摘要:本文专注于量子密钥分配和位承诺协议,特别讨论它们的安全性,首先回顾了经典密码学的相关内容,随后对量子密码学进行介绍,并说明其应用领域及存在的问题,最后得出结论并对前景进行展望。
hotons. In March of this year a Swiss team of researchers successfully conducted a quantum key exchange over the telephone network between Geneva and Lausanne, a distance of 67 kilometers. In August last year in the US, a team based in Los Alamos, New Mexico, managed to transmit using two portable units across six miles of desert. The work at Los Alamos is geared towards eventually sending quantum-encrypted information from the ground to satellites, which would remove all limits to the distances over which communications could be secured.
8、安全的重要性——8 IMPORTANCE OF SECURITY
Security is important in each and every field for preventing the data, information from any unauthorized dealing. The encryption and decryption is very common these days so for the protection of the information its security is a necessity. Different 4 eras in which the security can be explained are follows.
8.1 NEOLITHIC ERA
Progress was made on the basis that men learned how to make use of the potentials provided by the biological world to have food available in a sufficient amount and whenever needed.
8.2 INDUSTRIAL ERA
Progress has been made on the basis that men have learned how to make use of the laws and limitations of the physical world to have energyavailable in a sufficient amount and whenever needed.
8.3 INFORMATION ERA
Progress is and will be made on the basis that man learns how to make use of the laws and limitations of the information world to have information(processing energy) available in a sufficient amount and whenever needed.
8.4 SECURITY ERA
Progress is and will be made on the basis that man learns how to make use of the laws and limitations of the physical and information worlds to have security available in a sufficient amount and whenever needed.
9、量子密码学安全的应用——9. SECURITY FROM QUANTUM CRYPTOGRAPHY
Various kinds of securities are offered by the quantum cryptography which is speeded in various fields. Main kinds of security offered by quantum cryptography can be explained by two forms as follows presence of enemies and in the presence of dishonest parties.
9.1 SECURITY IN THE PRESENCE OF ENEMIES
A variety of (external/enemy) attacks on cryptographic systems have been investigated so far. Some of main ones:
Powerful Eve;
Man-in-the-middle attacks
Denial of services
Attacks on physical systems in use - see attacks on the underlying technology in case of the RSA cryptosystems, a good theory of (quantum) attacks is needed.
9.2 SECURITY IN PRESENCE OF DISHONEST PARTIES
Securities are recommended at each and every place for the proper protection of the data from any unauthorized dealing. It is demand of every field that there information must have to be secure from dishonest parties various factors used for this are as follows.
In case of multiparty protocols one of the key questions is to ask how many dishonest parties (cheaters) can be tolerated and how to achieve that.
One of main result along this line (quant-ph/0801.1544) says that in the case multiparty quantum computations with n parties up to aŒŠnaˆ’12 aŒ‹ cheaters can be tolerated by a universally compo sable protocol.
In the same paper it has been shown that a verifiable quantum secret sharing is possible
本论文由英语论文网提供整理,提供论文代写,英语论文代写,代写论文,代写英语论文,代写留学生论文,代写英文论文,留学生论文代写相关核心关键词搜索。