請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/20144
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 管希聖(Hsi-Sheng Goan) | |
dc.contributor.author | Po-Huang Chiu | en |
dc.contributor.author | 邱博煌 | zh_TW |
dc.date.accessioned | 2021-06-08T02:40:52Z | - |
dc.date.copyright | 2018-03-01 | |
dc.date.issued | 2018 | |
dc.date.submitted | 2018-02-20 | |
dc.identifier.citation | [1] Petitcolas, Fabien, electronic version and English translation of ”La cryptographie militaire”
[2] C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,”in Proceedings of IEEE International Conference on Computers, Systems and Signal Processing. Bangalore, India, 1984, pp. 175–179. [3] K. Inoue, E. Waks, and Y. Yamamoto, Phys. Lett. A, 68, 022317 (2003). [4] Nicolas Gisin, Gregoire Ribordy, Hugo Zbinden, Damien Stucki, Nicolas Brunner, Valerio Scarani, quant-ph/0411022v1 [5] D.Stucki,N.Brunner,N.Gisin,V.Scarani,andH.Zbinden.Fastandsimpleone-way quantum key distribution. Applied Physics Letters, 87(19):194108194108, 2005. [6] M. Curty, F.Xu, W. Cui et al., Nat. Commun. 5 3732(2014) [7] Hong, C. K., Ou, Z. Y., and Mandel, L.“, Measurementof subpicosecond time intervals between two photons by interference”, Phys. Rev. Lett. 59, 2044 (1987). [8] Xiongfeng Ma, Mohsen Razavi ,arXiv:1204.4856 [9] E. Artur “Quantum cryptography based on Bell‟s theorem.”,Phys. Rev. Lett., Vol. 67, No, 6,5 august 1991, pp 661-663. [10] Frédéric Grosshans and Philippe Grangier, Phys. Rev. Lett. 88, 057902 (2002) [11] Valerio Scarani, Helle Bechmann-Pasquinucci, Nicolas J. Cerf, Miloslav Dušek, Norbert Lütkenhaus, and Momtchil Peev ”The security of practical quantum key dis- tribution”, Rev. Mod. Phys. 81, 1301 (2009) [12] Nielsen, Chaung,” Quantum computation and quantum information”, ch11 [13] R. Renner, N. Gisin, B. Kraus, Phys. Rev. A 72,012332 (2005) [14] C. H. Bennett, Phys. Rev. Lett. 68, 3121 (1992). [15] P.W.Shor,J.Preskill,SimpleproofofsecurityoftheBB84quantumkeydistribution protocol, Phys. Rev. Lett. 85 (2000) [16] D. Gottesman, H.-K. Lo, N. Lu ̈tkenhaus, and J. Preskill, Quantum Inf. Comput. 4, 325 (2004). [17] Xiongfeng Ma, Bing Qi, Yi Zhao, and Hoi-Kwong Lo, Phys. Rev. A 72, 012326 (2005) [18] M. D. Eisaman, J. Fan, A. Migdall, and S. V. Polyakov, Review of Scientific Instru- ments 82, 071101 (2011) [19] C.T.Kelley,IterativeMethodsforLinearandNonlinearEquations,SIAM,Philadel- phia, 1995. [20] H.-K. Lo, X. Ma, and K. Chen, Phys. Rev. Lett. , 94, 230504 (2005) [21] C. Gobby, Z. L. Yuan, and A. J. Shields, Appl. Phys. Lett. 84, 3762 (2004). Zhou, Y-H., Yu, Z. -W, Wang X.B, Phys, Rev. A93, 042324(2016) [22] K. M. Rosfjord, J. K.W. Yang, E. A. Dauler, A. J. Kerman, V. Anant,B. M. Voronov, G. N. Goltsman, and K. K. Berggren, Opt. Express 14, 527 (2006). [23] A. E. Lita, A. J. Miller, and S. W. Nam, Opt. Express 16, 3032 (2008) [24] M. Lucamarini, K. A. Patel, J. F. Dynes, B. Frohlich, A. W. Sharpe, A. R. Dixon, Z. L. Yuan, R. V. Penty, and A. J. Shields, Opt. Express 21, 24550 (2013). [25] Yang Liu, Teng-Yun Chen, Jian Wang, Wen-Qi Cai, Xu Wan, Luo-Kan Chen, Jin- Hong Wang, Shu-Bin Liu, Hao Liang, Lin Yang, Cheng-Zhi Peng, Kai Chen, Zeng- Bing Chen, and Jian-Wei Pan, Opt. Express 18, 8587-8594 (2010) [26] Xiongfeng Ma, ”Quantum cryptography: theory and practice”, arXiv:0808.1385 [27] Hoi-Kwong Lo, Marcos Curty, and Bing Qi, Phys. Rev. Lett. 108, 130503 (2012) [28] Hoi-Kwong Lo, Marcos Curty, and Bing Qi, Phys. Rev. Lett. 108, 130503 (2012) [29] Xiongfeng Ma, Chi-Hang Fred Fung, and Mohsen Razavi, Phys. Rev. A 86, 052305 (2012) [30] Zhou, Y-H., Yu, Z. -W, Wang X.B, Phys, Rev. A93, 042324(2016) | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/20144 | - |
