[go: up one dir, main page]

CN101540760B - Quantum key agreement method - Google Patents

Quantum key agreement method Download PDF

Info

Publication number
CN101540760B
CN101540760B CN2009100498730A CN200910049873A CN101540760B CN 101540760 B CN101540760 B CN 101540760B CN 2009100498730 A CN2009100498730 A CN 2009100498730A CN 200910049873 A CN200910049873 A CN 200910049873A CN 101540760 B CN101540760 B CN 101540760B
Authority
CN
China
Prior art keywords
negotiation
interval
bit
error
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2009100498730A
Other languages
Chinese (zh)
Other versions
CN101540760A (en
Inventor
钱旭东
朱俊
曾贵华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jiao Tong University
Original Assignee
Shanghai Jiao Tong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Jiao Tong University filed Critical Shanghai Jiao Tong University
Priority to CN2009100498730A priority Critical patent/CN101540760B/en
Publication of CN101540760A publication Critical patent/CN101540760A/en
Application granted granted Critical
Publication of CN101540760B publication Critical patent/CN101540760B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Computer And Data Communications (AREA)

Abstract

一种信息安全技术领域的量子密钥协商方法,步骤为:一,两个协商通信用户选择各自在协商中的地位:如果一个用户决定选择前向协商,那么该用户就选择自己作为服务器端,另一个用户作为客户端;二,服务器端开始监听网络,然后客户端输入服务器端的IP地址,并开始连接服务器端;三,两个协商通信用户交换初始的误码率以及协商数据文件,使用包含自适应区间选择函数的Winnow方法进行协商处理;四,协商完毕后,当输入窃听者所获得的比特串的长度后,任何一方可决定开始保密增强过程,从而在协商通信用户双方的文本框中获得安全的通信密钥。本发明提出的自适应的区间选择方法提高了Winnow方法的效率,从而提高了协商方法的效率。

Figure 200910049873

A quantum key agreement method in the field of information security technology, the steps are: 1. Two negotiation communication users choose their respective positions in the negotiation: if a user decides to choose forward negotiation, then the user chooses himself as the server end, Another user acts as the client; second, the server starts to monitor the network, and then the client enters the IP address of the server and starts to connect to the server; third, two negotiation communication users exchange the initial bit error rate and negotiation data files, using the The Winnow method of self-adaptive interval selection function carries out negotiation process; Four, after the negotiation finishes, after the length of the bit string that input eavesdropper obtains, any party can decide to start the confidentiality enhancement process, thereby in the text box of negotiation communication user both sides Obtain a secure communication key. The self-adaptive interval selection method proposed by the invention improves the efficiency of the Winnow method, thereby improving the efficiency of the negotiation method.

Figure 200910049873

Description

量子密钥协商方法Quantum key agreement method

技术领域 technical field

本发明涉及的是一种信息处理技术领域的方法,具体的说,涉及的是一种量子密钥协商方法。The present invention relates to a method in the technical field of information processing, in particular to a quantum key agreement method.

背景技术 Background technique

量子力学和密码学的结合,诞生了量子密码学,它可完成仅仅由传统数学无法完成的完善保密系统。量子密码学是在量子理论基础上提出了一种全新的安全通信系统,它从根本上解决量子特性不可忽视,测量动作是量子力学的一个组成部分。在这些规律中,对量子密码学起关键作用的是测不准原理,即测量量子系统时通常会对该系统产生干扰,并产生出关于该系统测量前状态的不完整信息,因此任何对于量子信道进行监测的努力都会以某种检测的方式干扰在此信道中传输的信息。The combination of quantum mechanics and cryptography gave birth to quantum cryptography, which can complete a perfect security system that cannot be completed only by traditional mathematics. Quantum cryptography proposes a brand-new secure communication system based on quantum theory. It fundamentally solves the problem that quantum characteristics cannot be ignored, and measurement action is an integral part of quantum mechanics. Among these laws, the uncertainty principle plays a key role in quantum cryptography, that is, when measuring a quantum system, it will usually cause disturbance to the system and produce incomplete information about the state of the system before measurement, so any Any effort to monitor a channel interferes in some detectable way with the information transmitted on that channel.

