天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

量子保密通信協(xié)議通用可組合安全性研究

發(fā)布時間:2018-02-23 21:22

  本文關(guān)鍵詞: QUC模型 QJUC模型 量子保密通信網(wǎng)絡(luò) 量子密鑰分配 出處:《國防科學(xué)技術(shù)大學(xué)》2014年碩士論文 論文類型:學(xué)位論文


【摘要】:量子保密通信是基于香農(nóng)信息論和量子物理學(xué)而發(fā)展起來的新型通信技術(shù)。量子保密通信與經(jīng)典通信不同,主要是利用微觀粒子的量子特性實現(xiàn)對信息的保護(hù)。量子保密通信的安全性由海森堡不確定性原理以及量子不可克隆原理保證,因此在理論上可以實現(xiàn)無條件安全通信。隨著技術(shù)的發(fā)展,量子保密通信的應(yīng)用領(lǐng)域也得到進(jìn)一步擴(kuò)展,與應(yīng)用相關(guān)的安全需求也越來越復(fù)雜。量子保密通信協(xié)議能夠與其它協(xié)議組合成復(fù)雜的協(xié)議體系,其安全性一直以來都是協(xié)議分析的難點。本文從復(fù)合角度出發(fā),研究了量子保密通信協(xié)議的通用可組合安全性,主要包括了以下三個方面:1、分析了Unruh等人的QUC模型,針對Unruh的QUC模型存在的不足進(jìn)行了改進(jìn),提出了QJUC協(xié)議模型和QJUC組合推論,并對QJUC組合推論進(jìn)行了證明。對QUC模型和QJUC模型的性能進(jìn)行了對比分析,分析結(jié)果表明QJUC模型相比于QUC模型減少了建立協(xié)議分析模型所需的資源,優(yōu)化了模型結(jié)構(gòu)且具有更強的建模能力。2、基于QJUC模型對QKD系統(tǒng)進(jìn)行了建模,并分析了QKD系統(tǒng)的QJUC安全性。利用QJUC模型模塊化的思想,將QKD系統(tǒng)拆分成了四個模塊,分別是:QKD協(xié)議、秘密放大、認(rèn)證以及糾錯。分別對這四個模塊的QJUC安全性進(jìn)行了分析。分析表明這四個模塊均滿足QJUC安全性,因此由這些模塊構(gòu)成的QKD系統(tǒng)也是QJUC安全的。3、研究了量子通信網(wǎng)絡(luò)的體系結(jié)構(gòu),利用QJUC模型對可信中繼QKD網(wǎng)絡(luò)的密鑰提取層進(jìn)行了建模分析。構(gòu)建了能夠QJUC安全實現(xiàn)F_(enldecrypt)、F_KD/F_EC/ F_PA和F^_Ath的實際協(xié)議多會話擴(kuò)展并分別對各個模塊進(jìn)行安全性分析,分析表明這些模塊均滿足QJUC安全性,因此由這些模塊構(gòu)成的可信中繼QKD網(wǎng)絡(luò)也是QJUC安全的。
[Abstract]:Quantum communication is a new communication technology based on the development of Shannon information theory and quantum physics. Quantum secret communication is different from the classical communication, mainly to protect the implementation of information based on the characteristics of quantum particles. The security of quantum secure communication by the Heisenberg uncertainty principle and quantum no cloning principle that can be realized unconditionally secure communication in theory. With the development of technology, the application field of quantum secure communication has been further extended, security requirements and application is becoming more and more complex. Quantum secure communication protocol can become complex protocol system in combination with other protocol, its security is always a difficult point. Based on protocol analysis composite view of universal quantum secure communication protocols can be integrated security, mainly includes the following three aspects: 1, analysis of the Unr The QUC model of uh et al., aiming at the shortcomings of QUC model of Unruh was improved, the proposed QJUC protocol model and QJUC combination and QJUC combination of corollary, corollary were proved. The performance of QUC model and QJUC model were analyzed. The analysis results show that the QJUC model is compared to the QUC model reduction analysis is established. Model of resources required for the protocol, optimized the model structure and has stronger modeling capability of.2, QJUC model for modeling QKD system based on QJUC, and analyzes the security of the QKD system using the QJUC model. The idea of modularization, the QKD system will be split into four modules, namely: QKD protocol, secret amplification, authentication and error correction respectively. QJUC on the safety of these four modules are analyzed. The analysis shows that the four modules can meet the safety of QJUC, so QKD system composed of these modules is QJUC security.3, research The architecture of quantum communication network, using the QJUC model of key extraction layer on trusted relay QKD network to carry on the modeling analysis. We construct QJUC security F_ (enldecrypt), F_KD/F_EC/ F_PA and F^_Ath of the actual protocol and multi session extension respectively for each module, security analysis, analysis shows that these modules can meet the QJUC security therefore, composed of these modules trusted relay QKD network and QJUC security.

【學(xué)位授予單位】:國防科學(xué)技術(shù)大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:O413;TN918

【參考文獻(xiàn)】

相關(guān)期刊論文 前3條

1 蘇婷;徐秋亮;;可公開驗證的UC安全簽密協(xié)議[J];東南大學(xué)學(xué)報(自然科學(xué)版);2008年S1期

2 張帆;馬建峰;文相在;;通用可組合的匿名HASH認(rèn)證模型[J];中國科學(xué)(E輯:信息科學(xué));2007年02期

3 徐海霞,李寶;分布式密鑰分發(fā)方案的安全性證明[J];軟件學(xué)報;2005年04期



本文編號:1527667

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/wltx/1527667.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶477cf***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com