dc.description.abstract | 隨著互聯網的興起,安全通信成為必須。因為互聯網上的訊息是 相對開放的,所以我們需要一些方法來加密我們的信息。用於解決密 鑰分發問題的現代密碼學使用公鑰密碼系統(PKC),其安全性基於 計算安全性。即有限的計算能力和資源。最常用的公開密鑰密碼系統 是 RSA,它基於難以分解大的相乘質數。然而,一台採用 Shor 演算 法的量子計算機可以在短時間內破解 RSA 密碼系統,從而威脅到當 前的 PCK。量子密鑰分配為解決密鑰分配問題提供了一條新途徑,其 安全性基於物理定律,如不確定性原理和不可複製原理。在 QKD 協 議中相互通信的用戶可以檢測到任何試圖獲得密鑰資訊的第三方的存 在。理想的 QKD 已被證明是無條件安全的(unconditional security)。 但在現實世界中,光源,探測器,通道損失等方面存在一些缺陷或 缺陷,可能被對手利用。在本論文中,我們討論了 decoy-state QKD, 它是克服由於單光子光源的不完善而引起的通訊通道中的光子數分 裂攻擊 (photon number splitting ) 的有效方案。我們還研究了獨立測量 設備(MDI)QKD 方案,以克服旁路探測器攻擊。將 MDI-QKD 與 decoy-state 方法相結合,在結合理論與實踐之間的差距提供了一條清 晰的途徑。我們使用真實的實驗參數來模擬和計算這些 QKD 協議中 生成的關鍵速率。 | zh_TW |
dc.description.abstract | With the rise of the Internet, the secure communication becomes neces- sary and important. Because the information on internet is accessible to ev- eryone, we need some way to encrypt our message. Modern cryptography to solve key distribution problem use public key cryptography (PKC), and its security is based on the computational security. ie limited computing power and resources. The most commonly used public-key cryptosystem is RSA, which is based upon the difficulty to factor large semi-prime numbers. How- ever, a quantum computer with Shor’s algorithm can crack RSA cryptosystem in a short time, and thus will threaten the current PCK. Quantum key distribu- tion provides a new way to solve key distribution problem, and its security is based on the law of physics, such as the uncertainty principle and no-cloning theorem. The users who communicate with each other in the QKD proto- col can detect the presence of any third party that tries to gain knowledge of the key. The ideal QKD has been proven to be unconditionally secure. But in real world implementation, there are some flaws or imperfection in light sources, detectors, channel loss and etc. that may be exploited by adversaries. In this thesis, we discuss the decoy-state QKD that is an effective scheme to overcome the notorious photon number splitting attack in the communication channel due to the imperfection of single-photon light source. We also inves- tigate the measurement device independent (MDI) QKD scheme to overcome the side-channel detector attack. Combining the MDI-QKD with decoy-state method, offers a clear way to bridge the gap between theory and practice. We
simulate and calculate the key rate generated in these QKD protocols using realistic experimental parameters. | en |
dc.description.provenance | Made available in DSpace on 2021-06-08T02:40:52Z (GMT). No. of bitstreams: 1 ntu-107-R04222041-1.pdf: 5736451 bytes, checksum: 2e877b775e6ab1ebb333a4ffb5cd3caf (MD5) Previous issue date: 2018 | en |
dc.description.tableofcontents | 口試委員會審定書iii