1969年,S.Wiesner首先提出量子密码思想。1984年,美国IBM公司的科学家C.H.Bennett和加拿大密码学家G..Brassard提出国际上第一个量子密钥分发协议——BB84协议。1989年,世界上第一个量子密钥分发(Quantum KeyDistribution)实验在IBM公司Thomas实验室获得成功,该实验采用BB84协议,其实验通信距离在自由空间中虽然仅有32cm,但为今后量子信息科学的发展起到了举足轻重的作用。从此,建立在量子光通信基础上的量子密码成为国际上普遍关注的课题之一,各国学者和科学家在理论上从不同的角度开展量子密码研究,内容涉及量子密钥分发、量子密钥验证、量子数据加密、量子秘密共享、量子身份认证、量子签名、量子比特承诺、量子不经意传输、量子多方计算以及量子密码的信息理论,另外,量子纠错码也越来越受到人们的重视。In 1969, S. Wiesner first proposed the idea of quantum cryptography. In 1984, C.H.Bennett, a scientist of IBM Corporation in the United States, and G.. Brassard, a Canadian cryptographer, proposed the world's first quantum key distribution protocol - BB84 protocol. In 1989, the world's first Quantum Key Distribution (Quantum KeyDistribution) experiment was successful in IBM's Thomas Laboratory. The experiment used the BB84 protocol. Although the experimental communication distance is only 32cm in free space, it is the future of quantum information. The development of science has played a pivotal role. Since then, quantum cryptography based on quantum optical communication has become one of the most widely concerned topics in the world. Scholars and scientists from various countries have theoretically carried out research on quantum cryptography from different angles, involving quantum key distribution, quantum key verification, Quantum data encryption, quantum secret sharing, quantum identity authentication, quantum signature, qubit commitment, quantum inadvertent transmission, quantum multi-party computing, and information theory of quantum cryptography. In addition, quantum error-correcting codes are getting more and more attention.

作为量子密码重要分支之一的量子密钥分发中的协商和保密增强引起各国学者越来越多的兴趣。As one of the important branches of quantum cryptography, the negotiation and security enhancement in quantum key distribution has aroused more and more interest of scholars from various countries.

经对现有技术文献的检索发现,Bennett等人在1991年发表的文章《Experimental Quantum Cryptography》(《量子密码实验》),该文中奠定了数据协商的基础,自此,人们开始研究各种更高效的协商方法,之后出现的Cascade以及Winnow方法都是秉承上述的方法来进行研究的。目前的协商方法包括区间划分、比特判断以及纠错过程三个方面,Winnow方法的理论效率非常高,但是由于方法中需要使用查图法来决定参数,导致整个方法的工程效率大大降低了,而协商方法的效率一直制约着量子保密通信的工程实现。After searching the existing technical documents, it was found that Bennett et al. published the article "Experimental Quantum Cryptography" ("Quantum Cryptography Experiment") in 1991, which laid the foundation for data negotiation. Since then, people have begun to study various more Efficient negotiation methods, the Cascade and Winnow methods that appeared later are all based on the above methods for research. The current negotiation method includes three aspects: interval division, bit judgment and error correction process. The theoretical efficiency of the Winnow method is very high, but because the method needs to use the map method to determine the parameters, the engineering efficiency of the whole method is greatly reduced. The efficiency of negotiation methods has always constrained the engineering realization of quantum secure communication.

经检索还发现,Bennett等人于1995年在《IEEE信息论汇刊》(vol.41,no.6,pp.1915-1923,1995.)发表的文章《Generalized privacyamplification》(《一般性保密增强》)奠定了保密增强的基础理论。自此,人们开始对保密增强在不同前提下,不同条件下,不同限制下的各种情况进行了详细的分析并给出了很多重要的结论。After searching, it is also found that the article "Generalized privacy amplification" ("Generalized Privacy Enhancement") published by Bennett et al. in "IEEE Transactions on Information Theory" (vol. ) laid the foundational theory of security enhancement. Since then, people have carried out a detailed analysis on various situations of secrecy enhancement under different premise, different conditions, and different restrictions, and have given many important conclusions.

发明内容 Contents of the invention

本发明的目的在于针对上述现有技术的不足,提出了一种量子密钥协商方法,使用新的协商方法和新的通信协议,提高了协商方法的工作效率,促进信息安全基础建设。The purpose of the present invention is to address the shortcomings of the above-mentioned prior art, and propose a quantum key negotiation method, which uses a new negotiation method and a new communication protocol, improves the work efficiency of the negotiation method, and promotes the construction of information security infrastructure.

本发明通过如下技术方案实现的,包括如下步骤:The present invention is realized through following technical scheme, comprises the steps:

步骤一,首先两个协商通信用户选择各自在协商中的地位:如果一个用户决定选择前向协商,那么该用户就选择自己作为服务器端,另一个用户作为客户端;如果一个用户决定使用反向协商,那么该用户就选择自己作为客户端,另一个用户作为服务器端;Step 1. First, the two negotiation communication users choose their respective positions in the negotiation: if a user decides to choose forward negotiation, then the user chooses himself as the server and the other user as the client; if a user decides to use reverse negotiation Negotiation, then the user chooses himself as the client and another user as the server;

步骤二,服务器端开始监听网络,然后客户端输入服务器端的IP地址,并开始连接服务器端;Step 2, the server starts to monitor the network, and then the client enters the IP address of the server and starts to connect to the server;

