Font Size: a A A

Research On The Key Technology Of Secure Communication Between Untrusted Users In Quantum Communication Network

Posted on:2020-08-21Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhangFull Text:PDF
GTID:2430330620455612Subject:Information security
Abstract/Summary:PDF Full Text Request
Through the research and security analysis of the existing secure communication protocols in quantum communication networks,it is pointed out that most of the current secure communication protocols are based on the credibility of users.With regard to the information security problem of untrustworthy user-to-user secure communication,which has been extensively studied in classical communication networks,and based on quantum mechanics theory and quantum information theory,the key technologies of secure communication between untrustworthy users in quantum communication networks are deeply studied.In this paper,the routing protocol of quantum communication network and the protocol of quantum privacy query between nodes are analyzed.The main contents of this paper are summarized as follows:(1)Analyzing the performance of routing protocols and node interconnection strategies of existing quantum networks,it is concluded that node access networks in current quantum communication networks need to broadcast data messages through classical channels first,thus generating routing table information,which will increase network load.At the same time,the analysis of routes and interconnection strategies are basically entanglement switching operations one by one according to routers,or although these two modes can establish quantum channel,they are inefficient,and the network load will increase if the measurement results are transmitted on the classical channel many times.Based on this,a new routing protocol is proposed in this paper.When building classical channel,the minimum spanning tree method is used to subtract the network load.Less network load,avoiding the formation of network loops,and when establishing quantum channels,the nodes are grouped and then quantum entanglement swapping operations are carried out.The efficiency of the protocol is analyzed,which proves that the efficiency is indeed improved.(2)Analyzing the security of the existing quantum key distribution protocol B92,and pointing out that most of the current quantum secure communication protocols are based on the trustworthiness of both sides of the communication.If any party is not trustworthy during the implementation of these protocols,serious information security problems will arise,forcing communication to be unable to communicate normally.Therefore,this paper studies quantum privacy query protocol in depth against the background that both sides of communication are untrustworthy.Combining with practical application scenarios,a new quantum privacy query is proposed,and the feasibility of this new protocol is analyzed through demonstration of an example.Furthermore,security analysis is carried out from two aspects of users and databases.The conclusion is drawn that the quantum privacy query protocol proposed in this paper is proved to be quantum.Privacy query protocol is feasible and secure.
Keywords/Search Tags:Information Security, Quantum Communication, Untrusted Users, Quantum Routing, Quantum Privacy Query
PDF Full Text Request
Related items