Font Size: a A A

Research And Hardware Implementation Of Communication And Privacy Amplification Modules In Decoy State Qkd Post-processing

Posted on:2015-01-25Degree:MasterType:Thesis
Country:ChinaCandidate:S Y MaFull Text:PDF
GTID:2298330422991922Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Development of quantum computers has brought unprecedented threats totraditional encryption methods, meanwhile combination of quantum key distribution(QKD) and one-time pad encryption makes absolutely secure encryption possible.Currently the key generation rate of QKD system cannot meet the needs of practicalapplication, by designing a network transmission module, employment GLLPformula and optimization privacy amplification, this paper accelerated the finalsecret key generation rate, specifically including the following contents:1. Considering the data transmission rate affects the rate of data communicationbetween Alice and Bob, thus indirectly affecting the key generation rate, therefore,research on high speed data transmission has very important practical significance toimprove the key generation rate and promote the utility of QKD system. At the sametime, the utility of QKD system should meet the demand of long distancetransmission, and the transmission must be reliable and stable. In order to meet theneeds of reliable data exchange at high speed with long distance in QKD systembetween Alice and Bob, this paper used the optical fiber to replace the original cabletransmission. Meanwhile, considering there are many kinds of network data in largequantities in the post processing stage of QKD, and they must arrive in sequence, weused optical fiber as the communication medium, designed a high-performancenetwork transmission protocol suitable for QKD system, a pACKet strategy basedon data exchange rate and a reliable transmission scheme on the MAC layer in thedata link layer.2. In order to resist PNS attACKs from the primitive BB84protocol because ofnon-ideal light source, people put forward the decoy state BB84protocol, the paperanalyzed the security of them respectively based on the GLLP theory, and thesecurity code length upper bound was given. In order to be applied in the hardwareimplementation of FPGA-based QKD system, the GLLP formula was designed andimplemented with FPGA, and the correctness of it was tested.3. Generally privacy amplification uses Toplitz matrix hashing to reduce keyleakage, thus getting the security key. This paper used LFSR to realize the matrixhashing, taking into account that the computation of multiplication of large matrix isvery large and slow, we used block and overall shift to improve the degree of parallelism, thus speeding up the final secure key generation rate. In order to furtheraccelerate the optimization, according to the matrix theory, the matrix hash wasaccelerated by fast Fourier transform (FFT), the library FFTW (Fast FourierTransform in the West) was transported to the hardware platform and the matrixmultiplication rate was tested.
Keywords/Search Tags:QKD, Optical fiber communication, GLLP formula, Privacyamplification, Toeplize matrix, LFSR
PDF Full Text Request
Related items