步骤三,当服务器端和客户端之间建立连接后,首先两个协商通信用户交换初始的误码率以及协商数据文件,然后使用包含自适应区间选择函数的Winnow方法进行协商处理;Step 3, when the connection is established between the server and the client, at first the two negotiating communication users exchange the initial bit error rate and the negotiating data file, and then use the Winnow method including the adaptive interval selection function to carry out the negotiating process;

步骤四,协商完毕后,当输入窃听者所获得的比特串的长度后,任何一方可决定开始保密增强过程,保密增强完成后,在协商通信用户双方的文本框中获得信息论意义上安全的通信密钥。Step 4: After the negotiation is completed, after entering the length of the bit string obtained by the eavesdropper, any party can decide to start the process of security enhancement. After the security enhancement is completed, secure communication in the sense of information theory can be obtained in the text boxes of both negotiating communication users. key.

步骤三中,所述当服务器端和客户端之间建立连接后,其中服务器端的数据不能进行修改,而客户端的数据会根据服务器端提供的协商信息进行修改。In step 3, after the connection between the server and the client is established, the data on the server cannot be modified, while the data on the client will be modified according to the negotiation information provided by the server.

步骤三中,所述使用包含自适应区间选择函数的Winnow方法进行协商处理,包括如下具体步骤:In step 3, the use of the Winnow method comprising an adaptive interval selection function to carry out negotiation processing includes the following specific steps:

第一步,当协商通信双方交换完量子比特并且获得初始误码率以及协商数据文件以后,通信双方将各自所获得的比特串划分为长度N=2m的区间,对于每个区间,通信双方在认证信道中交换区间的奇偶校验位,其中区间大小参数m由自适应区间选择函数根据输入的初始误码率进行选择;In the first step, after the negotiating and communicating parties have exchanged qubits and obtained the initial bit error rate and the negotiated data file, the communicating parties divide the obtained bit strings into intervals of length N=2 m . For each interval, the communicating parties Exchanging the parity bits of the interval in the authentication channel, where the interval size parameter m is selected by the adaptive interval selection function according to the input initial bit error rate;

第二步,如果一个用户的奇偶校验位和另一个用户的奇偶校验位相同,那么通信双方舍弃区间的最后一位比特,对于剩下的2m-1个比特不做任何别的处理,然后继续处理下一个区间;In the second step, if the parity bit of one user is the same as the parity bit of another user, the two parties in the communication discard the last bit of the interval, and do not do any other processing for the remaining 2 m -1 bits , and then continue to process the next interval;

第三步,如果一个用户的奇偶校验位和另一个用户的奇偶校验位不同,那么他们就是先扔弃最后一个比特,然后用Hamming(汉明)哈希函数从剩下的2m-1中找到导致奇偶校验位不同的那个错误比特并且纠正,由于使用了Hamming(汉明)哈希函数来纠错,所以还要通过认证信道交换一些用于纠错的信息,为了保持剩余比特的安全性,还要扔弃m个比特。In the third step, if one user's parity bit is different from another user's parity bit, then they just throw away the last bit first, and then use the Hamming (Hamming) hash function from the remaining 2 m - In 1, find the error bit that causes the parity bit to be different and correct it. Since the Hamming (Hamming) hash function is used to correct the error, some information for error correction must be exchanged through the authentication channel. In order to keep the remaining bits For security, m bits must be discarded.

本发明中最重要的部分就是自适应区间选择函数对于区间大小参数m的自动选择。区间大小参数m一旦选的不合适,经过一次纠错过程,一个区间内的错误数量非但没有减少,可能还会有所增加。这样就意味着又要多扔弃一些信息比特来多进行几轮纠错的过程。虽然Buttler提供了一个图示查询的方法来判断如何选取参数m,但是图示只是一个理论的方案,对于实际工程应用极其不便。本发明给出的自适应区间选择函数,能够提供一个解析的形式用于选择区间大小参数m,使得改进后的包含自适应区间选择函数的Winnow方法可以用于实际的工程中去了。利用此自适应区间选择函数可以自动根据输入的初始误码率选择每次的区间大小参数。The most important part of the present invention is the automatic selection of the interval size parameter m by the adaptive interval selection function. Once the interval size parameter m is not selected properly, after an error correction process, the number of errors in an interval will not decrease, but may even increase. This means that some more information bits need to be discarded to perform several more rounds of error correction. Although Buttler provides a graphic query method to determine how to select the parameter m, the graphic is only a theoretical solution, which is extremely inconvenient for practical engineering applications. The adaptive interval selection function provided by the present invention can provide an analytical form for selecting the interval size parameter m, so that the improved Winnow method including the adaptive interval selection function can be used in actual projects. Using this adaptive interval selection function, the interval size parameter can be automatically selected each time according to the input initial bit error rate.