誌謝iv 中文摘要v Abstract vi 1 Introduction 1 1.1 Introduction to cryptography . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Quantum key distribution . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2 Quantum Key Distribution Protocols 7 2.1 BB84 QKD protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 2.2 DPS QKD protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.3 Coherent One Way (COW) . . . . . . . . . . . . . . . . . . . . . . . . . 11 2.4 Measure Device Independent Quantum Key Distribution (MDI-QKD) . . 13 2.4.1 Bell State Measurement. . . . . . . . . . . . . . . . . . . . . . . 14 2.4.2 Path Phase Encoding MDI . . . . . . . . . . . . . . . . . . . . . 17 2.5 Short Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 3 The Attacks on Quantum Key Distribution 19 3.1 Intercept-Resend (I/R) Attack . . . . . . . . . . . . . . . . . . . . . . . . 19 3.1.1 I/R attack in the BB84 protocol . . . . . . . . . . . . . . . . . . 19 3.1.2 I/R attacks in the DPS protocol . . . . . . . . . . . . . . . . . . 20 3.2 Photon Number Splitting Attack (PNS) . . . . . . . . . . . . . . . . . . 21 3.2.1 Weak Coherent State Source . . . . . . . . . . . . . . . . . . . . 21 3.2.2 PNS attack in DPS protocol . . . . . . . . . . . . . . . . . . . . 22 3.3 Individual Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 3.4 Collective Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 3.5 Short Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 4 Decoy-state QKD 28 4.1 Decoy-state BB84 QKD protocol . . . . . . . . . . . . . . . . . . . . . 28 4.2 Security Definition of Decoy State Method . . . . . . . . . . . . . . . . 30 4.2.1 Security Definition . . . . . . . . . . . . . . . . . . . . . . . . . 30 4.2.2 Model of Decoy State Method . . . . . . . . . . . . . . . . . . . 31 4.2.3 General decoy method . . . . . . . . . . . . . . . . . . . . . . . 36 5 Numerical results of decoy-state QKD 40 5.1 With and without decoy state method . . . . . . . . . . . . . . . . . . . 40 5.2 Finite-Key effect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 5.3 Optimal result of decoy state method . . . . . . . . . . . . . . . . . . . . 43 5.4 One, Two and Three Decoy states . . . . . . . . . . . . . . . . . . . . . 44 5.5 Key rate for different hardware component settings . . . . . . . . . . . . 46 5.6 Comparing to other experiments . . . . . . . . . . . . . . . . . . . . . . 47 6 Analysis of MDI-QKD 51 6.1 Path encoding MDI-QKD . . . . . . . . . . . . . . . . . . . . . . . . . . 51 6.2 Decoy states MDI-QKD . . . . . . . . . . . . . . . . . . . . . . . . . . 57 6.3 Numerical result . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 6.4 Two decoy state and one vacuum state method . . . . . . . . . . . . . . . 62 7 Conclusions 64 A Parametric down conversion (PDC) source 66 Bibliography 68 | |
dc.language.iso | en | |
dc.title | 量子金鑰分發傳輸率 | zh_TW |
dc.title | Secret Key Rates of Practical Quantum Key Distribution | en |
dc.type | Thesis | |
dc.date.schoolyear | 106-1 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 林俊達(Guin-Dar Lin),陳君明(Jiun-Ming Chen) | |
dc.subject.keyword | 密碼學,量子密碼學,不可複製原理,測不準原理, | zh_TW |
dc.subject.keyword | Cryptography,Quantum key distribution,no-cloning theorem,uncertainty principle, | en |
dc.relation.page | 70 | |
dc.identifier.doi | 10.6342/NTU201800584 | |
dc.rights.note | 未授權 | |
dc.date.accepted | 2018-02-21 | |
dc.contributor.author-college | 理學院 | zh_TW |
dc.contributor.author-dept | 物理學研究所 | zh_TW |
顯示於系所單位: | 物理學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-107-1.pdf 目前未授權公開取用 | 5.6 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。