摘要:本文专注于量子密钥分配和位承诺协议,特别讨论它们的安全性,首先回顾了经典密码学的相关内容,随后对量子密码学进行介绍,并说明其应用领域及存在的问题,最后得出结论并对前景进行展望。
the level of eavesdropping is below a certain threshold a key can be produced which is guaranteed as secure (i.e. the eavesdropper has no information about), otherwise no secure key is possible and communication is aborted. The security of quantum cryptography relies on the foundations of quantum mechanics, in contrast to traditional public key cryptography which relies on the computational difficulty of certain mathematical functions, and cannot provide any indication of eavesdropping or guarantee of key security. Quantum cryptography is only used to produce and distribute a key, not to transmit any message data. This key can then be used with any chosen encryption algorithm to encrypt (and decrypt) a message, which can then be transmitted over a standard communication channel. The algorithm most commonly associated with QKD is the one-time pad, as it is provably secure when used with a secret, random key. Quantum cryptography exploits the quantum mechanical property that a qubit cannot be copied or amplified without disturbing its original state. This is the statement of the No-Cloning Theorem [Wootters and Zurek 1982]. The essence of this theorem is the main ingredient of quantum key channel to exchange a sequence of qubits, which will then be used to create a key for the one-time pad in order to communicate over an insecure channel. Any disturbance of the qubits, for example caused by Eve trying to measure the qubits' state, can be detected with high probability. Quantum cryptographic devices typically employ individual photons of light and take advantage of either the Heisenberg Uncertainty principle or Quantum Entanglement.
5、加密协议——5. CRYPTOGRAPHIC PROTOCOLS
Cryptographic protocols (especially such primitive ones as BC (bit commitment) and OT (Oblivious transfer) are almost never executed on their own. They are usually used as building blocks of more complex applications.
It is already known that composition of secure protocols does not have to be secure.
Cryptographic protocols are algorithms for two or more parties how to conduct communication/cooperation in such a way that certain cryptographic goals are achieved (security, secrecy, anonymity, . . .) - even if a certain number of parties are malicious (may cheat).
Oblivious transfer, 1-out-of-2 oblivious transfer, bit commitment and (long-distance) coin-tossing are main primitives of cryptographic protocols.
Using oblivious transfer one can implement securely bit commitment and using bit commitment one can implement coin-tossing protocol.
Using oblivious transfer one can implement securely any multiparty computation at which each party keep secret its inputs
6、量子密码学的基本要素——6. BASIC PRIMITIVES OF QUANTUM CRYPTOGRAPHY
Quantum cryptography has some primitives in their own progressive field which are explained as follows.
Quantum one-time pad and its generalizations via private channels and randomization.
Quantum variations on coin tossing bit commitment and oblivious transfer protocols.
Quantum variations on zero-knowledge protocols.
Identification and authentication protocols
Quantum protocols to share and hide classical and quantum information
Anonymity protocols
7、密码系统——7. CRYPTOGRAPHIC SYSTEM
Recent quantum cryptosystems have concentrated on using optical fibers to transmit the p
本论文由英语论文网提供整理,提供论文代写,英语论文代写,代写论文,代写英语论文,代写留学生论文,代写英文论文,留学生论文代写相关核心关键词搜索。