所述由自适应区间选择函数根据输入的初始误码率进行选择区间大小参数m,包括如下步骤:Said selection of the interval size parameter m by the adaptive interval selection function according to the input initial bit error rate comprises the following steps:

第一步,计算判断变量L,L表示协商前区间内有3个错误比特的情况下协商后的平均误比特个数,第1种情况就是Hamming矩阵没有检测出错误,也就意味着并不会进行纠错,协商完仍然有3个误码,用P31来表示这种情况的概率;第2种情况就是Hamming矩阵的确检测出了误码,然后使用Hamming哈希函数来纠正这个误码,经过纠错后,区间内含有4个误码,使用P32来表示这种情况的概率,所以,经过协商后,区间内有3个错误比特的情况下协商后的平均误比特个数为:The first step is to calculate the judgment variable L. L represents the average number of bit errors after negotiation when there are 3 error bits in the interval before the negotiation. The first case is that no error is detected by the Hamming matrix, which means that there is no Error correction will be performed, and there are still 3 bit errors after negotiation, and the probability of this situation is represented by P 31 ; the second case is that the Hamming matrix does detect a bit error, and then the Hamming hash function is used to correct the bit error , after error correction, there are 4 bit errors in the interval, and P 32 is used to represent the probability of this situation. Therefore, after negotiation, when there are 3 error bits in the interval, the average number of bit errors after negotiation is :

L=P31×3+P32×4L= P31 ×3+ P32 ×4

其中in

PP 3131 == CC 22 mm -- 11 22 CC 22 mm -- 11 33

P32=1-P31 P 32 =1-P 31

第二步,计算区间平均误码率avererror The second step is to calculate the interval average bit error rate aver error

avererror=P1×0+P2×2+P3×L+P4×4aver error =P 1 ×0+P 2 ×2+P 3 ×L+P 4 ×4

其中Pi表示一个区间内有i个误码的概率(因为概率极小,故忽略区间内超过4个误码的情况)Among them, P i represents the probability that there are i bit errors in an interval (because the probability is extremely small, the case of more than 4 bit errors in the interval is ignored)

P i = C 2 m i ( M N ) i ( 1 - M N ) 2 m - i (N与M均为初始化参数) P i = C 2 m i ( m N ) i ( 1 - m N ) 2 m - i (N and M are initialization parameters)

第三步,使用不同的m来计算

Figure G2009100498730D00043
的不同取值,对应于
Figure G2009100498730D00044
的m值即为所需的区间大小。In the third step, use different m to calculate
Figure G2009100498730D00043
Different values of , corresponding to
Figure G2009100498730D00044
The value of m is the required interval size.

由上述公式可知,能够利用自适应区间选择函数来判定区间大小参数m,这样大大提高了信息协商的效率,从而解决了困扰信息协商在工程中实际应用的最大的障碍,对信息安全通信的理论和实验研究有着重要的指导意义。From the above formula, we can use the adaptive interval selection function To determine the interval size parameter m, this greatly improves the efficiency of information negotiation, thereby solving the biggest obstacle that plagues the practical application of information negotiation in engineering, and has important guiding significance for the theoretical and experimental research of information security communication.

所述服务器端和客户端之间能够基于TCP/IP协议进行网络文本传输,以使得当服务器端和客户端对本次协商的结果不满意时,相互之间进行交流以获取更准确地信息。The server and the client can perform network text transmission based on the TCP/IP protocol, so that when the server and the client are not satisfied with the result of this negotiation, they can communicate with each other to obtain more accurate information.

与现有技术相比,本发明具有如下有益效果:Compared with the prior art, the present invention has the following beneficial effects:

本发明针对量子密钥分发协议在对比测量基后的数据处理,提出一种自适应的区间选择方法,将此方法用于著名的协商方法Winnow方法后,可以大大提高了Winnow方法的效率,从而提高了协商方法的效率,对量子密钥分发在工程上的实现有很重大的指导作用。The present invention aims at the data processing of the quantum key distribution protocol after comparing the measurement basis, and proposes an adaptive interval selection method. After this method is used in the famous negotiation method Winnow method, the efficiency of the Winnow method can be greatly improved, thereby The efficiency of the negotiation method is improved, and it has a very important guiding role in the realization of quantum key distribution in engineering.

此外本发明通过TCP/IP来传递协商以及保密增强所需要的交换信息。网络就用来模拟了QKD(量子密钥分配术)中的经典信道,达到可以被Eve窃听但是不会被修改或者删除的目的,为将来量子VPN(虚拟专用网络)的发展提供了基础。In addition, the present invention transmits exchange information needed for negotiation and privacy enhancement through TCP/IP. The network is used to simulate the classical channel in QKD (Quantum Key Distribution), so that it can be eavesdropped by Eve but will not be modified or deleted, which provides the basis for the future development of Quantum VPN (Virtual Private Network).

附图说明 Description of drawings

图1是本发明的的工作流程图。Fig. 1 is a work flow chart of the present invention.

