請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/20144
標題: | 量子金鑰分發傳輸率 Secret Key Rates of Practical Quantum Key Distribution |
作者: | Po-Huang Chiu 邱博煌 |
指導教授: | 管希聖(Hsi-Sheng Goan) |
關鍵字: | 密碼學,量子密碼學,不可複製原理,測不準原理, Cryptography,Quantum key distribution,no-cloning theorem,uncertainty principle, |
出版年 : | 2018 |
學位: | 碩士 |
摘要: | 隨著互聯網的興起,安全通信成為必須。因為互聯網上的訊息是 相對開放的,所以我們需要一些方法來加密我們的信息。用於解決密 鑰分發問題的現代密碼學使用公鑰密碼系統(PKC),其安全性基於 計算安全性。即有限的計算能力和資源。最常用的公開密鑰密碼系統 是 RSA,它基於難以分解大的相乘質數。然而,一台採用 Shor 演算 法的量子計算機可以在短時間內破解 RSA 密碼系統,從而威脅到當 前的 PCK。量子密鑰分配為解決密鑰分配問題提供了一條新途徑,其 安全性基於物理定律,如不確定性原理和不可複製原理。在 QKD 協 議中相互通信的用戶可以檢測到任何試圖獲得密鑰資訊的第三方的存 在。理想的 QKD 已被證明是無條件安全的(unconditional security)。 但在現實世界中,光源,探測器,通道損失等方面存在一些缺陷或 缺陷,可能被對手利用。在本論文中,我們討論了 decoy-state QKD, 它是克服由於單光子光源的不完善而引起的通訊通道中的光子數分 裂攻擊 (photon number splitting ) 的有效方案。我們還研究了獨立測量 設備(MDI)QKD 方案,以克服旁路探測器攻擊。將 MDI-QKD 與 decoy-state 方法相結合,在結合理論與實踐之間的差距提供了一條清 晰的途徑。我們使用真實的實驗參數來模擬和計算這些 QKD 協議中 生成的關鍵速率。 With the rise of the Internet, the secure communication becomes neces- sary and important. Because the information on internet is accessible to ev- eryone, we need some way to encrypt our message. Modern cryptography to solve key distribution problem use public key cryptography (PKC), and its security is based on the computational security. ie limited computing power and resources. The most commonly used public-key cryptosystem is RSA, which is based upon the difficulty to factor large semi-prime numbers. How- ever, a quantum computer with Shor’s algorithm can crack RSA cryptosystem in a short time, and thus will threaten the current PCK. Quantum key distribu- tion provides a new way to solve key distribution problem, and its security is based on the law of physics, such as the uncertainty principle and no-cloning theorem. The users who communicate with each other in the QKD proto- col can detect the presence of any third party that tries to gain knowledge of the key. The ideal QKD has been proven to be unconditionally secure. But in real world implementation, there are some flaws or imperfection in light sources, detectors, channel loss and etc. that may be exploited by adversaries. In this thesis, we discuss the decoy-state QKD that is an effective scheme to overcome the notorious photon number splitting attack in the communication channel due to the imperfection of single-photon light source. We also inves- tigate the measurement device independent (MDI) QKD scheme to overcome the side-channel detector attack. Combining the MDI-QKD with decoy-state method, offers a clear way to bridge the gap between theory and practice. We simulate and calculate the key rate generated in these QKD protocols using realistic experimental parameters. |
URI: | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/20144 |
DOI: | 10.6342/NTU201800584 |
全文授權: | 未授權 |
顯示於系所單位: | 物理學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-107-1.pdf 目前未授權公開取用 | 5.6 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。