Font Size: a A A

Data Collection Technology And The Problem Of Information Security Is Analyzed In QKD

Posted on:2005-10-24Degree:MasterType:Thesis
Country:ChinaCandidate:Z X ChenFull Text:PDF
GTID:2168360122987248Subject:Optics
Abstract/Summary:PDF Full Text Request
Quantum communication is a rising interdisciplinary field which combines classical communication and quantum mechanics .Quantum key distribution protocol makes use of single photon of quanta-randomicity to achieve unconditioned security key distribution, especially which is the realism significance of research way in quantum information at present.In this thesis, we general discuss that the problem of information security is analyzed by theoretical method in QKD. Meanwhile we introduce at large the key to cell technology in the experimental QKD. The thesis is composed of 5 chapters, among which are , Chapter 1 is a survey, Chapter 2,3,4 are the introductions of our own work, and Chapter 5 is a conclusion. The thesis is structured particularly as follows:Chapterl: Firstly, the kinds and schematic of the cryptographic communication are introduced. Secondly, it is faced with problems in quantum communcation at present.Chapter2: It has put forward a way of information eavesdropping in QKD. According to polarization optics and information theory, with the Breidbert group of eavesdropping, we induce to the prime eavesdropping efficiency in QKD.Chapter3: Based on quantum channel lossy in practical QKD> we propose and devise to quantum eavesdropping system. The research shows that Breidbart eavesdropping/beamsplitter is the more effective one Breidbart eavesdropping/Breidbart(B/B strategy).Chapter4: Designing practical QKD system, meanwhile we introduce at large the key to cell technology in the experimental QKD, through a deal of experiments, which proved to a reasonable system and acquired to some valuable experimental data.Chapter 5: Summarizing the contents of the thesis.
Keywords/Search Tags:quantum cryptography, quantum channel lossy, quantum key distribution, information security
PDF Full Text Request
Related items