具体实施方式 Detailed ways

下面结合附图对本发明的实施例作详细说明:本实施例在以本发明技术方案为前提下进行实施,给出了详细的实施方式和具体的操作过程,但本发明的保护范围不限于下述的实施例。The embodiments of the present invention are described in detail below in conjunction with the accompanying drawings: this embodiment is implemented on the premise of the technical solution of the present invention, and detailed implementation methods and specific operating procedures are provided, but the protection scope of the present invention is not limited to the following the described embodiment.

假设Alice和Bob分别处于各自的小区内终端前,两处小区间由英特网连接。如图1所示,本实施例包括如下步骤:Assume that Alice and Bob are in front of terminals in their respective cells, and the two cells are connected by the Internet. As shown in Figure 1, this embodiment includes the following steps:

步骤一,首先Alice和Bob选择各自在协商中的地位,如果Alice决定选择前向协商,那么Alice就选择自己作为服务器,Bob作为客户端,如果Alice决定使用反向协商,那么Alice就选择自己作为客户端,Bob作为服务器;为不失一般性,可选择Alice为服务器进行前向协商。点击软件界面的右端的type栏选择server选项。相应的Bob选择client选项。Step 1. First, Alice and Bob choose their respective positions in the negotiation. If Alice decides to choose forward negotiation, then Alice chooses herself as the server and Bob as the client. If Alice decides to use reverse negotiation, then Alice chooses herself as the server. In the client, Bob acts as the server; without loss of generality, Alice can be selected as the server for forward negotiation. Click the type column at the right end of the software interface to select the server option. Correspondingly Bob selects the client option.

步骤二,Alice服务器端点击listen按键开始监听网络,然后Bob作为客户端输入Alice服务器端的IP地址,并点击connect按键请求连接服务器端;当服务器端和客户端之间建立连接后,Alice端服务器会提示“有人连接上了”,Bob端会提示“连接上服务器,可以开始通信”。Step 2: Alice server clicks the listen button to start monitoring the network, then Bob enters the IP address of Alice server as the client, and clicks the connect button to request to connect to the server; when the connection between the server and the client is established, the Alice server will It will prompt "someone is connected", and Bob will prompt "connected to the server and can start communication".

步骤三,首先Alice和Bob双方通过网络聊天系统交换初始的误码率。当Alice和Bob中的任意一方点击reconciliation按钮后,就会弹出提示框,提示输入初始的误码率以及协商数据文件。当一方输入完毕后,提示另一方请求开始协商,让另一方也输入初始化误码率以及协商数据。随后通过将协商数据打成包开始在因特网上进行传输。网络就起到了理论研究中的经典信道的作用。然后按预先设定的程序使用包含自适应区间选择函数的Winnow方法进行协商处理。具体过程如下:Step 3. Firstly, Alice and Bob exchange the initial bit error rate through the network chat system. When either Alice or Bob clicks the reconciliation button, a prompt box will pop up, prompting to input the initial bit error rate and the negotiation data file. After one party completes the input, prompt the other party to request to start the negotiation, and ask the other party to also input the initialization bit error rate and negotiation data. Transmission over the Internet then begins by packetizing the negotiated data. The network plays the role of a classical channel in theoretical research. Then use the Winnow method including the self-adaptive interval selection function to negotiate according to the preset program. The specific process is as follows:

1、Alice和Bob将各自所需要协商的比特串划分为长度N=2m的区间,对于每个区间,通信双方通过建立的英特网链路信道交换各个区间的奇偶校验位,其中区间大小参数m由自适应区间选择函数根据输入的初始误码率进行选择。1. Alice and Bob divide the bit strings they need to negotiate into intervals with a length of N=2 m . For each interval, the communication parties exchange the parity bits of each interval through the established Internet link channel, where the interval The size parameter m is selected by the adaptive interval selection function according to the input initial bit error rate.

2、区间大小参数m一旦选的不合适,经过一次纠错过程,一个区间内的错误数量非但没有减少,可能还会有所增加。这样就意味着又要多扔弃一些信息比特来多进行几轮纠错的过程。虽然Buttler提供了一个图示查询的方法来判断如何选取参数m,但是图示只是一个理论的方案,对于实际工程应用极其不便。本发明给出的自适应区间选择函数,能够提供一个解析的形式用于选择区间大小参数m,使得改进后的包含自适应区间选择函数的Winnow方法可以用于实际的工程中去了。利用此自适应区间选择函数可以自动根据输入的初始误码率选择每次的区间大小参数。具体过程如下:2. Once the interval size parameter m is selected inappropriately, after an error correction process, the number of errors in an interval will not decrease, but may increase. This means that some more information bits need to be discarded to perform several more rounds of error correction. Although Buttler provides a graphic query method to determine how to select the parameter m, the graphic is only a theoretical solution, which is extremely inconvenient for practical engineering applications. The adaptive interval selection function provided by the present invention can provide an analytical form for selecting the interval size parameter m, so that the improved Winnow method including the adaptive interval selection function can be used in actual projects. Using this adaptive interval selection function, the interval size parameter can be automatically selected each time according to the input initial bit error rate. The specific process is as follows:

