J].通信学报,2000,21(2):60-63. 被引量:12
  • 9Briegel H J,Raussendorf R.Persistent entanglement in arrays of interacting particles[J].Physical Review Letters,2001,86:910 被引量:1
  • 10See,for example,Reid M D.Los Alamos e-print archive[EB].http://xxx.lanl.gov/abs/quantph/0112039,2006-09-12 被引量:1

二级参考文献57

  • 1Deutsch D. Proc.R.Soc. London A, 1985, 400:97. 被引量:1
  • 2Shor P W. in Proceedings of the 35th Annual Symposium on the Foundations of Computer Science, (IEEE Computer Society Press, Los Alamitos, CA, 1994) 124-133. 被引量:1
  • 3Grover L K. Phys Rev Lett, 1997, 79(2):325-328. 被引量:1
  • 4Chuang I L. Vandersypen L M K, Zhou X, et al. Nature, 1998, 393(6681):143-146. 被引量:1
  • 5Bennett C H, Brassard G. Proc. IEEE Internat. Conf. On Computers, Systems and Signal Processing, Bangalore, New York,IEEE, 1984, P175. 被引量:1
  • 6Bennett C H, Brassard G. SIGACT news, 1989, 20:78. 被引量:1
  • 7Bennett C H, Brassard G, Crepeau C, et al. Phys Rev Lett, 1993, 70(13 ):1895-1899. 被引量:1
  • 8Bouwmeester D, Pan J W, Mattle K, et al. Nature, 1997, 390(6660):575-579. 被引量:1
  • 9Wootters W K, Zurek W H. Nature, 1982, 299:802. 被引量:1
  • 10Davidovich L, Zagury N, Brune M, et al. Phys Rev A, 1994, 50(2):R895-R898. 被引量:1

共引文献53

同被引文献16

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部