第一步,计算判断变量L,L表示协商前区间内有3个错误比特的情况下协商后的平均误比特个数,第1种情况就是Hamming矩阵没有检测出错误,协商完仍然有3个误码,用P31来表示这种情况的概率;第2种情况就是Hamming矩阵的确检测出了误码,然后使用Hamming哈希函数来纠正这个误码,经过纠错后,区间内含有4个误码,使用P32来表示这种情况的概率,所以,经过协商后,区间内有3个错误比特的情况下协商后的平均误比特个数为L=P31×3+P32×4,其中 P 31 = C 2 m - 1 2 C 2 m - 1 3 , P32=1-P31The first step is to calculate the judgment variable L. L represents the average number of bit errors after negotiation when there are 3 error bits in the interval before the negotiation. The first case is that no errors are detected by the Hamming matrix, and there are still 3 error bits after the negotiation. Bit error, use P 31 to represent the probability of this situation; the second case is that the Hamming matrix does detect a bit error, and then use the Hamming hash function to correct the bit error. After error correction, the interval contains 4 Bit error, use P 32 to represent the probability of this situation, so after negotiation, in the case of 3 error bits in the interval, the average number of bit errors after negotiation is L=P 31 ×3+P 32 ×4 ,in P 31 = C 2 m - 1 2 C 2 m - 1 3 , P 32 =1-P 31 .

第二步,计算区间平均误码率avererror=P1×0+P2×2+P3×L+P4×4。其中Pi表示一个区间内有i个误码的概率 P i = ( C 2 m i ) ( M N ) i ( 1 - M N ) 2 m - i , N与M均为初始化参数,第三步,使用m来计算

Figure G2009100498730D00063
的取值,对应于的m值即为所需的区间大小。The second step is to calculate the interval average bit error rate aver error =P 1 ×0+P 2 ×2+P 3 ×L+P 4 ×4. Where P i represents the probability that there are i bit errors in an interval P i = ( C 2 m i ) ( m N ) i ( 1 - m N ) 2 m - i , Both N and M are initialization parameters. In the third step, use m to calculate
Figure G2009100498730D00063
The value of , corresponding to The value of m is the required interval size.

3、如果客户端Bob的奇偶校验位和服务器端Alice的奇偶校验位相同,那么双方舍弃相应区间的最后一位比特,对于剩下的2m-1个比特不做任何别的处理,然后继续处理下一个区间;3. If the parity bit of Bob on the client side is the same as that of Alice on the server side, then both parties discard the last bit of the corresponding interval, and do not do any other processing for the remaining 2 m -1 bits. Then continue to process the next interval;

4、如果客户端Bob的奇偶校验位和服务器端Alice的奇偶校验位不同,那么双方首先扔弃该区间最后一位比特,然后客户端Bob用Hamming哈希函数从剩下的2m-1中找到导致奇偶校验位不同的那个错误比特并且纠正,并通过英特网信道交换一些用于纠错的信息,双方再扔弃m个比特。4. If the parity bit of the client Bob is different from the parity bit of the server Alice, then both parties first discard the last bit of the range, and then the client Bob uses the Hamming hash function from the remaining 2 m - In 1, find the error bit that causes the parity bit to be different and correct it, and exchange some information for error correction through the Internet channel, and the two parties discard m bits.

步骤四,当协商完毕后,通信双方中的任意一方按下Privacy Amplification按键后,就会弹出提示框,提示输入窃听者Eve可能获得的比特长度。当输入所获得的比特串的长度后,服务器和客户端就各自开始保密增强的计算。本实施例使用了改进后的BBBSC算法作为保密增强的近似算法。处理结束后,在双方的聊天文本框中分别输出在信息论意义上安全的通信密钥了。Step 4: After the negotiation is completed, any one of the communication parties presses the Privacy Amplification button, and a prompt box will pop up, prompting to enter the bit length that the eavesdropper Eve may obtain. After inputting the length of the obtained bit string, the server and the client start the calculation of privacy enhancement respectively. In this embodiment, the improved BBBSC algorithm is used as an approximation algorithm for privacy enhancement. After the processing is over, the communication keys that are secure in the sense of information theory are output in the chat text boxes of both parties.

本实施例中,服务器端和客户端之间基于TCP/IP协议进行网络文本传输,以使得当服务器端和客户端对本次协商的结果不满意时,相互之间进行交流以获取更准确地信息。本实施例提高了Winnow方法的效率,从而提高了协商方法的效率。In this embodiment, the network text transmission is performed between the server and the client based on the TCP/IP protocol, so that when the server and the client are not satisfied with the result of this negotiation, they communicate with each other to obtain a more accurate information. This embodiment improves the efficiency of the Winnow method, thereby improving the efficiency of the negotiation method.

Claims (3)

1. a quantum key agreement method is characterized in that, comprises the steps:
Step 1, two negotiation communication users select the status in each comfortable negotiation: if a user determines to select forward direction to consult, this user is own to server end with regard to selecting so, and another user is as client; If a user determines to use reverse negotiation, this user just selects oneself as client so, and another user is as server end;
Step 2, server end begins listens for network, the Connection Service device end of the IP address of client input server end, and beginning then;
Step 3, after connecting between server end and the client, at first two negotiation communication users exchange the initial error rate and negotiation data file, use the processing of holding consultation of the Winnow method comprise self adaptation interval selection function then;
The Winnow method that said use the comprises self adaptation interval selection function processing of holding consultation comprises following concrete steps:
The first step, when the negotiation communication both sides exchanged quantum bit and obtain the initial error rate and the negotiation data file after, the Bit String that communicating pair will be obtained separately is divided into length N=2 mThe interval, for each interval, communicating pair is the parity check bit between the exchange area in authenticated channel, wherein interval size parameter m by self adaptation interval selection function according to the input the initial error rate select;
In second step, if a user's parity check bit and another user's parity check bit is identical, communicating pair is given up last interval bit so, for be left 2 m-1 bit is not done any other processing, continues to handle next interval then;
In the 3rd step, if a user's parity check bit and another user's parity check bit is different, they abandon last bit earlier so, then with the Hamming hash function from be left 2 mFind that error bit and the correction that cause parity check bit different in-1, some are used for the information of error correction through the authenticated channel exchange, abandon m bit;
Described self adaptation interval selection function is selected interval size parameter m according to the initial error rate of input, comprises the steps:
1), calculate judgment variable L, the average errored bit number after consulting under the situation of 3 error bits is arranged in L representes to consult between the proparea, the 1st kind of situation is exactly that the Hamming matrix does not detect mistake, consulted still to have 3 error codes, uses P 31The probability of representing this situation; The 2nd kind of situation is exactly that the Hamming matrix has detected error code really, uses the Hamming hash function to correct this error code then, and through after the error correction, the interval contains 4 error codes, uses P 32The probability of representing this situation, so, through after consulting, have the average errored bit number after consulting under the situation of 3 error bits to be in the interval:
L=P 31×3+P 32×4
Wherein
P 31 = C 2 m - 1 2 C 2 m - 1 3
P 32=1-P 31
2), computation interval average error rate aver Error
aver error=P 1×0+P 2×2+P 3×L+P 4×4
P wherein iRepresent to have in the interval probability of i error code
P i = C 2 m i ( M N ) i ( 1 - M N ) 2 m - i , N and M are initiation parameter,
3); Use the value that m calculates
Figure FDA0000069474270000023
, the m value corresponding to is required interval size;
Step 4, after consulting to finish, after the length of the input Bit String that the listener-in obtained, either party can determine to begin secret enhancing process, after the enhancing of maintaining secrecy is accomplished, safe communication key on the acquired information opinion meaning in negotiation communication user both sides' text box.
2. quantum key agreement method according to claim 1; It is characterized in that, in the step 3, said after connecting between server end and the client; Wherein the data of server end can not be made amendment, and the data of client can be made amendment according to the negotiation information that server end provides.
3. quantum key agreement method according to claim 1 is characterized in that, can carry out the network text transmission based on ICP/IP protocol between said server end and the client.
CN2009100498730A 2009-04-23 2009-04-23 Quantum key agreement method Expired - Fee Related CN101540760B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009100498730A CN101540760B (en) 2009-04-23 2009-04-23 Quantum key agreement method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100498730A CN101540760B (en) 2009-04-23 2009-04-23 Quantum key agreement method

Publications (2)

Publication Number Publication Date
CN101540760A CN101540760A (en) 2009-09-23
CN101540760B true CN101540760B (en) 2012-07-18

Family

ID=41123749

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100498730A Expired - Fee Related CN101540760B (en) 2009-04-23 2009-04-23 Quantum key agreement method

Country Status (1)

Country Link
CN (1) CN101540760B (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102227101B (en) * 2011-06-23 2012-08-08 安徽量子通信技术有限公司 Light quantum communication networking structure based on quantum centralized control stations and communication method thereof
CN102769527B (en) * 2012-08-14 2015-06-17 中国人民解放军国防科学技术大学 Networking method based on large scale monatomic cavity quantum network
CN103501221B (en) * 2013-09-29 2016-07-06 哈尔滨工业大学 A kind of appraisal procedure of the error code negotiation algorithm for quantum communications
CN103746799B (en) * 2013-12-26 2017-02-15 中南大学 Differential non-Gauss operation radioactivity continuous variable quantum key distribution method
CN104284330A (en) * 2014-10-24 2015-01-14 北京邮电大学 A Physical Layer Encryption Technology Based on Unreliable Wireless Channel
CN104734846B (en) * 2015-04-06 2018-02-06 安徽问天量子科技股份有限公司 Quantum-key distribution control device and method
CN106411521B (en) * 2015-07-31 2020-02-18 阿里巴巴集团控股有限公司 Identity authentication method, device and system for quantum key distribution process
CN107135066B (en) * 2016-02-29 2020-08-07 华为技术有限公司 Original key recovery device and method
CN106230589B (en) * 2016-09-19 2019-04-09 东华大学 A Reverse Key Agreement Method Based on Low Density Parity Check Code
CN106452761B (en) * 2016-11-18 2019-09-06 浙江神州量子网络科技有限公司 A kind of error correction method of multi-party quantum secret sharing system
CN107682144B (en) * 2017-08-29 2021-08-31 上海循态信息科技有限公司 Continuous variable key distribution method based on bi-phase modulation and data post-processing
CN110071801B (en) * 2019-04-24 2021-09-07 东南大学 A method of generating key part reconciliation combining BBBSS protocol and BCH code
CN112367124B (en) * 2019-09-01 2022-07-15 成都量安区块链科技有限公司 Quantum relay node virtualization method and device
CN113194466A (en) * 2021-04-23 2021-07-30 哈尔滨理工大学 Hybrid key system and method based on wireless channel characteristic simulation
CN114422122B (en) * 2021-12-23 2024-08-27 山东工商学院 Quantum key negotiation method and system with semi-trusted third party
CN114095183B (en) * 2022-01-23 2022-05-03 杭州字节信息技术有限公司 Client dual authentication method, terminal equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1603268A1 (en) * 2003-03-10 2005-12-07 Mitsubishi Denki Kabushiki Kaisha Quantum key delivery method and communication device
CN1706147A (en) * 2002-09-18 2005-12-07 三菱电机株式会社 Quantum key distribution method and communication device
CN1929372A (en) * 2006-09-22 2007-03-14 西南大学 Highly effective quantum key distribution method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1706147A (en) * 2002-09-18 2005-12-07 三菱电机株式会社 Quantum key distribution method and communication device
EP1603268A1 (en) * 2003-03-10 2005-12-07 Mitsubishi Denki Kabushiki Kaisha Quantum key delivery method and communication device
CN1929372A (en) * 2006-09-22 2007-03-14 西南大学 Highly effective quantum key distribution method

Also Published As

Publication number Publication date
CN101540760A (en) 2009-09-23

Similar Documents

Publication Publication Date Title
CN101540760B (en) Quantum key agreement method
Zeng et al. E-AUA: An efficient anonymous user authentication protocol for mobile IoT
CN107124268B (en) Privacy set intersection calculation method capable of resisting malicious attacks
CN109327308B (en) A quantum key distribution method and system with two-way identity authentication function
CN110572265B (en) A terminal security access gateway method, device and system based on quantum communication
CN107437993A (en) One kind is based on without the side's authentication key agreement method of certificate two and device
CN108388946B (en) A Two-Party Quantum Computation Method Based on Blind Quantum Computation
CN110709875A (en) Method and system for establishing trusted peer-to-peer communication between nodes in a blockchain network
CN101977198B (en) Inter-domain authentication and key negotiation method
Alotaibi Registration center based user authentication scheme for smart E-governance applications in smart cities
Cai et al. Multi-party quantum key agreement with five-qubit brown states
CN106027262B (en) Multi-variable signing method resisting key recovery attack
Zhao et al. A verifiable hidden policy CP‐ABE with decryption testing scheme and its application in VANET
CN101282216B (en) Method for switching three-partner key with privacy protection based on password authentication
CN103501221A (en) Evaluating method of error code negotiation algorithm for quantum communication
CN107241190A (en) The key agreement construction method and the network platform of a kind of identity-based
CN109978515A (en) A kind of Third Party Payment System method based on quantum multiple delegate Proxy Signature
Cui A cross-chain protocol based on quantum teleportation for underlying architecture of metaverse
He Simple quantum protocols for the millionaire problem with a semi-honest third party
Cai et al. Implementation of an E-payment security evaluation system based on quantum blind computing
Singh et al. Post-quantum secure authenticated key agreement protocol for wireless sensor networks
CN113904833B (en) Dynamic multi-factor identity authentication method and communication method based on threshold
Wang et al. Efficient quantum dialogue by using the two-qutrit entangled states without information leakage
CN112332988B (en) An agile quantum privacy query method based on anti-rotation noise
He et al. Two-party mutual authentication quantum key agreement protocol

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120718

Termination date: 20150423

EXPY Termination of patent right or utility model